Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

DSA-2021-265: Dell EMC VxRail Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228 and CVE-2021-45046)

Summary: On December 10, 2021, a critical remote code vulnerability was published concerning the Apache Log4j library. Later, CVE-2021-45046 was reported. VxRail is impacted by theseSee more

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Impact

Critical

Details

Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 
Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 

Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320
Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320

Workarounds and Mitigations

Product Versions CVE Identifiers CVSSv3 Fixed Versions Workarounds
vCenter Server Appliance (vCSA)
VMSA-2021-0028
6.5.x CVE-2021-44228
CVE-2021-45046
Critical VMware vCenter Server 6.5 Update 3s See VMware article KB87081
6.7.x VMware vCenter Server 6.7 Update 3q
7.0.x VMware vCenter Server 7.0 Update 3c
VxRail 4.5.x 4.5.471 Dell KB article 194458: VxRail: VxRail Manager work around to remediate Apache Log4Shell vulnerability (CVE-2021-44228, CVE-2021-45046, and CVE-2021-4104)
4.7.x 4.7.541
7.0.x 7.0.320

Revision History

RevisionDateDescription
1.02021-12-14Initial Release
1.12022-02-01Update with VxRail Release 7.0.320
1.22022-02-18Update with VxRail Release 4.7.541
1.32022-03-09Update with VxRail Release 4.5.471

Related Information

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide


The information in this Dell Technologies Security Advisory should be read and used to assist in avoiding situations that may arise from the problems described herein. Dell Technologies distributes Security Advisories to bring important security information to the attention of users of the affected product(s). Dell Technologies assesses the risk based on an average of risks across a diverse set of installed systems and may not represent the actual risk to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. The information set forth herein is provided "as is" without warranty of any kind. Dell Technologies expressly disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation shall apply to the extent permissible under law.

Article Properties


Affected Product

Product Security Information, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560Product Security Information, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560, VxRail E560F, VxRail E560N, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560F, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570F, VxRail P580N, VXRAIL P670F, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570F, VXRAIL V670FSee more

Last Published Date

25 Mar 2022

Version

11

Article Type

Dell Security Advisory