CVE-2021-44228
CVE Published | 2021-12-10 |
---|---|
Related CWE(s) | CWE-20: Improper Input Validation, CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection'), CWE-400: Uncontrolled Resource Consumption, CWE-502: Deserialization of Untrusted Data |
Related Vendor(s) | intel, fedoraproject, snowsoftware, sonicwall, netapp, bentley, apache, siemens, cisco, debian, apple, percussion |
Related Product(s) | unified_computing_system, operation_scheduler, unified_communications_manager, logo\!_soft_comfort, prime_service_catalog, synchro, computer_vision_annotation_tool, crosswork_network_controller, cloud_connect, cyber_vision_sensor_management_extension, desigo_cc_info_center, head-end_system_universal_device_integration_system, virtual_topology_system, crosswork_platform_infrastructure, mindsphere, snapcenter, unified_communications_manager_im_and_presence_service, opcenter_intelligence, xpedition_package_integrator, siveillance_vantage, contact_center_management_portal, unified_contact_center_management_portal, spectrum_power_7, iot_operations_dashboard, nexus_insights, data_center_network_manager, connected_mobile_experiences, sipass_integrated, paging_server, oneapi_sample_browser, comos, cloudcenter_workload_manager, energyip, customer_experience_cloud_agent, audio_development_kit, unified_contact_center_express, video_surveillance_manager, xcode, smart_phy, crosswork_network_automation, common_services_platform_collector, firepower_threat_defense, system_debugger, cx_cloud_agent, ucs_director, dna_spaces\, sppa-t3000_ses3000_firmware, wan_automation_engine, sd-wan_vmanage, debian_linux, data_center_manager, secure_device_onboard, emergency_responder, ontap_tools, cloud_manager, cloudcenter, unified_contact_center_enterprise, unified_sip_proxy, ucs_central, fedora, ucs_central_software, vesys, spectrum_power_4, vm_access_proxy, finesse, fxos, crosswork_data_gateway, integrated_management_controller_supervisor, automated_subsea_tuning, identity_services_engine, mobility_services_engine, energy_engage, crosswork_optimization_engine, cloud_insights, nx, cyber_vision, solid_edge_harness_design, cloudcenter_cost_optimizer, dna_spaces_connector, teamcenter, optical_network_controller, network_insights_for_data_center, unified_customer_voice_portal, packaged_contact_center_enterprise, oncommand_insight, genomics_kernel_library, cloud_secure_agent, crosswork_zero_touch_provisioning, solid_edge_cam_pro, system_studio, captial, mendix, e-car_operation_center, active_iq_unified_manager, enterprise_chat_and_email, virtualized_voice_browser, virtualized_infrastructure_manager, workload_optimization_manager, cloudcenter_suite, industrial_edge_management, gma-manager, siveillance_viewpoint, synchro_4d, snow_commander, unified_workforce_optimization, network_services_orchestrator, intersight_virtual_appliance, fog_director, video_surveillance_operations_manager, unified_communications_manager_im_\&_presence_service, dna_center, dna_spaces, email_security, siveillance_identity, evolved_programmable_network_manager, network_assurance_engine, nexus_dashboard, siguard_dsa, industrial_edge_management_hub, broadworks, business_process_automation, desigo_cc_advanced_reports, sensor_solution_firmware_development_kit, cloudcenter_suite_admin, contact_center_domain_manager, advanced_malware_protection_virtual_private_cloud_appliance, unity_connection, energyip_prepay, siveillance_control_pro, unified_intelligence_center, sentron_powermanager, log4j, siveillance_command, webex_meetings_server, network_dashboard_fabric_controller, xpedition_enterprise, navigator, connected_analytics_for_network_deployment, rhythmyx |
Exploitation Reported (CISA KEV) | 2021-12-10 |
CVSS 3 Base Score | 10.0 (CRITICAL) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph
Threat Reports Related to CVE-2021-44228
Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets
This report from Microsoft Threat Intelligence describes a subset of activity related to the Mint Sandstorm actor. The campaign includes the theft ...
North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs
This cybersecurity advisory from the U.S. Federal Bureau of Investigation (FBI) and its partners, highlights the cyber espionage activities of the ...
Onyx Sleet uses array of malware to gather intelligence for North Korea
Following an indictment by the US Department of Justice linked to the intrusion set Microsoft track as Onyx Sleet, this report includes details of ...
I-Soon leak: KELA’s insights
This blog post outlines KELA's analysis of the 2024 I-SOON data leak. According to the article, I-Soon had relationships with Chinese governmental ...