Data Protection Advisor: Apache Log4j False Positive Security Vulnerabilities (CVE-2021-44832)
Summary: This article provides a list of security vulnerabilities that cannot be exploited on Dell Data Protection Advisor Product Versions-19.6,19.5,19.4,19.3,19.2,19.1,18.X or earlier, but which may be identified by security scanners. ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Security Article Type
Security KB
CVE Identifier
CVE-2021-44832
Issue Summary
See the 'Recommendation' section below for details on each CVE.
Recommendations
The vulnerabilities listed in the table below are in order by the date on which Data Protection Advisor Engineering determined that the Data Protection Advisor 19.6,19.5,19.4,19.3,19.2,18.x was not vulnerable.
| Third-party Component | CVE ID | Summary of Vulnerability | Reason why Product is not Vulnerable | Date Determined False Positive |
| Log4j | CVE-2021-44832 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. | DPA does not uses the affected JDBC Appender in the log4j jar. | January 12, 2022 |
Legal Disclaimer
Article Properties
Article Number: 000195673
Article Type: Security KB
Last Modified: 31 Jan 2022
Version: 1
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.