DSA-2021-265: Dell EMC VxRail Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228 and CVE-2021-45046)

摘要: On December 10, 2021, a critical remote code vulnerability was published concerning the Apache Log4j library. Later, CVE-2021-45046 was reported. VxRail is impacted by these vulnerabilities. Fixes and workarounds for CVE-2021-44228 and CVE-2021-45046 are documented in the tables included in this article. ...

本文适用于 本文不适用于 本文并非针对某种特定的产品。 本文并非包含所有产品版本。

影响

Critical

详情

Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 
Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 
Dell Technologies 建议所有客户考虑 CVSS 基本分数以及任何相关的时间和环境分数,这可能会影响与特定安全漏洞相关的潜在严重程度。

受影响的产品和补救措施

Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320
Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320

解决方法和缓解措施

Product Versions CVE Identifiers CVSSv3 Fixed Versions Workarounds
vCenter Server Appliance (vCSA)
VMSA-2021-0028
6.5.x CVE-2021-44228
CVE-2021-45046
Critical VMware vCenter Server 6.5 Update 3s See VMware article KB87081
6.7.x VMware vCenter Server 6.7 Update 3q
7.0.x VMware vCenter Server 7.0 Update 3c
VxRail 4.5.x 4.5.471 Dell KB article 194458: VxRail: VxRail Manager work around to remediate Apache Log4Shell vulnerability (CVE-2021-44228, CVE-2021-45046, and CVE-2021-4104)
4.7.x 4.7.541
7.0.x 7.0.320

修订历史记录

RevisionDateDescription
1.02021-12-14Initial Release
1.12022-02-01Update with VxRail Release 7.0.320
1.22022-02-18Update with VxRail Release 4.7.541
1.32022-03-09Update with VxRail Release 4.5.471

相关信息

受影响的产品

Product Security Information, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560 , VxRail E560F, VxRail E560N, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560F, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570F, VxRail P580N, VxRail P670F, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570F, VXRAIL V670F ...
文章属性
文章编号: 000194466
文章类型: Dell Security Advisory
上次修改时间: 19 9月 2025
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。