CVE-2021-44228

CVE Published 2021-12-10
Related CWE(s) CWE-20: Improper Input Validation, CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection'), CWE-400: Uncontrolled Resource Consumption, CWE-502: Deserialization of Untrusted Data
Related Vendor(s) intel, fedoraproject, snowsoftware, sonicwall, netapp, bentley, apache, siemens, cisco, debian, apple, percussion
Related Product(s) unified_computing_system, operation_scheduler, unified_communications_manager, logo\!_soft_comfort, prime_service_catalog, synchro, computer_vision_annotation_tool, crosswork_network_controller, cloud_connect, cyber_vision_sensor_management_extension, desigo_cc_info_center, head-end_system_universal_device_integration_system, virtual_topology_system, crosswork_platform_infrastructure, mindsphere, snapcenter, unified_communications_manager_im_and_presence_service, opcenter_intelligence, xpedition_package_integrator, siveillance_vantage, contact_center_management_portal, unified_contact_center_management_portal, spectrum_power_7, iot_operations_dashboard, nexus_insights, data_center_network_manager, connected_mobile_experiences, sipass_integrated, paging_server, oneapi_sample_browser, comos, cloudcenter_workload_manager, energyip, customer_experience_cloud_agent, audio_development_kit, unified_contact_center_express, video_surveillance_manager, xcode, smart_phy, crosswork_network_automation, common_services_platform_collector, firepower_threat_defense, system_debugger, cx_cloud_agent, ucs_director, dna_spaces\, sppa-t3000_ses3000_firmware, wan_automation_engine, sd-wan_vmanage, debian_linux, data_center_manager, secure_device_onboard, emergency_responder, ontap_tools, cloud_manager, cloudcenter, unified_contact_center_enterprise, unified_sip_proxy, ucs_central, fedora, ucs_central_software, vesys, spectrum_power_4, vm_access_proxy, finesse, fxos, crosswork_data_gateway, integrated_management_controller_supervisor, automated_subsea_tuning, identity_services_engine, mobility_services_engine, energy_engage, crosswork_optimization_engine, cloud_insights, nx, cyber_vision, solid_edge_harness_design, cloudcenter_cost_optimizer, dna_spaces_connector, teamcenter, optical_network_controller, network_insights_for_data_center, unified_customer_voice_portal, packaged_contact_center_enterprise, oncommand_insight, genomics_kernel_library, cloud_secure_agent, crosswork_zero_touch_provisioning, solid_edge_cam_pro, system_studio, captial, mendix, e-car_operation_center, active_iq_unified_manager, enterprise_chat_and_email, virtualized_voice_browser, virtualized_infrastructure_manager, workload_optimization_manager, cloudcenter_suite, industrial_edge_management, gma-manager, siveillance_viewpoint, synchro_4d, snow_commander, unified_workforce_optimization, network_services_orchestrator, intersight_virtual_appliance, fog_director, video_surveillance_operations_manager, unified_communications_manager_im_\&_presence_service, dna_center, dna_spaces, email_security, siveillance_identity, evolved_programmable_network_manager, network_assurance_engine, nexus_dashboard, siguard_dsa, industrial_edge_management_hub, broadworks, business_process_automation, desigo_cc_advanced_reports, sensor_solution_firmware_development_kit, cloudcenter_suite_admin, contact_center_domain_manager, advanced_malware_protection_virtual_private_cloud_appliance, unity_connection, energyip_prepay, siveillance_control_pro, unified_intelligence_center, sentron_powermanager, log4j, siveillance_command, webex_meetings_server, network_dashboard_fabric_controller, xpedition_enterprise, navigator, connected_analytics_for_network_deployment, rhythmyx
Exploitation Reported (CISA KEV) 2021-12-10
CVSS 3 Base Score 10.0 (CRITICAL)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector NETWORK

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Threat Reports Related to CVE-2021-44228

Report

Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets

This report from Microsoft Threat Intelligence describes a subset of activity related to the Mint Sandstorm actor. The campaign includes the theft ...

Report

North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs

This cybersecurity advisory from the U.S. Federal Bureau of Investigation (FBI) and its partners, highlights the cyber espionage activities of the ...

Report

Onyx Sleet uses array of malware to gather intelligence for North Korea

Following an indictment by the US Department of Justice linked to the intrusion set Microsoft track as Onyx Sleet, this report includes details of ...

Report

I-Soon leak: KELA’s insights

This blog post outlines KELA's analysis of the 2024 I-SOON data leak. According to the article, I-Soon had relationships with Chinese governmental ...

Associated CAPEC Patterns

References