Lucene search

K
ibmIBMDCE05236BD35B28C109059A740CACEE5CE345130605BA9DEA39EFDA6BC532303
HistoryDec 17, 2021 - 6:34 p.m.

Security Bulletin: IBM Content Navigator container deployments are vulnerable to a remote execution vulnerability (Log4j)

2021-12-1718:34:30
www.ibm.com
170
ibm content navigator
log4j
remote execution
vulnerability
upgrade
fix
cve-2021-44228
log4shell
logjam

EPSS

0.965

Percentile

99.6%

Summary

IBM Content Navigator container deployments are vulnerable to a remote execution vulnerability. IBM Content Navigator has addressed the vulnerability as described below.

Vulnerability Details

CVEID:CVE-2021-44228
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker controlled LDAP and other JNDI related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system. Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Content Navigator 3.0 Continuous Delivery

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading.

Product VMRF Remediation / First Fix
IBM Content Navigator 3.0 Continuous Delivery IBM Content Navigator container - ICN 3.0.9 LA 008, ICN 3.0.10 LA 004 / Task Manager container - TM 3.0.10 LA004, TM 3.0.9 LA008, 3.0.7 TM LA101.

Workarounds and Mitigations

For more information about how this vulnerability affects IBM Content Navigator, see this technote: <https://www.ibm.com/support/pages/node/6526164&gt;