Tutorial on Apache Log4j Dell EMC RecoverPoint Security Update for CVE-2021-44228
Опубликовано НОЯБ. 26, 2024
This video will demonstrate on Apache Log4j Dell EMC RecoverPoint Security Update for CVE-2021-44228.
Welcome to Dell Technologies RecoverPoint and RecoverPoint for Virtual Machines Video Series. Dell EMC RecoverPoint Security Update for Apache Log4j Remote Code Execution Vulnerability CVE-2021-44228. Reference Dell Knowledge Article number 194531. This video was created to demonstrate how to mitigate the log4j Vulnerability CVE-2021-44228 for RecoverPoint and RecoverPoint for Virtual Machines. When to do this.
If your version of RecoverPoint or RecoverPoint for Virtual Machines is affected by the vulnerability. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. Before you begin. Ensure you are able to SSH to RPAs Installation Manager (admin or boxmgmt, depends on version and installation type). Use SSH to log in to Installation Manager admin or boxmgmt (depends on version and installation type).
Choose [2], Setup. Then [8], Advanced options. Then [4], Run script. Paste the sign script available in Dell Security Advisory 2021-284 Article Number 194531, including the hash sign. Enter your name and press enter. After the script runs successfully, press "M" to go back to Main Menu. Choose [5], Shutdown / Reboot operations. Choose [1], Reboot RPA.
When prompted, type "y" to confirm reboot. After the RPA is back online, perform the same procedure on all RPAs in the system. Reference the following for more information. Dell Security Advisory 2021-284: Dell EMC RecoverPoint Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228) Article Number: 194531.