DSA-2021-273: Dell EMC ECS Security Update for Apache Log4j Remote Code Execution Vulnerability

摘要: Dell EMC ECS remediation is available for the Apache Log4j Remote Code Execution Vulnerability that could be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...

本文适用于 本文不适用于 本文并非针对某种特定的产品。 本文并非包含所有产品版本。

影响

Critical

详情

Third-party Component CVEs More information
Apache Log4j CVE-2021-44228 Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.
Apache Log4j CVE-2021-45046
Apache Log4j CVE-2021-45105
Apache Log4j CVE-2021-44832


Third-party Component CVEs More information
Apache Log4j CVE-2021-44228 Apache Log4j Remote Code Execution This hyperlink is taking you to a website outside of Dell Technologies.
Apache Log4j CVE-2021-45046
Apache Log4j CVE-2021-45105
Apache Log4j CVE-2021-44832


Dell Technologies 建议所有客户考虑 CVSS 基本分数以及任何相关的时间和环境分数,这可能会影响与特定安全漏洞相关的潜在严重程度。

受影响的产品和补救措施

Product Affected Versions Updated Versions Link to Update
Dell EMC ECS
 
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 ECS 3.7.0
Note: Apache Log4j is upgraded to 2.17.1.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2
Note: Patches disable JNDI lookup class.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
Standalone Patch to “disable JNDI lookup class” for all affected versions. Apply patch
NOTE TO CUSTOMER: 
  • Dell requests this procedure of upgrading xdoctor and installation of the patch be done by Customers. This is the quickest and safest method as it avoids prolonged exposure to this Apache log4j vulnerability. All the steps are detailed in the ‘apply patch’ link.

Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
Product Affected Versions Updated Versions Link to Update
Dell EMC ECS
 
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 ECS 3.7.0
Note: Apache Log4j is upgraded to 2.17.1.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2
Note: Patches disable JNDI lookup class.

https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview
 
Standalone Patch to “disable JNDI lookup class” for all affected versions. Apply patch
NOTE TO CUSTOMER: 
  • Dell requests this procedure of upgrading xdoctor and installation of the patch be done by Customers. This is the quickest and safest method as it avoids prolonged exposure to this Apache log4j vulnerability. All the steps are detailed in the ‘apply patch’ link.

Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.

修订历史记录

RevisionDateDescription
1.02021-12-14'Initial Release'
1.12021-12-14‘Note to use standalone patch to mitigate added’
1.22021-12-16Updated the KB link to apply patch
1.32022-01-19Updated Note with General patch details.
1.42022-02-08Updated ECS 3.7 release details.

相关信息

受影响的产品

ECS Appliance

产品

ECS, Product Security Information
文章属性
文章编号: 000194612
文章类型: Dell Security Advisory
上次修改时间: 05 11月 2025
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。