Article Number: 000194480
Critical
Third-party Component | CVEs | More information |
Apache Log4j | CVE-2021-44228 CVE-2021-45046 |
Apache Log4j Remote Code Execution |
Third-party Component | CVEs | More information |
Apache Log4j | CVE-2021-44228 CVE-2021-45046 |
Apache Log4j Remote Code Execution |
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.
Product | Affected Versions | Updated Versions) | Link to Update |
vCloud Director Data Protection Extension | 18.2 | 18.2 Hotfix | TBD |
19.1 | 19.1 Hotfix | TBD | |
19.2 | 19.2 Hotfix | TBD | |
19.3 | 19.3 Hotfix | TBD | |
19.4 | 19.4.0.214_HF.5 | https://dl.dell.com/downloads/DL107262_vCloud-Director-Data-Protection-Extension-19.4-(Hotfix-333650).zip |
Product | Updated Versions | Link to Update |
Avamar, Avamar Server, Avamar Data Store, and Avamar Virtual Edition | 19.4.0.116_HF333999 | https://dl.dell.com/downloads/DL107242_Avamar-19.4-MC-Cumulative-Hotfix-for-Avamar-Server-and-Avamar-Virtual-Edition-December-2021-(Hotfix-333999).zip |
Product | Affected Versions | Updated Versions) | Link to Update |
vCloud Director Data Protection Extension | 18.2 | 18.2 Hotfix | TBD |
19.1 | 19.1 Hotfix | TBD | |
19.2 | 19.2 Hotfix | TBD | |
19.3 | 19.3 Hotfix | TBD | |
19.4 | 19.4.0.214_HF.5 | https://dl.dell.com/downloads/DL107262_vCloud-Director-Data-Protection-Extension-19.4-(Hotfix-333650).zip |
Product | Updated Versions | Link to Update |
Avamar, Avamar Server, Avamar Data Store, and Avamar Virtual Edition | 19.4.0.116_HF333999 | https://dl.dell.com/downloads/DL107242_Avamar-19.4-MC-Cumulative-Hotfix-for-Avamar-Server-and-Avamar-Virtual-Edition-December-2021-(Hotfix-333999).zip |
vCloud Director Data Protection Extension
Notes:
For other affected versions, Dell EMC recommends scheduling an upgrade of the vCloud Director Data Protection Extension to 19.4 and applying the appropriate hotfix.
Refer to the README document for instructions on how to install this hotfix.
NOTE: The above workarounds are not applicable to vRealize Data Protection Extension which will be handled in separate hotfixes.
Revision | Date | Description |
1.0 | 2021-12-13 | Initial Release |
1.1 | 2021-12-14 | Update to include more status steps |
1.2 | 2021-12-15 | Add a checkpoint prior to restarting services |
1.3 | 2021-12-16 | Added environment variable checks in between switching users prior to restarting services |
1.4 | 2021-12-16 | Added steps to remove the JNDILookup class |
2.0 | 2021-12-17 | 19.4 hotfix included |
2.1 | 2021-12-18 | vCloud Director Data Protection Extension hotfix included and added note on vRealize Data Protection Extension DSA |
2.2 | 2021-12-20 | changes to clarify the applicability of the different sections to the 3 Avamar sub-products (Avamar Server, Avamar Virtual Edition, and vCloud Director Data Protection Extension). |
2.3 | 2021-12-22 | Added the workaround and mitigations for earlier version of vCloud Director Data Protection Extension (prior to 19.4) |
2.4 | 2022-01-06 | Updated the CVE list to include CVE-2021-45046 and clarified the remediation status. |
2.5 | 2022-01-07 | Updated the DSA with the findings that Avamar server is not vulnerable to the listed CVEs. |
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
The information in this Dell Technologies Security Advisory should be read and used to assist in avoiding situations that may arise from the problems described herein. Dell Technologies distributes Security Advisories to bring important security information to the attention of users of the affected product(s). Dell Technologies assesses the risk based on an average of risks across a diverse set of installed systems and may not represent the actual risk to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. The information set forth herein is provided "as is" without warranty of any kind. Dell Technologies expressly disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation shall apply to the extent permissible under law.
Avamar, Avamar, Avamar Server, Product Security Information
07 Jan 2022
12
Dell Security Advisory