Lucene search

K
ciscoCiscoCISCO-SA-APACHE-LOG4J-QRUKNEBD
HistoryDec 10, 2021 - 6:45 p.m.

Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021

2021-12-1018:45:00
tools.cisco.com
99

0.976 High

EPSS

Percentile

100.0%

Critical Vulnerabilities in Apache Log4j Java Logging Library

On December 9, 2021, the following critical vulnerability in the Apache Log4j Java logging library affecting all Log4j2 versions earlier than 2.15.0 was disclosed:

CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints

On December 14, 2021, the following critical vulnerability, which affects certain Apache Log4j use cases in versions 2.15.0 and earlier, was disclosed:

CVE-2021-45046: Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack

On December 18, 2021, a vulnerability in the Apache Log4j component affecting versions 2.16 and earlier was disclosed:

CVE-2021-45105: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation

On December 28, 2021, a vulnerability in the Apache Log4j component affecting versions 2.17 and earlier was disclosed:

CVE-2021-44832: Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration

For a description of these vulnerabilities, see the Apache Log4j Security Vulnerabilities [“https://logging.apache.org/log4j/2.x/security.html”] page.

Cisco’s Response to These Vulnerabilities

Cisco assessed all products and services for impact from both CVE-2021-44228 and CVE-2021-45046. To help detect exploitation of these vulnerabilities, Cisco has released Snort rules at the following location: Talos Rules 2021-12-21 [“https://www.snort.org/advisories/talos-rules-2021-12-21”]

Product fixes that are listed in this advisory will address both CVE-2021-44228 and CVE-2021-45046 unless otherwise noted.

Cisco has reviewed CVE-2021-45105 and CVE-2021-44832 and has determined that no Cisco products or cloud offerings are impacted by these vulnerabilities.

Cisco’s standard practice is to update integrated third-party software components to later versions as they become available.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd”]