Lucene search

K
ibmIBM1999DB7DA98AE073A34DD83F5547894F0F8C1DC9FB860A963E2002A469B5FC74
HistoryMar 31, 2022 - 3:04 a.m.

Security Bulletin: IBM Security Access Manager for Enterprise Single Sign-On may be vulnerable to arbitrary code execution due to Apache Log4j (CVE-2021-4104)

2022-03-3103:04:02
www.ibm.com
19

0.127 Low

EPSS

Percentile

95.5%

Summary

Vulnerability in Apache Log4j (CVE-2021-4104) may affect IBM Security Access Manager for Enterprise Single Sign-On. Although no known vulnerability impact has been proven, it is strongly recommended to apply the fix that upgrades log4j from version 1.x to version 2.1.17.

Vulnerability Details

CVEID:CVE-2021-4104
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data when the attacker has write access to the Log4j configuration. If the deployed application is configured to use JMSAppender, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/215048 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Security Access Manager for Enterprise Single-Sign On 8.2.0, 8.2.1, 8.2.2

Remediation/Fixes

IBM strongly recommends customers update their systems promptly.

(1) Security vulnerabilities related to log4j are addressed and fixed in IBM Security Access Manager for Enterprise Single-Sign On version 8.2.2 only. Customers running a version prior to version 8.2.2 should first upgrade to IBM Security Access Manager for Enterprise Single-Sign On version 8.2.2, and then apply Fix Pack 13.

(2) Apply Fix Pack 13 on IBM Security Access Manager for Enterprise Single-Sign On version 8.2.2 as per the details available here.

Workarounds and Mitigations

None