Loading HuntDB...

CVE-2021-44228

UNKNOWN
Published 2021-12-10T00:00:00.000Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2021-44228. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.945
probability
of exploitation in the wild

There is a 94.5% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 1.000
Higher than 100.0% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Available Exploits

Apache Log4j2 - Remote Code Injection

Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.

ID: CVE-2021-45046-DAST
Author: princechaddha Critical

Apache Log4j2 Remote Code Injection

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: CVE-2021-44228
Author: melbadry9dhiyaneshDKdaffainfoanon-artist0xcebaTeaj4vaovo Critical

Apache Log4j2 - Remote Code Injection

Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.

ID: CVE-2021-45046
Author: ImNightmaree Critical

Apache OFBiz - JNDI Remote Code Execution (Apache Log4j)

Apache OFBiz is affected by a remote code execution vulnerability in the bundled Apache Log4j logging library. Apache Log4j is vulnerable due to insufficient protections on message lookup substitutions when dealing with user controlled input. A remote, unauthenticated attacker can exploit this, via a web request, to execute arbitrary code with the permission level of the running Java process.

ID: apache-ofbiz-log4j-rce
Author: pdteam Critical

Apache Solr 7+ - Remote Code Execution (Apache Log4j)

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. This vulnerability affects Solr 7+.

ID: apache-solr-log4j-rce
Author: EvanRubinsteinnvn1729j4vaovo Critical

JamF Pro - Remote Code Execution (Apache Log4j)

JamF is susceptible to Lof4j JNDI remote code execution. JamF is the industry standard when it comes to the management of iOS devices (iPhones and iPads), macOS computers (MacBooks, iMacs, etc.), and tvOS devices (Apple TV).

ID: jamf-pro-log4j-rce
Author: DhiyaneshDKpdteam Critical

Cisco CloudCenter Suite (Log4j) - Remote Code Execution

Cisco CloudCenter Suite is susceptible to remote code execution via the Apache Log4j library. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: cisco-cloudcenter-suite-log4j-rce
Author: pwnhxl Critical

Cisco Unified Communications - Remote Code Execution (Apache Log4j)

Cisco Unified Communications is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: cisco-unified-communications-log4j
Author: DhiyaneshDK Critical

Cisco vManage (Log4j) - Remote Code Execution

Cisco vManage is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. More information is available in the cisco-sa-apache-log4j-qRuKNEbd advisory.

ID: cisco-vmanage-log4j
Author: DhiyaneshDK Critical

Apache Code42 - Remote Code Execution (Apache Log4j)

Multiple Code42 components are impacted by the logj4 vulnerability. Affected Code42 components include: - Code42 cloud: Updated Log4j from 2.15.0 to 2.17.1 on January 26, 2022 - Code42 app for Incydr Basic and Advanced and CrashPlan Cloud product plans: Updated Log4j from 2.16.0 to 2.17.1 on January 18, 2022 - Code42 User Directory Sync (UDS): Updated Log4j from 2.15.0 to 2.17.1 on February 2, 2022 - On-premises Code42 server: Mitigated from Log4j vulnerabilities by following these steps - On-premises Code42 app: Updated to Log4j 2.16 on December 17, 2021

ID: code42-log4j-rce
Author: AdamCrosser Critical

JamF (Log4j) - Remote Code Execution

JamF is susceptible to remote code execution via the Apache log4j library. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

ID: jamf-log4j-jndi-rce
Author: pdteam Critical

Ivanti MobileIron (Log4j) - Remote Code Execution

Ivanti MobileIron is susceptible to remote code execution via the Apache Log4j2 library. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: mobileiron-log4j-jndi-rce
Author: meme-lord Critical

Elasticsearch 5 - Remote Code Execution (Apache Log4j)

Elasticsearch 5 is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: elasticsearch5-log4j-rce
Author: akincibor Critical

GoAnywhere Managed File Transfer - Remote Code Execution (Apache Log4j)

GoAnywhere Managed File Transfer is vulnerable to a remote command execution (RCE) issue via the included Apache Log4j.

ID: goanywhere-mft-log4j-rce
Author: pussycat0x Critical

Graylog (Log4j) - Remote Code Execution

Graylog is susceptible to remote code execution via the Apache Log4j 2 library prior to 2.15.0 by recording its own log information, specifically with specially crafted values sent as user input. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: graylog-log4j
Author: DhiyaneshDK Critical

Metabase - Remote Code Execution (Apache Log4j)

Metabase is susceptible to remote code execution due to an incomplete patch in Apache Log4j 2.15.0 in certain non-default configurations. A remote attacker can pass malicious data and perform a denial of service attack, exfiltrate data, or execute arbitrary code.

ID: metabase-log4j
Author: DhiyaneshDK Critical

OpenNMS - JNDI Remote Code Execution (Apache Log4j)

OpenNMS JNDI is susceptible to remote code execution via Apache Log4j 2.14.1 and before. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: opennms-log4j-jndi-rce
Author: johnk3r Critical

Rundeck - Remote Code Execution (Apache Log4j)

Rundeck is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: rundeck-log4j
Author: DhiyaneshDK Critical

Seeyon OA (Log4j) - Remote Code Execution

Seeyon OA is susceptible to remote code execution via the Apache Log4j 2 library prior to 2.15.0 by recording its own log information, specifically with specially crafted values sent as user input. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: seeyon-oa-log4j
Author: SleepingBag945 Critical

UniFi Network Application - Remote Code Execution (Apache Log4j)

UniFi Network Application is susceptible to a critical vulnerability in Apache Log4j (CVE-2021-44228) that may allow for remote code execution in an impacted implementation.

ID: unifi-network-log4j-rce
Author: KrE80r Critical

VMware Site Recovery Manager - Remote Code Execution (Apache Log4j)

VMware Site Recovery Manager is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-siterecovery-log4j-rce
Author: akincibor Critical

Spring Boot - Remote Code Execution (Apache Log4j)

Spring Boot is susceptible to remote code execution via Apache Log4j.

ID: springboot-log4j-rce
Author: pdteam Critical

VMware HCX - Remote Code Execution (Apache Log4j)

VMware HCX is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-hcx-log4j
Author: pussycat0xDhiyaneshDK Critical

VMware Horizon - JNDI Remote Code Execution (Apache Log4j)

VMware Horizon is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-horizon-log4j-jndi-rce
Author: johnk3r Critical

VMware NSX - Remote Code Execution (Apache Log4j)

VMware NSX is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-nsx-log4j
Author: DhiyaneshDK Critical

VMware Operations Manager - Remote Code Execution (Apache Log4j)

VMware Operations Manager is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-operation-manager-log4j
Author: DhiyaneshDK Critical

VMware VCenter - Remote Code Execution (Apache Log4j)

VMware VCenter is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-vcenter-log4j-jndi-rce
Author: _0xf4n9x_ Critical

VMware vRealize Operations Tenant - JNDI Remote Code Execution (Apache Log4j)

VMware vRealize Operations is susceptible to a critical vulnerability in Apache Log4j which may allow remote code execution in an impacted vRealize Operations Tenant application.

ID: vrealize-operations-log4j-rce
Author: bughuntersurya Critical

Related News

No news articles found for this CVE.

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

December 24, 2021

Added to KEV

December 10, 2021

Required Action

For all affected software assets for which updates exist, the only acceptable remediation actions are: 1) Apply updates; OR 2) remove affected assets from agency networks. Temporary mitigations using one of the measures provided at https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures are only acceptable until updates are available.

Affected Product

Vendor/Project: Apache
Product: Log4j2

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed CRITICAL

Remote code injection in Log4j

GHSA-jfh8-c2jp-5v3q

Advisory Details

# Summary Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. # Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. # Affected versions Any Log4J version prior to v2.15.0 is affected to this specific issue. The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible. ## Security releases Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3 ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Remediation Advice ## Updated advice for version 2.16.0 The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0). Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33). Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221). Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.

Affected Packages

Maven org.apache.logging.log4j:log4j-core
ECOSYSTEM: ≥2.13.0 <2.15.0
Maven org.apache.logging.log4j:log4j-core
ECOSYSTEM: ≥2.0-beta9 <2.3.1
Maven org.apache.logging.log4j:log4j-core
ECOSYSTEM: ≥2.4 <2.12.2
Maven com.guicedee.services:log4j-core
ECOSYSTEM: ≥0 ≤1.2.1.2-jre17
Maven org.xbib.elasticsearch:log4j
Maven uk.co.nichesolutions.logging.log4j:log4j-core
Maven org.ops4j.pax.logging:pax-logging-log4j2
ECOSYSTEM: ≥1.8.0 <1.9.2
Maven org.ops4j.pax.logging:pax-logging-log4j2
ECOSYSTEM: ≥1.10.0 <1.10.8
Maven org.ops4j.pax.logging:pax-logging-log4j2
ECOSYSTEM: ≥1.11.0 <1.11.10
Maven org.ops4j.pax.logging:pax-logging-log4j2
ECOSYSTEM: ≥2.0.0 <2.0.11

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

References

Advisory provided by GitHub Security Advisory Database. Published: December 10, 2021, Modified: May 9, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

3 posts
Reddit 4 weeks, 1 day ago
Immediate_Gold9789
Exploit Payload

CVE-2025-9288: Critical Flaw in Popular JavaScript Library Threatens Global Web Security By CyberDudeBivash — Global Cybersecurity, AI & Threat Intelligence Network CyberDudeBivash — Your Global Cybersecurity Shield https://preview.redd.it/dfzgg6j6fkkf1.png?width=1024&format=png&auto=webp&s=63072993316aab76cb19dad87eedf81766408bcf # Executive Summary A newly discovered vulnerability, **CVE-2025-9288**, has been disclosed in a widely used **JavaScript library** that powers thousands of enterprise …

1
1.0
View Original High Risk
Reddit 1 month ago
jsrober
Exploit

Why is my Reolink camera trying to hack my network? I spotted this today: {"timestamp":"2025-08-18T21:12:14.113458-0400","flow\_id":7696903160001,"in\_iface":"em1","event\_type":"alert","vlan":\[18\],"src\_ip":"172.18.10.50","src\_port":6974,"dest\_ip":"172.16.10.34","dest\_port":16108,"proto":"UDP","pkt\_src":"wire/pcap","alert":{"action":"allowed","gid":1,"signature\_id":2034674,"rev":3,"signature":"**ET EXPLOIT Possible Apache log4j RCE Attempt - 2021/12/12 Obfuscation Observed M2 (udp) (CVE-2021-44228)**","category":"**Attempted Administrator Privilege Gain**","severity":1,"metadata":{"attack\_ This came from a Reolink E1 Pro camera and was targeting one of my Linux systems. Is there any …

1
18
37.0
View Original High Risk
Reddit 1 month, 3 weeks ago
Prestigiouspite

Is the Composer ecosystem still healthy? 180 MB and 36,000 files for two simple packages. I just went through a fresh `composer require` for two packages: `microsoft/microsoft-graph` and `vlucas/phpdotenv`. My goal was simple: interact with the Microsoft Graph API and handle environment variables. After the installation, I was shocked to …

Also mentions: CVE-2024-3094

References

HackerOne Reports

rhinestonecowboy
Acronis
$1000.00
Deserialization of Untrusted Data
alex_gaynor
U.S. Dept Of Defense
Use of Externally-Controlled Format String
mr_x_strange
U.S. Dept Of Defense
Code Injection
ferreiraklet_
U.S. Dept Of Defense
$1000.00
Command Injection - Generic
bhishma14
Judge.me
$50.00
Code Injection
alex_gaynor
U.S. Dept Of Defense
Use of Externally-Controlled Format String
Published: 2021-12-10T00:00:00.000Z
Last Modified: 2025-07-28T19:48:17.130Z
Copied to clipboard!