DSA-2021-273: Dell EMC ECS Security Update for Apache Log4j Remote Code Execution Vulnerability
Сводка: Dell EMC ECS remediation is available for the Apache Log4j Remote Code Execution Vulnerability that could be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...
Данная статья применяется к
Данная статья не применяется к
Эта статья не привязана к какому-либо конкретному продукту.
В этой статье указаны не все версии продуктов.
Влияние
Critical
Подробные сведения
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
Затронутые продукты и исправление
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
История изменений
|
Связанная информация
Правовая оговорка
Затронутые продукты
ECS ApplianceПродукты
ECS, Product Security InformationСвойства статьи
Номер статьи: 000194612
Тип статьи: Dell Security Advisory
Последнее изменение: 05 Nov 2025
Получите ответы на свои вопросы от других пользователей Dell
Услуги технической поддержки
Проверьте, распространяются ли на ваше устройство услуги технической поддержки.