Dell Data Protection Server Services Peak at 100% During Vulnerability Scans
Resumen: Services peak at 100% during vulnerability scans in Dell Data Protection Enterprise Edition or Virtual Edition.
Este artículo se aplica a:
Este artículo no se aplica a:
Este artículo no está vinculado a ningún producto específico.
En este artículo no se identifican todas las versiones de los productos.
Síntomas
Affected Products:
- Dell Data Protection | Enterprise Edition
- Dell Data Protection | Virtual Edition
External vulnerability scans use multiple ciphers exploits against open ports to determine potential service susceptibility. These scans may cause Dell Data Protection server CPUs to peak at 100%, resulting in service failures.
Dell Data Protection server service logs record these various connection attempts:
2014-03-16 22:12:40,318 WARN org.eclipse.jetty.server.CookieCutter [qtp871389427-83] - java.lang.IllegalArgumentException: Cookie name "5/*%7Cpass" is a reserved token 2014-03-16 22:15:39,366 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-82] - 157.126.223.250:43063 javax.net.ssl.SSLException: Unsupported record version Unknown-4.0 2014-03-16 22:15:39,366 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-84] - 157.126.223.250:43065 javax.net.ssl.SSLException: Unsupported record version Unknown-4.153 2014-03-16 22:15:44,945 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-83] - 157.126.223.250:43341 javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection? 2014-03-16 22:15:45,882 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-82] - 157.126.223.250:43427 javax.net.ssl.SSLException: Unsupported SSL v2.0 ClientHello 2014-03-16 22:16:29,992 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-93] - 157.126.223.2 50:48333 javax.net.ssl.SSLException: Unsupported SSL v2.0 ClientHello 2014-03-16 22:17:18,773 WARN org.eclipse.jetty.io.nio.SslSelectChannelEndPoint [qtp871389427-87] - 157.126.223.250:58828 javax.net.ssl.SSLHandshakeException: bad handshake record MAC
Causa
Not Applicable
Resolución
In order to prevent Dell Data Protection server services from failing upgrade:
- Dell Data Protection | Enterprise Edition Server to v8.3.1 Rollup Patch 3 or later
- Dell Data Protection | Virtual Edition Server to v8.5.0 or later
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Productos afectados
Dell EncryptionPropiedades del artículo
Número de artículo: 000129394
Tipo de artículo: Solution
Última modificación: 04 ene 2024
Versión: 10
Encuentra las respuestas que necesitas con la ayuda de otros usuarios de Dell
Servicios de asistencia
Comprueba si tu dispositivo está cubierto por los servicios de asistencia.