Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Article Number: 000194790


DSA-2021-310: Storage Center-Dell Storage Manager Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228, CVE-2021-45046, and CVE-2021-45105)

Summary: Storage Center-Dell Storage Manager remediation is available for the Apache Log4j Remote Code Execution Vulnerability that may be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Impact

Critical

Details

Third-Party Component  CVEs  More information 
Apache Log4j  CVE-2021-44228,  Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies. 
CVE-2021-45046, CVE-2021-45105
Third-Party Component  CVEs  More information 
Apache Log4j  CVE-2021-44228,  Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies. 
CVE-2021-45046, CVE-2021-45105
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products and Remediation

Product  Affected Versions  Updated Versions  Link to Update 
Storage Center - Dell Storage Manager   16.x
17.x
18.x
19.x
20.1.1
20.1.2 https://www.dell.com/support
Product  Affected Versions  Updated Versions  Link to Update 
Storage Center - Dell Storage Manager   16.x
17.x
18.x
19.x
20.1.1
20.1.2 https://www.dell.com/support

Workarounds and Mitigations

The workaround is a short-term mitigation for CVE-2021-44228 and CVE-2021-45046 vulnerabilities in DSM versions 19.x and 20.1.1. DSM version 20.1.2 resolves the vulnerabilities listed above. The instructions have not and will not be verified on DSM versions 18.x or earlier.

DSM installed in Windows:
-----------------------------

  1. Stop datacollector service in windows and close any client sessions
    1. Goto Control Panel>Administrative Tools>Services
    2. Stop 'Storage Manager Datacollector'
    3. Close any open Dell Storage Manager client sessions
  2. Look for log4j-core-2.3.D1.jar in the below locations
    1. <DSM Installation>\Storage Manager\msaservice\lib
    2. <DSM Installation>\Storage Manager\msaservice\wildfly-17.0.0.Final\modules\system\layers\base\org\apache\log4jv2\main
      (For DSM Versions<19.1.x, The path will be <DSM Installation>\Storage Manager\msaservice\wildfly-11.0.0.Final\ modules\system\layers\base\org\apache\log4jv2\main)
    3. (only if the DSM client is installed) <DSM Client Installation>\Dell\Enterprise Manager\msagui\lib
  3. In all locations above, remove JndiLookup.class from the log4j-core-2.3.D1.jar
    1. Use a zip tool such as winzip or 7z (Must be run as Administrator)
    2.  Open archive: log4j-core-2.3.D1.jar
    3. Go to location: org\apache\logging\log4j\core\lookup\
    4. Remove JndiLookup.class
    5. Close the archive.
    6. Perform above step in all of the locations of log4j-core-2.3.D1.jar
  4. Look for plugin-installer.jar in <DSM Installation>\Storage Manager\msaservice\lib
    1. Use a zip tool such as winzip or 7z (Must be run as Administrator)
    2. Open archive: plugin-installer.jar
    3. Go to location: \org\apache\logging\log4j\core\lookup\
    4. Remove JndiLookup.class
    5. Close the archive.
  5. Start the datacollector service in Windows
    1. Goto Control Panel>Administrative Tools>Services
    2. Start 'Storage Manager Datacollector
 

DSM VA:
  1. Prior to following the below steps, connect to the cli of the DSM VA and log in as ‘support’. Once the Challenge string has been provided, please call Dell Technical Support to request a challenge-response, do not close the session down as this will generate a new challenge string requiring a differing response string.
  2. SSH to the VA as support user and run ‘sudo su’ to get root user privileges. Stop the data collector process by running ‘systemctl stop jboss’. Also stop the DsmServerManager process by running ‘systemctl stop monit’. Logout from DSM CLI if the session is opened.
  3. Look for log4j core jars in the below locations
    1. /em/msaservice/lib/log4j-core-2.3.D1.jar
    2. /em/msaservice/wildfly-17.0.0.Final/modules/system/layers/base/org/apache/log4jv2/main/log4j-core-2.3.D1.jar
    3. /home/em/DsmCLI/lib/log4j-core-2.3.jar
    4. /DsmServerManager/lib/log4j-core-2.3.jar
  4. Remove the JndiLookup.class from the above listed log4j core jars using the below commands
    1. zip -q -d /em/msaservice/lib/log4j-core-2.3.D1.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
    2. zip -q -d /em/msaservice/wildfly-17.0.0.Final/modules/system/layers/base/org/apache/log4jv2/main/log4j-core-2.3.D1.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
    3. zip -q -d /home/em/DsmCLI/lib/log4j-core-2.3.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
    4. zip -q -d /DsmServerManager/lib/log4j-core-2.3.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
  5. Look for plugin-installer.jar and plugin-installer-2.0.10.jar in the below locations. For DSM versions < 20.1.1, look for plugin-installer-1.0.22.jar in place of plugin-installer-2.0.10.jar.
    1. /em/msaservice/lib/plugin-installer.jar
    2. /home/em/DsmCLI/lib/plugin-installer-2.0.10.jar
    3. /DsmServerManager/lib/plugin-installer-2.0.10.jar
  6. Remove the JndiLookup.class from the above listed plugin installer jars. For DSM versions < 20.1.1, remove plugin-installer-1.0.22.jar instead of plugin-installer-2.0.10.jar in the below commands.
    1. zip -q -d /em/msaservice/lib/plugin-installer.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
    2. zip -q -d /home/em/DsmCLI/lib/plugin-installer-2.0.10.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
    3. zip -q -d /DsmServerManager/lib/plugin-installer-2.0.10.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
  7. Start the data collector process by running ‘systemctl start jboss’ and DsmServerManager process by running ‘systemctl start monit’.
NOTE: The detection in DSM 20.1.2 is a false positive and that it is expected to be removed in the next version.

Revision History

Revision Date Description 
1.02021-12-14 Initial Release
2.02022-01-07New step 1 for DSM VA
3.0
4.0
2022-01-13
2022-02-03
Add link to DSM download
Qualifying statements added

Related Information

Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide


Article Properties


Affected Product

Dell Storage Manager

Product

Dell Storage Manager, Product Security Information

Last Published Date

03 Feb 2023

Version

9

Article Type

Dell Security Advisory