DSA-2021-273: Dell EMC ECS Security Update for Apache Log4j Remote Code Execution Vulnerability
Zhrnutie: Dell EMC ECS remediation is available for the Apache Log4j Remote Code Execution Vulnerability that could be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...
Tento článok sa vzťahuje na
Tento článok sa nevzťahuje na
Tento článok nie je viazaný na žiadny konkrétny produkt.
V tomto článku nie sú uvedené všetky verzie produktov.
Dosah
Critical
Podrobnosti
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
Dotknuté produkty a riešenie problému
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
História revízií
|
Súvisiace informácie
Legal Disclaimer
Dotknuté produkty
ECS ApplianceProdukty
ECS, Product Security InformationVlastnosti článku
Číslo článku: 000194612
Typ článku: Dell Security Advisory
Dátum poslednej úpravy: 05 nov 2025
Nájdite odpovede na svoje otázky od ostatných používateľov spoločnosti Dell
Služby podpory
Skontrolujte, či sa na vaše zariadenie vzťahujú služby podpory.