Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability

Summary: Dell is assessing the Apache Log4j library vulnerabilities and releasing remediations as they become available.

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content

Security Article Type

Security KB

CVE Identifier


Issue Summary

Apache Publication: Apache Log4j Remote Code Execution
CVE Details: CVE-2021-44228
CVE Details: CVE-2021-45046


Dell is reviewing the Apache Log4j Remote Code Execution vulnerabilities tracked in CVE-2021-44228 and CVE-2021-45046 and assessing impact to our products. The security of our products is a top priority and critical to protecting our customers.

For a full list of Dell products, their impact and remediations, please review the Apache Log4j Knowledge Base Article. We will continuously update this document with the latest information.

For frequently asked questions about Apache Log4j, please review Additional Information for Apache Log4j Remote Code Execution Vulnerability.

For customers of VMware solutions, please review the VMware security advisory regarding impact to their solutions and services: VMSA-2021-0028.

Additional security updates or mitigations will be communicated at as they become available. You can subscribe to our Security Alerts to be notified when new Security Advisories are posted by following the guidance here, or by following the directions in the Security Alerts section on the Security Advisories and Notices page.


Customers are encouraged to follow security best practices, including those recommended by Apache (Apache Log4j Remote Code Execution), and continue to monitor this notice for updated information as it becomes available.

The information should be read and used to assist in avoiding situations that may arise from the problems described herein. Dell Technologies distributes Security Advisories, Security Notices and Informational articles to bring important security information to the attention of users of the affected product(s). Dell Technologies assesses the risk based on an average of risks across a diverse set of installed systems and may not represent the actual risk to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. The information set forth herein is provided "as is" without warranty of any kind. Dell Technologies expressly disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation shall apply to the extent permissible under law.

Article Properties

Affected Product

Product Security Information


Product Security Information

Last Published Date

17 Dec. 2021



Article Type

Security KB