DSA-2021-300: vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage  Security Updates for Apache Log4j Remote Code Execution Vulnerability

Resumen: vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage is available for the Apache Log4j Remote Code Execution Vulnerability that may be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...

Este artículo se aplica a Este artículo no se aplica a Este artículo no está vinculado a ningún producto específico. No se identifican todas las versiones del producto en este artículo.

Impacto

Critical

Detalles

Third-party Component 

CVE 

More information 

Apache Log4j 

CVE-2021-44228, CVE-2021-45046 

Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.

Third-party Component 

CVE 

More information 

Apache Log4j 

CVE-2021-44228, CVE-2021-45046 

Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies recomienda que todos los clientes tengan en cuenta tanto la puntuación base como cualquier otra puntuación ambiental y temporal relevante que pueda afectar la posible gravedad asociada con la vulnerabilidad de seguridad en particular.

Corrección y productos afectados

Product Affected Versions Updated Versions Link to Update
vRO Plugin for Dell EMC PowerMax Version 1.2.3 or earlier  1.2.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.1.0 or earlier  1.1.1 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.0.3, 1.0.2, 1.0.1, and 1.0.0  1.0.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US

Note:
Customers using vRO Plugin for Dell EMC PowerStore 1.1.4 (or earlier), Unity 1.0.7 (or earlier  and XtremIO 4.1.2 (or earlier) only need to apply the vRO mitigation, detailed in the Workaround and Mitigation section.
Product Affected Versions Updated Versions Link to Update
vRO Plugin for Dell EMC PowerMax Version 1.2.3 or earlier  1.2.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.1.0 or earlier  1.1.1 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.0.3, 1.0.2, 1.0.1, and 1.0.0  1.0.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US

Note:
Customers using vRO Plugin for Dell EMC PowerStore 1.1.4 (or earlier), Unity 1.0.7 (or earlier  and XtremIO 4.1.2 (or earlier) only need to apply the vRO mitigation, detailed in the Workaround and Mitigation section.

Soluciones alternativas y mitigaciones

Mitigation applicable to vRO Plugin for Dell EMC PowerMax, vRO Plugin for Dell EMC PowerScale, vRO Plugin for Dell EMC PowerStore, vRO Plugin for Dell EMC Unity, and vRO Plugin for Dell EMC XtremIO:

VMware has announced two KB articles to mitigate this vulnerability for VMware vRealize Orchestrator (vRO):

The corresponding patch information is found in:

Historial de revisiones

RevisionDateDescription
1.02021-12-17Initial Release
1.12022-01-04Provide more exact instructions for vRO Plugins for Dell EMC PowerStore, Unity and XtremIO.
1.22022-01-31Updated Remediation section to include 1.0.3, 1.0.2, 1.0.1 and 1.0.0

Información relacionada

Productos afectados

Product Security Information, vRealize Orchestrator (vRO) Plug-in for PowerMax, vRealize Orchestrator (vRO) Plug-in for PowerScale

Productos

vRealize Orchestrator (vRO) Plug-in for PowerStore, vRealize Orchestrator (vRO) Plug-in for Unity, vRealize Orchestrator (vRO) Plug-in for XtremIO
Propiedades del artículo
Número del artículo: 000194610
Tipo de artículo: Dell Security Advisory
Última modificación: 05 nov 2025
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.