DSA-2021-265: Dell EMC VxRail Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228 and CVE-2021-45046)
Summary:
On December 10, 2021, a critical remote code vulnerability was published concerning the Apache Log4j library. Later, CVE-2021-45046 was reported. VxRail is impacted by these
vulnerabilities. Fixes and workarounds for CVE-2021-44228 and CVE-2021-45046 are documented in the tables included in this article.
...
Please select a product to check article relevancy
This article applies to This article does not apply to
Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required.
If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance.
Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required.
If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.