CVE-2021-44228
CVSS 3.1 Score 10.0 of 10 (high)
Details
Summary
CVE-2021-44228 is a vulnerability affecting Apache Log4j2 versions 2.0-beta9 through 2.15.0 (excluding certain security releases). The issue lies in the JNDI features used in configuration, log messages, and parameters, which fail to protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker can exploit this vulnerability by manipulating log messages or log message parameters to execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. Starting from version 2.15.0, this behavior has been disabled by default, while versions 2.16.0 and earlier (along with 2.12.2, 2.12.3, and 2.3.1) have completely removed this functionality. This vulnerability only impacts the log4j-core project and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- Apple Xcode
- Cisco UCS Central Software
- Cisco Unified Communications Manager
- Cisco Firepower Threat Defense
- Debian
Affected Vendors
- Debian
- Apple
- Fedora Project
- Cisco Systems Inc
- Siemens AG
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions