DSA-2021-265: Dell EMC VxRail Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228 and CVE-2021-45046)

Resumen: On December 10, 2021, a critical remote code vulnerability was published concerning the Apache Log4j library. Later, CVE-2021-45046 was reported. VxRail is impacted by these vulnerabilities. Fixes and workarounds for CVE-2021-44228 and CVE-2021-45046 are documented in the tables included in this article. ...

Este artículo se aplica a Este artículo no se aplica a Este artículo no está vinculado a ningún producto específico. No se identifican todas las versiones del producto en este artículo.

Impacto

Critical

Detalles

Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 
Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 
Dell Technologies recomienda que todos los clientes tengan en cuenta tanto la puntuación base como cualquier otra puntuación ambiental y temporal relevante que pueda afectar la posible gravedad asociada con la vulnerabilidad de seguridad en particular.

Corrección y productos afectados

Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320
Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320

Soluciones alternativas y mitigaciones

Product Versions CVE Identifiers CVSSv3 Fixed Versions Workarounds
vCenter Server Appliance (vCSA)
VMSA-2021-0028
6.5.x CVE-2021-44228
CVE-2021-45046
Critical VMware vCenter Server 6.5 Update 3s See VMware article KB87081
6.7.x VMware vCenter Server 6.7 Update 3q
7.0.x VMware vCenter Server 7.0 Update 3c
VxRail 4.5.x 4.5.471 Dell KB article 194458: VxRail: VxRail Manager work around to remediate Apache Log4Shell vulnerability (CVE-2021-44228, CVE-2021-45046, and CVE-2021-4104)
4.7.x 4.7.541
7.0.x 7.0.320

Historial de revisiones

RevisionDateDescription
1.02021-12-14Initial Release
1.12022-02-01Update with VxRail Release 7.0.320
1.22022-02-18Update with VxRail Release 4.7.541
1.32022-03-09Update with VxRail Release 4.5.471

Información relacionada

Productos afectados

Product Security Information, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560 , VxRail E560F, VxRail E560N, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560F, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570F, VxRail P580N, VxRail P670F, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570F, VXRAIL V670F ...
Propiedades del artículo
Número del artículo: 000194466
Tipo de artículo: Dell Security Advisory
Última modificación: 19 sept 2025
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.