Cisco Security Advisory - Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021

Started by Netwörkheäd, December 18, 2021, 12:20:56 AM

Previous topic - Next topic

Netwörkheäd

Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021

Critical Vulnerabilities in Apache Log4j Java Logging Library


On December 9, 2021, the following critical vulnerability in the Apache Log4j Java logging library affecting all Log4j2 versions earlier than 2.15.0 was disclosed:



  • CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints


On December 14, 2021, the following critical vulnerability, which affects certain Apache Log4j use cases in versions 2.15.0 and earlier, was disclosed:



  • CVE-2021-45046: Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack


For a description of these vulnerabilities, see the Apache Log4j Security Vulnerabilities page.


Cisco's Response to These Vulnerabilities


Cisco is assessing all products and services for impact from both CVE-2021-44228 and CVE-2021-45046. Product fixes will address both CVEs unless otherwise noted.


To help detect exploitation of these vulnerabilities, Cisco has released Snort rules at the following location: Talos Rules 2021-12-15


This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd



     
         
Security Impact Rating:  Critical
   
   
       
CVE: CVE-2021-44228,CVE-2021-45046
Source: Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021
Let's not argue. Let's network!