Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Profitez de récompenses et de remises réservées aux membres
  • Créez et accédez à une liste de vos produits

DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability

Résumé: Dell is assessing the Apache Log4j library vulnerabilities and releasing remediations as they become available.

Cet article concerne   Cet article ne concerne pas 

Type d’article de sécurité

Security KB

Identifiant CVE

CVE-2021-44228
CVE-2021-45046

Résumé des problèmes

Apache Publication: Apache Log4j Remote Code Execution
CVE Details: CVE-2021-44228
CVE Details: CVE-2021-45046

Détails

Dell is reviewing the Apache Log4j Remote Code Execution vulnerabilities tracked in CVE-2021-44228 and CVE-2021-45046 and assessing impact to our products. The security of our products is a top priority and critical to protecting our customers.

For a full list of Dell products, their impact and remediations, please review the Apache Log4j Knowledge Base Article. We will continuously update this document with the latest information.

For frequently asked questions about Apache Log4j, please review Additional Information for Apache Log4j Remote Code Execution Vulnerability.

For customers of VMware solutions, please review the VMware security advisory regarding impact to their solutions and services: VMSA-2021-0028.

Additional security updates or mitigations will be communicated at https://www.dell.com/support/security as they become available. You can subscribe to our Security Alerts to be notified when new Security Advisories are posted by following the guidance here, or by following the directions in the Security Alerts section on the Security Advisories and Notices page.

Recommandations

Customers are encouraged to follow security best practices, including those recommended by Apache (Apache Log4j Remote Code Execution), and continue to monitor this notice for updated information as it becomes available.

Produits concernés

Product Security Information

Produits

Product Security Information