DSA-2021-273: Dell EMC ECS Security Update for Apache Log4j Remote Code Execution Vulnerability

Resumo: Dell EMC ECS remediation is available for the Apache Log4j Remote Code Execution Vulnerability that could be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...

Este artigo aplica-se a Este artigo não se aplica a Este artigo não está vinculado a nenhum produto específico. Nem todas as versões do produto estão identificadas neste artigo.

Impacto

Critical

Dados

Third-party Component CVEs More information
Apache Log4j CVE-2021-44228 Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.
Apache Log4j CVE-2021-45046
Apache Log4j CVE-2021-45105
Apache Log4j CVE-2021-44832


Third-party Component CVEs More information
Apache Log4j CVE-2021-44228 Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.
Apache Log4j CVE-2021-45046
Apache Log4j CVE-2021-45105
Apache Log4j CVE-2021-44832


A Dell Technologies recomenda que todos os clientes levem em consideração a pontuação base CVSS e as pontuações temporais e ambientais pertinentes que possam afetar a gravidade potencial associada a uma vulnerabilidade de segurança específica.

Produtos afetados e soluções

Product Affected Versions Updated Versions Link to Update
Dell EMC ECS
 
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 ECS 3.7.0
Note: Apache Log4j is upgraded to 2.17.1.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2
Note: Patches disable JNDI lookup class.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
Standalone Patch to “disable JNDI lookup class” for all affected versions. Apply patch
NOTE TO CUSTOMER: 
  • Dell requests this procedure of upgrading xdoctor and installation of the patch be done by Customers. This is the quickest and safest method as it avoids prolonged exposure to this Apache log4j vulnerability. All the steps are detailed in the ‘apply patch’ link.

Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
Product Affected Versions Updated Versions Link to Update
Dell EMC ECS
 
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 ECS 3.7.0
Note: Apache Log4j is upgraded to 2.17.1.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2
Note: Patches disable JNDI lookup class.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
Standalone Patch to “disable JNDI lookup class” for all affected versions. Apply patch
NOTE TO CUSTOMER: 
  • Dell requests this procedure of upgrading xdoctor and installation of the patch be done by Customers. This is the quickest and safest method as it avoids prolonged exposure to this Apache log4j vulnerability. All the steps are detailed in the ‘apply patch’ link.

Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.

Histórico de revisão

RevisionDateDescription
1.02021-12-14'Initial Release'
1.12021-12-14‘Note to use standalone patch to mitigate added’
1.22021-12-16Updated the KB link to apply patch
1.32022-01-19Updated Note with General patch details.
1.42022-02-08Updated ECS 3.7 release details.

Informações relacionadas

Produtos afetados

ECS Appliance

Produtos

ECS, Product Security Information
Propriedades do artigo
Número do artigo: 000194612
Tipo de artigo: Dell Security Advisory
Último modificado: 05 nov. 2025
Encontre as respostas de outros usuários da Dell para suas perguntas.
Serviços de suporte
Verifique se o dispositivo está coberto pelos serviços de suporte.