跳转到主内容
NetApp Response to Russia-Ukraine Cyber Threat
In response to the recent rise in cyber threat due to the Russian-Ukraine crisis, NetApp is actively monitoring the global security intelligence and updating our cybersecurity measures. We follow U.S. Federal Government guidance and remain on high alert. Customers are encouraged to monitor the Cybersecurity and Infrastructure Security (CISA) website for new information as it develops and remain on high alert.

SnapCenter 服务器上报告了 CVE-2021-44228 漏洞

Views:
1
Visibility:
Public
Votes:
0
Category:
snapcenter
Specialty:
snapx
Last Updated:

适用场景

SnapCenter 服务器

问题描述

安全扫描报告 SnapCenter 服务器( Windows )上的严重漏洞

 Plugin id: 156002 Plugin Name: Apache Log4j < 2.15.0 Remote Code Execution Severity: critical Plugin Text: "<plugin_output> Path : C:\Program Files\NetApp\SnapCenter\SnapCenter Plugin for VMware\lib\log4j-1.2.17.jar Installed version : 1.2.17 Fixed version : 2.15.0 </plugin_output>" Description: "The version of Apache Log4j on the remote host is < 2.15.0. It is, therefore, affected by a remote code execution vulnerability in the JDNI parser due to improper log validation. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number." Solution: Upgrade to Apache Log4j version 2.15.0 or later, or apply the vendor mitigation. CVE: CVE-2021-44228 CVSSv3 Score: 10 

 

Scan to view the article on your device
CUSTOMER EXCLUSIVE CONTENT

Registered NetApp customers get unlimited access to our dynamic Knowledge Base.

New authoritative content is published and updated each day by our team of experts.

Current Customer or Partner?

Sign In for unlimited access

New to NetApp?

Learn more about our award-winning Support