Loading HuntDB...

CVE-2021-44228

UNKNOWN
Published 2021-12-10T00:00:00.000Z
Actions:

CVSS Score

V3.1
10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2023.03.01
0.972
probability
of exploitation in the wild

There is a 97.2% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-01-25
Exploit Probability
Percentile: 0.999
Higher than 99.9% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Available Exploits

Apache Log4j2 - Remote Code Injection

Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.

ID: CVE-2021-45046-DAST
Author: princechaddha Critical

Apache Log4j2 Remote Code Injection

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: CVE-2021-44228
Author: melbadry9dhiyaneshDKdaffainfoanon-artist0xcebaTeaj4vaovo Critical

Apache Log4j2 - Remote Code Injection

Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.

ID: CVE-2021-45046
Author: ImNightmaree Critical

Apache OFBiz - JNDI Remote Code Execution (Apache Log4j)

Apache OFBiz is affected by a remote code execution vulnerability in the bundled Apache Log4j logging library. Apache Log4j is vulnerable due to insufficient protections on message lookup substitutions when dealing with user controlled input. A remote, unauthenticated attacker can exploit this, via a web request, to execute arbitrary code with the permission level of the running Java process.

ID: apache-ofbiz-log4j-rce
Author: pdteam Critical

Apache Solr 7+ - Remote Code Execution (Apache Log4j)

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. This vulnerability affects Solr 7+.

ID: apache-solr-log4j-rce
Author: EvanRubinsteinnvn1729j4vaovo Critical

JamF Pro - Remote Code Execution (Apache Log4j)

JamF is susceptible to Lof4j JNDI remote code execution. JamF is the industry standard when it comes to the management of iOS devices (iPhones and iPads), macOS computers (MacBooks, iMacs, etc.), and tvOS devices (Apple TV).

ID: jamf-pro-log4j-rce
Author: DhiyaneshDKpdteam Critical

Cisco CloudCenter Suite (Log4j) - Remote Code Execution

Cisco CloudCenter Suite is susceptible to remote code execution via the Apache Log4j library. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: cisco-cloudcenter-suite-log4j-rce
Author: pwnhxl Critical

Cisco Unified Communications - Remote Code Execution (Apache Log4j)

Cisco Unified Communications is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: cisco-unified-communications-log4j
Author: DhiyaneshDK Critical

Cisco vManage (Log4j) - Remote Code Execution

Cisco vManage is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. More information is available in the cisco-sa-apache-log4j-qRuKNEbd advisory.

ID: cisco-vmanage-log4j
Author: DhiyaneshDK Critical

Apache Code42 - Remote Code Execution (Apache Log4j)

Multiple Code42 components are impacted by the logj4 vulnerability. Affected Code42 components include: - Code42 cloud: Updated Log4j from 2.15.0 to 2.17.1 on January 26, 2022 - Code42 app for Incydr Basic and Advanced and CrashPlan Cloud product plans: Updated Log4j from 2.16.0 to 2.17.1 on January 18, 2022 - Code42 User Directory Sync (UDS): Updated Log4j from 2.15.0 to 2.17.1 on February 2, 2022 - On-premises Code42 server: Mitigated from Log4j vulnerabilities by following these steps - On-premises Code42 app: Updated to Log4j 2.16 on December 17, 2021

ID: code42-log4j-rce
Author: AdamCrosser Critical

JamF (Log4j) - Remote Code Execution

JamF is susceptible to remote code execution via the Apache log4j library. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

ID: jamf-log4j-jndi-rce
Author: pdteam Critical

Ivanti MobileIron (Log4j) - Remote Code Execution

Ivanti MobileIron is susceptible to remote code execution via the Apache Log4j2 library. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: mobileiron-log4j-jndi-rce
Author: meme-lord Critical

Elasticsearch 5 - Remote Code Execution (Apache Log4j)

Elasticsearch 5 is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: elasticsearch5-log4j-rce
Author: akincibor Critical

GoAnywhere Managed File Transfer - Remote Code Execution (Apache Log4j)

GoAnywhere Managed File Transfer is vulnerable to a remote command execution (RCE) issue via the included Apache Log4j.

ID: goanywhere-mft-log4j-rce
Author: pussycat0x Critical

Graylog (Log4j) - Remote Code Execution

Graylog is susceptible to remote code execution via the Apache Log4j 2 library prior to 2.15.0 by recording its own log information, specifically with specially crafted values sent as user input. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: graylog-log4j
Author: DhiyaneshDK Critical

Metabase - Remote Code Execution (Apache Log4j)

Metabase is susceptible to remote code execution due to an incomplete patch in Apache Log4j 2.15.0 in certain non-default configurations. A remote attacker can pass malicious data and perform a denial of service attack, exfiltrate data, or execute arbitrary code.

ID: metabase-log4j
Author: DhiyaneshDK Critical

OpenNMS - JNDI Remote Code Execution (Apache Log4j)

OpenNMS JNDI is susceptible to remote code execution via Apache Log4j 2.14.1 and before. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: opennms-log4j-jndi-rce
Author: johnk3r Critical

Rundeck - Remote Code Execution (Apache Log4j)

Rundeck is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: rundeck-log4j
Author: DhiyaneshDK Critical

Seeyon OA (Log4j) - Remote Code Execution

Seeyon OA is susceptible to remote code execution via the Apache Log4j 2 library prior to 2.15.0 by recording its own log information, specifically with specially crafted values sent as user input. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

ID: seeyon-oa-log4j
Author: SleepingBag945 Critical

UniFi Network Application - Remote Code Execution (Apache Log4j)

UniFi Network Application is susceptible to a critical vulnerability in Apache Log4j (CVE-2021-44228) that may allow for remote code execution in an impacted implementation.

ID: unifi-network-log4j-rce
Author: KrE80r Critical

VMware Site Recovery Manager - Remote Code Execution (Apache Log4j)

VMware Site Recovery Manager is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-siterecovery-log4j-rce
Author: akincibor Critical

Spring Boot - Remote Code Execution (Apache Log4j)

Spring Boot is susceptible to remote code execution via Apache Log4j.

ID: springboot-log4j-rce
Author: pdteam Critical

VMware HCX - Remote Code Execution (Apache Log4j)

VMware HCX is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-hcx-log4j
Author: pussycat0xDhiyaneshDK Critical

VMware Horizon - JNDI Remote Code Execution (Apache Log4j)

VMware Horizon is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-horizon-log4j-jndi-rce
Author: johnk3r Critical

VMware NSX - Remote Code Execution (Apache Log4j)

VMware NSX is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-nsx-log4j
Author: DhiyaneshDK Critical

VMware Operations Manager - Remote Code Execution (Apache Log4j)

VMware Operations Manager is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-operation-manager-log4j
Author: DhiyaneshDK Critical

VMware VCenter - Remote Code Execution (Apache Log4j)

VMware VCenter is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

ID: vmware-vcenter-log4j-jndi-rce
Author: _0xf4n9x_ Critical

VMware vRealize Operations Tenant - JNDI Remote Code Execution (Apache Log4j)

VMware vRealize Operations is susceptible to a critical vulnerability in Apache Log4j which may allow remote code execution in an impacted vRealize Operations Tenant application.

ID: vrealize-operations-log4j-rce
Author: bughuntersurya Critical

Related News

No news articles found for this CVE.

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

December 24, 2021

Added to KEV

December 10, 2021

Required Action

For all affected software assets for which updates exist, the only acceptable remediation actions are: 1) Apply updates; OR 2) remove affected assets from agency networks. Temporary mitigations using one of the measures provided at https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures are only acceptable until updates are available.

Affected Product

Vendor/Project: Apache
Product: Log4j2

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

References

HackerOne Reports

rhinestonecowboy
Acronis
$1000.00
Deserialization of Untrusted Data
alex_gaynor
U.S. Dept Of Defense
Use of Externally-Controlled Format String
mr_x_strange
U.S. Dept Of Defense
Code Injection
ferreiraklet_
U.S. Dept Of Defense
$1000.00
Command Injection - Generic
bhishma14
Judge.me
$50.00
Code Injection
alex_gaynor
U.S. Dept Of Defense
Use of Externally-Controlled Format String
Published: 2021-12-10T00:00:00.000Z
Last Modified: 2025-02-04T14:25:37.215Z
Copied to clipboard!