CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
99.9%
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | log4j | * | cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* |
apache | log4j | 2.0 | cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:* |
apache | log4j | 2.0 | cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:* |
apache | log4j | 2.0 | cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:* |
apache | log4j | 2.0 | cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:* |
intel | audio_development_kit | - | cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:* |
intel | computer_vision_annotation_tool | - | cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:* |
intel | datacenter_manager | - | cpe:2.3:a:intel:datacenter_manager:-:*:*:*:*:*:*:* |
intel | genomics_kernel_library | - | cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:* |
intel | oneapi | - | cpe:2.3:a:intel:oneapi:-:*:*:*:*:eclipse:*:* |
www.openwall.com/lists/oss-security/2021/12/14/4
www.openwall.com/lists/oss-security/2021/12/15/3
www.openwall.com/lists/oss-security/2021/12/18/1
cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf
cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf
cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/
logging.apache.org/log4j/2.x/security.html
psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
security.gentoo.org/glsa/202310-16
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
www.cve.org/CVERecord?id=CVE-2021-44228
www.debian.org/security/2021/dsa-5022
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
www.kb.cert.org/vuls/id/930724
www.oracle.com/security-alerts/alert-cve-2021-44228.html
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpujul2022.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
99.9%