CVE-2021-44228

CVSS 3.1 Score 10.0 of 10 (high)

Details

Published Dec 10, 2021
Updated: Nov 7, 2023
CWE ID 400
CWE ID 20
CWE ID 917
CWE ID 502

Summary

CVE-2021-44228, also known as Log4Shell, is a critical vulnerability that affects Apache Log4j2 versions 2.0-beta9 through 2.15.0. This vulnerability allows attackers to execute arbitrary code when they can control log messages or log message parameters and message lookup substitution is enabled. The vulnerability is specific to log4j-core and does not impact other Apache Logging Services projects. The remediation for this vulnerability is to upgrade to version 2.16.0 or later, as this functionality has been completely removed in those versions. The potential danger of this vulnerability is high, as it has a base severity rating of CRITICAL with a base score of 10.0 out of 10.0 according to NIST's Common Vulnerability Scoring System (CVSS). It has the potential to lead to complete confidentiality and integrity impact, posing a significant risk to organizations using affected versions of Log4j2.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2021-44228 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions