Skip to main content

Log4j Vulnerability - Please Post All Questions Here


Show first post

344 replies

Forum|alt.badge.img
  • Vaulter
  • 1 reply
  • December 16, 2021
Jeremy Fisher wrote:

I received the Log4JAffectedServers.xml file from CV Support.  Does Anyone have instructions as to How to Run the Report to see what servers are Vulnerable in my Environment?  The XML report is Located here: https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789

  1. Log into the Command Center

  2. From the navigation pane, click Reports.

    The Reports page appears.

  3. At the top of the page, click Actions > Import report.

  4. Specify the location where the report XML file is saved, and then click Open.

    The report template appears in the list on the Reports tab and is deployed to the Reports page.


Forum|alt.badge.img+11
  • Vaulter
  • 135 replies
  • December 16, 2021
Jeremy Fisher wrote:

I received the Log4JAffectedServers.xml file from CV Support.  Does Anyone have instructions as to How to Run the Report to see what servers are Vulnerable in my Environment?  The XML report is Located here: https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789

Hi @Jeremy Fisher 

 

You should be able to import this report into your webconsole with the import option:

https://documentation.commvault.com/11.25/essential/97429_importing_report_templates.html

 

Thank you


Forum|alt.badge.img+12
  • Byte
  • 108 replies
  • December 16, 2021

What specifically does this report check? Are only the specified agents and features enabled, or log4j v2.x or both?


Forum|alt.badge.img+6
  • Commvault Certified Expert
  • 40 replies
  • December 16, 2021

@Stuart Painter@Jordan

i Just noticed that there is another fix been released and the documentation is been updated.. Can there please send out a notification to all customers to aware that the earlier provided fix isn’t enough..

https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html


HenkFikke01
Commvault Certified Expert
Forum|alt.badge.img
  • Commvault Certified Expert
  • 1 reply
  • December 16, 2021

Hi all,

One of my customers has tried to install the 4552 update but got a message on 4553: “None of the updates are applicable for the packages installed on the machine”. Since he was installing this on a Commserve/MediaAgent/VSA combination machine I suspect that indeed the 4553 is not necessary, but am I right here?

Thansk in advance for your answers!


Forum|alt.badge.img+7
  • Byte
  • 27 replies
  • December 16, 2021

Hi,

Once the hotfix has been copied to cache all clients in Commcell Console are showing as “Needs Update” and not just clients with the SQL agent installed. 

Most show the “File System Core” as the package that requires an update (SP24-HotFix-4552)

For Hyperscale it is showing as “Base0 Module” package requiring updates (SP24-HotFix-4383,  SP24-HotFix-4413, SP24-HotFix-4485 and SP24-HotFix-4551).

Is this expected behaviour and is it best to run an “Update Sofwtare” for all clients and not just the for the clients with agents listed in the “affected” section of this KB?

Thanks


Forum|alt.badge.img+5
  • Byte
  • 13 replies
  • December 16, 2021

Hello guys,

newest info is that 11.25 Log4J Fix is deprecated (please use SP16 Log4J-2.16 Fix). This is probably based on the news that log4j 2.15 is vulnerable after all. We have, however, updated *a lot* of customers in the last days with the former fix. What does it mean? Is the now deprecated fix to be replaced with the “2.16” version, as it does not help to fix the vulnerablility?

If so, can the new one be installed right over the 1st fix? There’s no mentioning in BOL.

Thanks.


Forum|alt.badge.img+6
  • Commvault Certified Expert
  • 40 replies
  • December 16, 2021
HenkFikke01 wrote:

Hi all,

One of my customers has tried to install the 4552 update but got a message on 4553: “None of the updates are applicable for the packages installed on the machine”. Since he was installing this on a Commserve/MediaAgent/VSA combination machine I suspect that indeed the 4553 is not necessary, but am I right here?

Thansk in advance for your answers!

the 4553 and the updated version 4564 (regarding 2.16) is for specific agents


Forum|alt.badge.img+15

Hi @0ber0n 

The report Log4J affected servers report checks affected clients/agents and displays their update status for log4j updates in a report format, so you can check your environment status in one simple location.

Thanks,

Stuart


Forum|alt.badge.img+15
M Scheepers wrote:

@Stuart Painter@Jordan

i Just noticed that there is another fix been released and the documentation is been updated.. Can there please send out a notification to all customers to aware that the earlier provided fix isn’t enough..

https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html

HI @M Scheepers 

Yes, this is the latest information that highlights the need to update to log4j 2.16 to resolve both CVE-2021-44228 and CVE-2021-45046.

Everyone here at Commvault is working extremely hard to get both the hotfixes and messaging out to customers - this Community and Documentation pages are just some of the ways we’re publishing these resources. There are and will be more communications issued through various channels to ensure everyone is well informed.

Thanks,

Stuart


Forum|alt.badge.img+15
HenkFikke01 wrote:

Hi all,

One of my customers has tried to install the 4552 update but got a message on 4553: “None of the updates are applicable for the packages installed on the machine”. Since he was installing this on a Commserve/MediaAgent/VSA combination machine I suspect that indeed the 4553 is not necessary, but am I right here?

Thansk in advance for your answers!

Hi @HenkFikke01 

You are correct, not all the hotfixes are applicable to all servers as not all servers will have affected packages.

Take a look at the Log4J affected servers report to help identify affected servers in your environment, as a reminder:

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

Thanks,

Stuart


Forum|alt.badge.img

If the Log4j Report shows none of your clients are affected , So do we still have to upgrade to the latest hotfix and log4j fix.. 


Forum|alt.badge.img

Hi all,

Would anyone be able to confirm if ii am correct in saying, if i do not have the below option enabled on my SQL server agents i do not have to apply the Log4j fix?  

Thanks in advance

 

 


Forum|alt.badge.img+15
Tom Evans wrote:

Hi,

Once the hotfix has been copied to cache all clients in Commcell Console are showing as “Needs Update” and not just clients with the SQL agent installed. 

Most show the “File System Core” as the package that requires an update (SP24-HotFix-4552)

For Hyperscale it is showing as “Base0 Module” package requiring updates (SP24-HotFix-4383,  SP24-HotFix-4413, SP24-HotFix-4485 and SP24-HotFix-4551).

Is this expected behaviour and is it best to run an “Update Sofwtare” for all clients and not just the for the clients with agents listed in the “affected” section of this KB?

Thanks

Hi @Tom Evans 

Running updates to all clients certainly won’t hurt, different hotfixes will apply different clients and packages.

Take a look at the Log4J affected servers report to help identify affected servers in your environment, as a reminder:

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

So, for these affected clients, there is an update to FileSystemCore package to remove log4j binaries as part of the update.

Thanks,

Stuart


Forum|alt.badge.img+15
Ingo Maus wrote:

Hello guys,

newest info is that 11.25 Log4J Fix is deprecated (please use SP16 Log4J-2.16 Fix). This is probably based on the news that log4j 2.15 is vulnerable after all. We have, however, updated *a lot* of customers in the last days with the former fix. What does it mean? Is the now deprecated fix to be replaced with the “2.16” version, as it does not help to fix the vulnerablility?

If so, can the new one be installed right over the 1st fix? There’s no mentioning in BOL.

Thanks.

Hi @Ingo Maus 

The Security and Vulnerability Reporting page has the latest info:

https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html

With log4j 2.15 fixes now superseded by log4j 2.16 fixes.

So if you have already applied the initial hotfixes updating to log4j 2.15, you can go ahead and then install these later log4j 2.16 fixes over the top.

If you have not yet applied any hotfixes, please go straight for the log4j 2.16 fixes.

Thanks,

Stuart


Forum|alt.badge.img+15
chandrashekar wrote:

If the Log4j Report shows none of your clients are affected , So do we still have to upgrade to the latest hotfix and log4j fix.. 

Hi @chandrashekar 

Commvault has responded to the log4j vulnerability by providing these hotfixes, report and this guidance to enable you to make your own decisions for your environment. 

These hotfixes have been provided “out of band” for our customers to install and resolve these vulnerabilities immediately and they will also be rolled up into an MR release.

These Maintenance Releases are provided to ensure you have the latest fixes for Commvault and so by keeping up to date and installing MR packs, you will still benefit from these fixes, but after some time.

Best advice as of now is to update to the minimum version and log4j 2.16 hotfixes for any clients that may be at risk from this vulnerability.

Thanks,

Stuart


Forum|alt.badge.img+15

Hi @JustinWilloughby 

Commvault has responded to the log4j vulnerability by providing these hotfixes, report and this guidance to enable you to make your own decisions for your environment. 

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

These hotfixes have been provided “out of band” for our customers to install and resolve these vulnerabilities immediately and they will also be rolled up into an MR release.

These Maintenance Releases are provided to ensure you have the latest fixes for Commvault and so by keeping up to date and installing MR packs, you will still benefit from these fixes, but after some time.

Best advice as of now is to update to the minimum version and log4j 2.16 hotfixes for any clients that may be at risk from this vulnerability.

Thanks,

Stuart


Forum|alt.badge.img

Do we have to update commserve, media agents ,fre servers with  Log4j hotfix  SP16 Log4J-2.16 Fix .. or only clients which are having sql,oracle agents and  which are affected should be updated ..

 


Forum|alt.badge.img+15
chandrashekar wrote:

Do we have to update commserve, media agents ,fre servers with  Log4j hotfix  SP16 Log4J-2.16 Fix .. or only clients which are having sql,oracle agents and  which are affected should be updated ..

 

Hi @chandrashekar 

Please take a look at the guidance in the sticky post at the top of the page, this is being updated regularly, with more questions coming in, we’re updating the page and this now includes an FAQ section that will get added to over time - please do check back regularly.

Take a look at the Log4J affected servers report to help identify affected servers in your environment, as a reminder:

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

Thanks,

Stuart


Forum|alt.badge.img
Stuart Painter wrote:

Hi @JustinWilloughby 

Commvault has responded to the log4j vulnerability by providing these hotfixes, report and this guidance to enable you to make your own decisions for your environment. 

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

These hotfixes have been provided “out of band” for our customers to install and resolve these vulnerabilities immediately and they will also be rolled up into an MR release.

These Maintenance Releases are provided to ensure you have the latest fixes for Commvault and so by keeping up to date and installing MR packs, you will still benefit from these fixes, but after some time.

Best advice as of now is to update to the minimum version and log4j 2.16 hotfixes for any clients that may be at risk from this vulnerability.

Thanks,

Stuart

Thanks Stuart, 

We do not run Cloud Apps, Oracle Agents.we so have SQL agents but they do not do these tasks below

Microsoft SQL Server agent - Database archiving, data masking, and table level restore

as show from one of the client default subclients

So with this in mind would you say im ok not applying the fix.?

 


Forum|alt.badge.img+15
JustinWilloughby wrote:

Thanks Stuart, 

We do not run Cloud Apps, Oracle Agents.we so have SQL agents but they do not do these tasks below

Microsoft SQL Server agent - Database archiving, data masking, and table level restore

as show from one of the client default subclients

So with this in mind would you say im ok not applying the fix.?

 

Hi @JustinWilloughby 

Let’s take the SQL agent as an example as you mention you have some SQL clients.

The vulnerable log4j 2.x binaries may not be used by SQL agent unless the highlighted features are are actually configured and used.

However, these vulnerable binaries may still be found on the client systems and still represent some risk of exposure, perhaps a lower risk as they may not be used, but some risk nonetheless.

So, our best advice right now to apply the minimum versions stated in the guidance above and the hotfixes provided to ensure your environment is protected.

Thanks,

Stuart


Forum|alt.badge.img+2
  • Byte
  • 7 replies
  • December 16, 2021

I do see Commvault has updated Security Vulnerability and Reporting (commvault.com) to include a new Log4J-2.16 Fix.  Are there any instructions on if you have the previous Log4J Fix already installed?  I.E.  Can you just add the new one to the cache and install over the old one?  Or do you have to somehow remove the old first?


Forum|alt.badge.img+15
Dave S wrote:

I do see Commvault has updated Security Vulnerability and Reporting (commvault.com) to include a new Log4J-2.16 Fix.  Are there any instructions on if you have the previous Log4J Fix already installed?  I.E.  Can you just add the new one to the cache and install over the old one?  Or do you have to somehow remove the old first?

Hi @Dave S 

Yes, you can import the new fixes and deploy these over the top of the previous ones - no need for uninstall.

Likewise if you have any clients that didn’t get the previous hotfixes, you can jump straight to the latest ones.

Thanks,

Stuart


Henke
Byte
Forum|alt.badge.img+13
  • Byte
  • 125 replies
  • December 16, 2021

Is there way to determen if the Log4J-2.16 is in the cache? What HotFix numbers should I see?

//Henke


Henke
Byte
Forum|alt.badge.img+13
  • Byte
  • 125 replies
  • December 16, 2021

I downloaded the report showing what servers may be effected by Log4j, but the result isn’t what I expected.

Is there no result in the report immediately once installed to the webconsole?

//Henke


Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings