DSA-2021-273: Dell EMC ECS Security Update for Apache Log4j Remote Code Execution Vulnerability
Summary: Dell EMC ECS remediation is available for the Apache Log4j Remote Code Execution Vulnerability that could be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...
Acest articol se aplică pentru
Acest articol nu se aplică pentru
Acest articol nu este legat de un produs specific.
Acest articol nu acoperă toate versiunile de produs existente.
Impact
Critical
Details
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
Produse afectate și măsuri de remediere
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
Revision History
|
Related Information
Exonerare de răspundere
Produse afectate
ECS ApplianceProduse
ECS, Product Security InformationProprietăți articol
Article Number: 000194612
Article Type: Dell Security Advisory
Ultima modificare: 05 Nov 2025
Găsiți răspunsuri la întrebările dvs. de la alți utilizatori Dell
Servicii de asistență
Verificați dacă dispozitivul dvs. este acoperit de serviciile de asistență.