CB-K21/1264 Update 1
Risikostufe 5
Titel:Apache log4j: Schwachstelle ermöglicht CodeausführungDatum:13.12.2021Software:Apache log4j < 2.15.0, Amazon Linux 2, Apache Kafka, Apache Solr, Apache Struts, Atlassian Bamboo, Atlassian Confluence, Atlassian Crucible, Atlassian Fisheye, Atlassian Jira Software, Cisco Identity Services Engine (ISE), Cisco Integrated Management Controller, Cisco Nexus Dashboard, Cisco SD-WAN vManage, Cisco Unified Communications Manager (CUCM) Cloud, Cisco Unified Computing System (UCS) Director, Cisco Unified Contact Center Enterprise, Cisco Unified Intelligent Contact Manager (ICM), Cisco Video Surveillance Operations Manager, Cisco WebEx Cloud-Connected UC, Cisco WebEx Meetings Server, Debian Linux, F-Secure Policy Manager, HCL Commerce, IBM WebSphere Application Server, Open Source Elasticsearch, Open Source LogStash, Red Hat JBoss A-MQ, Red Hat JBoss Enterprise Application Platform, Red Hat OpenShift, Red Hat OpenStack, Red Hat Process Automation Manager, RSA SecurID Authentication Manager, SOS GmbH JobScheduler, Splunk Splunk Enterprise, Symantec Endpoint Protection Manager, VMware Carbon Black Cloud Workload, VMware Horizon, VMware Identity Manager, VMware NSX Data Center for vSphere, VMware vCenter Server, VMware vRealize Log Insight, VMware vRealize Operations, VMware vRealize Suite Lifecycle Manager, VMware Workspace One Access, VMware Workspace One Access Connector, VMware Tanzu Spring BootPlattform:Applicance, CISCO Appliance, Hardware Appliance, Linux, Native Hypervisor, Sonstiges, UNIX, WindowsAuswirkung:Ausführen beliebigen ProgrammcodesRemoteangriff:JaRisiko:sehr hochCVE Liste:CVE-2021-44228Bezug:
Beschreibung
Apache log4j ist ein Framework zum Loggen von Anwendungsmeldungen in Java.
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache log4j ausnutzen, um beliebigen Programmcode auszuführen.
Quellen:
- Red Hat Bugzilla - Bug 2030932 vom 2021-12-09
- GitHub Security Advisory GHSA-jfh8-c2jp-5v3q vom 2021-12-09
- GitHub: CVE-2021-44228 Remote Code Injection In Log4j vom 2021-12-10
- Apache log4j Security Advisory vom 2021-12-10
- Tweet von Deutsche Telekom CERT vom 2021-12-10
- CERT-EU Security Advisory 2021-067 vom 2021-12-10
- Elastic Security Announcement ESA-2021-31 vom 2021-12-13
- ExtremeNetworks Vulnerability Notice VN-2020-465 vom 2021-12-12
- VMware Security Advisory VMSA-2021-0028 vom 2021-12-11
- FortiGuard Labs PSIRT Advisory FG-IR-21-245 vom 2021-12-12
- Amazon Linux Security Advisory ALAS-2021-003 vom 2021-12-11
- IBM Security Bulletin 6525706 vom 2021-12-13
- Debian Security Advisory DLA-2842 vom 2021-12-12
- Cisco Security Advisory CISCO-SA-APACHE-LOG4J-QRUKNEBD vom 2021-12-10
- HCL Article KB0095493 vom 2021-12-13
- Symantec Security Advisory SYMSA19793 vom 2021-12-13
- Debian Security Advisory DSA-5020 vom 2021-12-12
- F-Secure Policy Manager Update vom 2021-12-12
- RSA SecurID Authentication Manager Update vom 2021-12-12
- Splunk Security Advisory vom 2021-12-12
- Red Hat Security Bulletin RHSB-2021-009 vom 2021-12-13
- Apache Kafka Mailing List vom 2021-12-12
- Apache Struts Security Advice vom 2021-12-12
- Oracle Security Alert
- Spring.io Blog
- SOS Job Scheduler Vulnerability Release
- SOS Job Scheduler Vulnerability Release
- SAS Statement Regarding Remote Code Execution Vulnerability (CVE-2021-44228)
- Sammlung betroffener Produkte auf GitHub (NLD Nationaal Cyber Security Centrum)
- Talos Intelligence Blog
- Github User "CronUp"
- Atlassian FAQ for CVE-2021-44228 vom 2021-12-12