10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
99.9%
IBM API Connect (APIC) has addressed the Apache Log4j vulnerability CVE-2021-44228 by updating to Apache Log4j v2.15.0 and removing the vulnerable JndiLookup class in the affected analytics and management (V5 only) server components.
CVEID:CVE-2021-44228
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker controlled LDAP and other JNDI related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system. Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
API Connect | API Connect V10.0.1.0-V10.0.3 |
API Connect | API Connect V10.0.1.1-V10.0.1.5 |
API Connect | V2018.4.1.0-2018.4.1.17 |
API Connect | IBM API Connect V5.0.0.0-5.0.8.12 |
To resolve the Apache Log4j vulnerability (CVE-2021-44228), customers need to update to the latest version recommended below.
Affected Product | Addressed in VRMF | APAR | Remediation/First Fix |
---|
IBM API Connect
V5.0.0.0-V5.0.8.12
| V5.0.8.12-ifix4| LI82440 |
Follow the link below to find the necessary upgrade details to resolve the Apache Log4j vulnerability for APIC.
https://www.ibm.com/support/pages/node/6463575
IBM API Connect
V2018.4.1.0-2018.4.1.17
| 2018.4.1.17-ifix1 | LI82440 |
Follow the link below to find the necessary upgrade details to resolve the Apache Log4j vulnerability for APIC.
https://www.ibm.com/support/pages/node/6478999
IBM API Connect
v10.0.1.0-10.0.1.5
| 10.0.1.5-ifix3 | LI82440 |
Follow the link below to find the necessary upgrade details to resolve the Apache Log4j vulnerability for APIC.
https://www.ibm.com/support/pages/node/6526426
IBM API Connect
v10.0.3.0
| 10.0.4.0| LI82440 |
Follow the link below to find the necessary upgrade details to resolve the Apache Log4j vulnerability for APIC.
<https://www.ibm.com/support/pages/node/6508607>
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm api connect | eq | 5 | |
ibm api connect | eq | 2018 | |
ibm api connect | eq | 10 |
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
99.9%