メインコンテンツまでスキップ

SnapCenter サーバで CVE-2021-44228 の脆弱性が報告されます

Views:
18
Visibility:
Public
Votes:
0
Category:
snapcenter
Specialty:
snapx
Last Updated:

環境

SnapCenter Server

問題

セキュリティスキャンにより、 SnapCenter サーバー (Windows ) に重大な脆弱性が報告されます。

 Plugin id: 156002 Plugin Name: Apache Log4j < 2.15.0 Remote Code Execution Severity: critical Plugin Text: "<plugin_output> Path : C:\Program Files\NetApp\SnapCenter\SnapCenter Plugin for VMware\lib\log4j-1.2.17.jar Installed version : 1.2.17 Fixed version : 2.15.0 </plugin_output>" Description: "The version of Apache Log4j on the remote host is < 2.15.0. It is, therefore, affected by a remote code execution vulnerability in the JDNI parser due to improper log validation. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number." Solution: Upgrade to Apache Log4j version 2.15.0 or later, or apply the vendor mitigation. CVE: CVE-2021-44228 CVSSv3 Score: 10 

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

Scan to view the article on your device