DSA-2021-285: Dell EMC Integrated Data Protection Appliance (PowerProtect DP Series) Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228).
Dell EMC PowerProtect DP Series Appliance Integrated Data Protection Appliance |
Version Effected? | ||||
Component | v2.3.x | v2.4.x | v2.5 | v2.6.x | v2.7.0 |
vCenter (Hypervisor Manager) | Yes | Yes | Yes | Yes | Yes |
Data Domain (Protection Storage) | No | No | No | No | Yes |
Avamar (Backup Server/Protection Software) | No | No | No | No | No |
Data Protection Central (System Manager) | Yes | Yes | Yes | Yes | Yes |
Data Protection Search (Search) | Yes | Yes | Yes | Yes | Yes |
Cloud Disaster Recovery | No | No | No | No | Yes |
Appliance Configuration Manager (ACM) | No | No | No | No | Yes |
Data Protection Advisor (DPA/Reporting and Analytics) | Yes | Yes | Yes | Yes | Yes |
Upgrade to PowerProtect DP Series appliance and IDPA version 2.7.2
This tool may disable http and https on the Data Domain in version 2.7.0 to secure that system from CVE-2021-44228, disabling the UI. See below for further information.
There is no functional impact on the appliance. Undo changes on ACM VM before PowerProtect DP Series Appliance or IDPA upgrades to avoid any impact on upgrades.
acm5800:/tmp # ./tmp/lord_v9 sh: /tmp/_MEIFMNULP/libreadline.so.6: no version information available (required by sh) 2021-12-23 20:54:22,399 [INFO] SESSION STARTED 2021-12-23 20:54:22,400 [INFO] Logging everything to : lord.log Session Start Time : 2021-12-23 20:54 ------------------------------------------------- ------------------------------------------------- PowerProtect CVE-2021-44228 Patcher 5.0 Developer : Pankaj Pande(p.pande@dell.com) Release : 21 Dec 2021 ------------------------------------------------- Welcome to CVE-2021-44228 Patching Tool. This utility will assist you in patching CVE-2021-44228 for several Dell products including but not limited to IDPA, PPDM and NetWorker. Special Note : The tool automates remediation steps for all internal components. Following remediation, validation checks are also run. Advice from Apache regarding CVE-2021-45105 continues to evolve, with new vulnerabilities being assigned new CVE reference id's. As these new CVEs are discovered, Dell Technologies' Engineering teams will clarify impact and remediation steps where necessary. When these are available, this tool will be updated to include these new steps ------------------------------------------------- 2021-12-23 20:54:22,403 [INFO] Starting Build : 5.0 2021-12-23 20:54:22,403 [INFO] Using ACM IP as : 10.10.10.99. If you would like to use a different IP, then use the -a flag and specify a different host IP or DNS name Enter the ACM Password : Are you using a common password(for all point products) which is same as ACM ? Enter 'y' or 'n' :
2021-12-23 20:54:34,972 [INFO] /////////////////////////////////////////////////////// 2021-12-23 20:54:34,972 [INFO] /// Main Menu /// 2021-12-23 20:54:34,972 [INFO] /////////////////////////////////////////////////////// 2021-12-23 20:54:34,972 [INFO] ------------------------------------------------- Select how would you like to proceed : 1) Apply workaround for PowerProtect DP Series Appliance/IDPA [All components] 2) Apply workaround for vCenter 3) Apply workaround for Data Domain 4) Apply workaround for Avamar 5) Apply workaround for DPSearch 6) Apply workaround for ACM 7) Apply workaround for DPC 9) Exit the Program Enter your choice number :
Are you ready to disable the DD UI? If you say yes then you will see another prompt to either disable the UI completely or allow certain users to have access. Enter 'y/Yes/YES' or 'n/No/NO':Yes
Are you ready to disable the DD UI? If you say yes then you will see another prompt to either disable the UI completely or allow certain users to have access. Enter 'y/Yes/YES' or 'n/No/NO':y Would you like to disable the UI completely? Enter 'y' or 'n':n 2021-12-23 21:15:48,365 [INFO] Disabling GUI http and https access - User based Enter the list of hostnames or IP-addresses that you would like to give access to(comman-seperated)(eg: 10.118.162.70,10.118.161.130) :
2021-12-23 20:58:56,722 [INFO] /////////////////////////////////////////////////////// 2021-12-23 20:58:56,722 [INFO] // Performing Data Domain Patching // 2021-12-23 20:58:56,722 [INFO] /////////////////////////////////////////////////////// 2021-12-23 20:58:56,722 [INFO] ------------------------------------------------------ 2021-12-23 20:58:56,722 [INFO] Working on Data Domain Host : 10.60.9.51 for patching 2021-12-23 20:58:56,722 [INFO] ------------------------------------------------------ 2021-12-23 20:58:57,266 [INFO] Found DD version as : 7.6.0.20-689174 2021-12-23 20:58:57,266 [INFO] This version of Data Domain patching involves disabling the UI. Are you ready to disable the DD UI? If you say yes then you will see another prompt to either disable the UI completely or allow certain users to have access. Enter 'y/Yes/YES' or 'n/No/NO':y Would you like to disable the UI completely? Enter 'y' or 'n':y 2021-12-23 21:02:04,087 [INFO] Disabling GUI http and https access - Completely 2021-12-23 21:02:05,919 [INFO] HTTP Access: disabled 2021-12-23 21:02:05,920 [INFO] GUI http access has been disabled 2021-12-23 21:02:08,507 [INFO] HTTPS Access: disabled 2021-12-23 21:02:08,507 [INFO] GUI https access has been disabled 2021-12-23 21:02:08,509 [INFO] Data Domain patching completed
2021-12-23 21:03:23,782 [INFO] /////////////////////////////////////////////////////// 2021-12-23 21:03:23,782 [INFO] // OVERALL STATUS // 2021-12-23 21:03:23,782 [INFO] /////////////////////////////////////////////////////// 2021-12-23 21:03:23,782 [INFO] OVERALL STATUS +---------------------+-------------------------------------------+ | Product | Patching Status | +---------------------+-------------------------------------------+ | Data Domain | COMPLETED | | ACM | COMPLETED | | DPSearch_X.X.X.X | COMPLETED | | DPCentral | COMPLETED | | DPA | NOT_CONFIGURED_IN_IDPA | | Avamar | SKIPPED/NOT REQUIRED/VERIFICATION SUCCESS | | vCenter | SKIPPED/NOT REQUIRED/VERIFICATION SUCCESS | +---------------------+-------------------------------------------+
Subcomponent: Cloud Disaster Recovery
Note: Cloud Disaster Recovery (CDR) within PowerProtect DP Series Appliance/IDPA version 2.7.0 is vulnerable to this CVE-2021-44228 and CVE-2021-45046.
CDR versions 19.5 and below (IDPA versions 2.6 and below) are not vulnerable and this Knowledge Base article section does not apply to customers on those versions.
For CDRA – On premise virtual machine
#! /bin/sh cdr_backup() { mkdir -p /tmp/cdr_backup cp /home/cdr/cdra/lib/cdra_main.jar /tmp/cdr_backup/cdra_main.jar.bak cp /home/cdr/cdra/resources/restore/restore_vm.jar /tmp/cdr_backup/restore_vm.jar.bak } update_executable() { echo "Updating CDRA executable." sed -i 's/=CDRS/=CDRS -Dlog4j2.formatMsgNoLookups=true/g' /home/cdr/cdra/executable } update_restore_vm() { echo "Updating restore_vm.jar." cd /home/cdr/cdra/resources/restore zip -q -d restore_vm.jar org/apache/logging/log4j/core/lookup/JndiLookup.class zip -q -d restore_vm.jar shadow/org/apache/logging/log4j/core/lookup/JndiLookup.class } update_cdra_main() { echo "Updating cdra_main.jar." LOG4J_JAR_FILE_LOCATION=BOOT-INF/lib/log4j-core-2.13.2.jar echo "Stopping CDR service." sudo service cdra stop cd /home/cdr/cdra/lib/ mkdir -p BOOT-INF/lib unzip -p cdra_main.jar $LOG4J_JAR_FILE_LOCATION > $LOG4J_JAR_FILE_LOCATION zip -q -d $LOG4J_JAR_FILE_LOCATION org/apache/logging/log4j/core/lookup/JndiLookup.class zip -u -0 -n *.jar cdra_main.jar $LOG4J_JAR_FILE_LOCATION rm -rf BOOT-INF echo "Starting CDR service. This may take a few minutes." sudo service cdra start for i in {1..10} do sleep 30 echo "Checking CDR service status..." RESP_CODE=$(curl -kfsL -o /dev/null -w '%{http_code}' -X GET https://localhost/rest/cdr-version -H "accept: application/json") if [[ "$RESP_CODE" == 200 ]]; then echo "CDR service started successfully." return 0 fi done echo "Failed to run CDR service. Please contact Dell Support." exit 1 } main() { CDR_VER=$(curl -s -X GET https://localhost/rest/cdr-version -H "accept: application/json" -k) echo "CDR version is : $CDR_VER" if [[ $CDR_VER =~ 19\.[6-9] ]]; then cdr_backup update_executable update_restore_vm update_cdra_main else echo "log4j workaround is required only for CDR versions between 19.6 and 19.9." exit 0 fi rm -rf /tmp/cdr_backup } main
For CDRS – Deployed on cloud (AWS/AZURE/AWS GOV/AZURE GOV)
Cloud Director Data Protection Extension (if configured) is still vulnerable and the workaround steps mentioned in KB 194480 can be applied to Data Protection Extension components prior to version 19.4.
For 19.4 vCloud Director Data Protection Extension, we recommend applying the 19.4.0.214_HF.5 hotfix as described in the Remediation section. Patch details can be found on KB 194480.
If you implement the workaround steps described in this section, and then upgrade the Data Protection Extension to a non-remediated version, then you must re-implement the workaround steps.