DSA-2021-300: vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage  Security Updates for Apache Log4j Remote Code Execution Vulnerability

Riepilogo: vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage is available for the Apache Log4j Remote Code Execution Vulnerability that may be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...

Questo articolo si applica a Questo articolo non si applica a Questo articolo non è legato a un prodotto specifico. Non tutte le versioni del prodotto sono identificate in questo articolo.

Impatto

Critical

Dettagli

Third-party Component 

CVE 

More information 

Apache Log4j 

CVE-2021-44228, CVE-2021-45046 

Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.

Third-party Component 

CVE 

More information 

Apache Log4j 

CVE-2021-44228, CVE-2021-45046 

Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.

Dell Technologies raccomanda a tutti i clienti di prendere in considerazione sia il punteggio base CVSS, sia ogni eventuale punteggio temporale o ambientale che possa avere effetti sul livello di gravità potenziale associato a una specifica vulnerabilità di sicurezza.

Prodotti interessati e correzione

Product Affected Versions Updated Versions Link to Update
vRO Plugin for Dell EMC PowerMax Version 1.2.3 or earlier  1.2.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.1.0 or earlier  1.1.1 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.0.3, 1.0.2, 1.0.1, and 1.0.0  1.0.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US

Note:
Customers using vRO Plugin for Dell EMC PowerStore 1.1.4 (or earlier), Unity 1.0.7 (or earlier  and XtremIO 4.1.2 (or earlier) only need to apply the vRO mitigation, detailed in the Workaround and Mitigation section.
Product Affected Versions Updated Versions Link to Update
vRO Plugin for Dell EMC PowerMax Version 1.2.3 or earlier  1.2.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.1.0 or earlier  1.1.1 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US
vRO Plugin for Dell EMC PowerScale Version 1.0.3, 1.0.2, 1.0.1, and 1.0.0  1.0.4 Support for vRealize Orchestrator (vRO) Platforms | Drivers & Downloads | Dell US

Note:
Customers using vRO Plugin for Dell EMC PowerStore 1.1.4 (or earlier), Unity 1.0.7 (or earlier  and XtremIO 4.1.2 (or earlier) only need to apply the vRO mitigation, detailed in the Workaround and Mitigation section.

Soluzioni alternative e mitigazioni

Mitigation applicable to vRO Plugin for Dell EMC PowerMax, vRO Plugin for Dell EMC PowerScale, vRO Plugin for Dell EMC PowerStore, vRO Plugin for Dell EMC Unity, and vRO Plugin for Dell EMC XtremIO:

VMware has announced two KB articles to mitigate this vulnerability for VMware vRealize Orchestrator (vRO):

The corresponding patch information is found in:

Cronologia delle revisioni

RevisionDateDescription
1.02021-12-17Initial Release
1.12022-01-04Provide more exact instructions for vRO Plugins for Dell EMC PowerStore, Unity and XtremIO.
1.22022-01-31Updated Remediation section to include 1.0.3, 1.0.2, 1.0.1 and 1.0.0

Informazioni correlate

Prodotti interessati

Product Security Information, vRealize Orchestrator (vRO) Plug-in for PowerMax, vRealize Orchestrator (vRO) Plug-in for PowerScale

Prodotti

vRealize Orchestrator (vRO) Plug-in for PowerStore, vRealize Orchestrator (vRO) Plug-in for Unity, vRealize Orchestrator (vRO) Plug-in for XtremIO
Proprietà dell'articolo
Numero articolo: 000194610
Tipo di articolo: Dell Security Advisory
Ultima modifica: 05 nov 2025
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.