Lucene search

K
ibmIBM67888E8EA83126B823C64DF445FE590186D22B46F294306313C37B870873F831
HistoryFeb 18, 2022 - 5:36 a.m.

Security Bulletin: IBM Sterling Connect:Direct Web Services is vulnerable to untrusted data deserialization due to Apache Log4j (CVE-2021-4104)

2022-02-1805:36:17
www.ibm.com
28

0.127 Low

EPSS

Percentile

95.5%

Summary

Apache Log4j is used by IBM Sterling Connect:Direct Web Services as part of its logging infrastructure. JMSAppender in Apache Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The fix includes Apache Log4j 2.17.1

Vulnerability Details

CVEID:CVE-2021-4104
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data when the attacker has write access to the Log4j configuration. If the deployed application is configured to use JMSAppender, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/215048 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Direct Web Services 1.0
IBM Sterling Connect:Direct Web Services 6.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading.

Product(s)|Version(s)|**Remediation/Fix
**
—|—|—
IBM Sterling Connect:Direct Web Services| 1.0, 6.0| Apply 6.0.0.6, available on Fix Central

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm connect:direct web serviceseq6.0