9

CVE-2021-45046

Warnung

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheLog4j Version >= 2.0.1 < 2.12.2
ApacheLog4j Version >= 2.13.0 < 2.16.0
ApacheLog4j Version2.0 Update-
ApacheLog4j Version2.0 Updatebeta9
ApacheLog4j Version2.0 Updaterc1
ApacheLog4j Version2.0 Updaterc2
IntelDatacenter Manager Version-
IntelOneapi Version- SwPlatformeclipse
IntelSystem Debugger Version-
IntelSystem Studio Version-
SiemensCaptial Version < 2019.1
SiemensCaptial Version2019.1 Update-
SiemensCaptial Version2019.1 Updatesp1912
SiemensE-car Operation Center Version < 2021-12-13
SiemensEnergy Engage Version3.1
SiemensEnergyip Version8.5
SiemensEnergyip Version8.6
SiemensEnergyip Version8.7
SiemensEnergyip Version9.0
SiemensEnergyip Prepay Version3.7
SiemensEnergyip Prepay Version3.8
SiemensGma-manager Version < 8.6.2j-398
SiemensIndustrial Edge Management Hub Version < 2021-12-13
SiemensMindsphere Version < 2021-12-11
SiemensNavigator Version < 2021-12-13
SiemensNx
SiemensOpcenter Intelligence Version <= 3.2
SiemensOperation Scheduler Version <= 1.1.3
SiemensSentron Powermanager Version4.1
SiemensSentron Powermanager Version4.2
SiemensSiguard Dsa Version4.2
SiemensSiguard Dsa Version4.3
SiemensSiguard Dsa Version4.4
SiemensSipass Integrated Version2.80
SiemensSipass Integrated Version2.85
SiemensSiveillance Command Version <= 4.16.2.1
SiemensSiveillance Identity Version1.5
SiemensSiveillance Identity Version1.6
SiemensSolid Edge Harness Design Version2020 Update-
SiemensSolid Edge Harness Design Version2020 Updatesp2002
SiemensSpectrum Power 4 Version < 4.70
SiemensSpectrum Power 4 Version4.70 Update-
SiemensSpectrum Power 4 Version4.70 Updatesp7
SiemensSpectrum Power 4 Version4.70 Updatesp8
SiemensSpectrum Power 7 Version < 2.30
SiemensSpectrum Power 7 Version2.30
SiemensSpectrum Power 7 Version2.30 Update-
SiemensSpectrum Power 7 Version2.30 Updatesp2
SiemensVesys Version < 2019.1
SiemensVesys Version2019.1
SiemensVesys Version2019.1 Update-
SiemensVesys Version2019.1 Updatesp1912
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
SonicwallEmail Security Version < 10.0.12
FedoraprojectFedora Version34
FedoraprojectFedora Version35
Siemens6bk1602-0aa12-0tp0 Firmware Version < 2.7.0
   Siemens6bk1602-0aa12-0tp0 Version-
Siemens6bk1602-0aa22-0tp0 Firmware Version < 2.7.0
   Siemens6bk1602-0aa22-0tp0 Version-
Siemens6bk1602-0aa32-0tp0 Firmware Version < 2.7.0
   Siemens6bk1602-0aa32-0tp0 Version-
Siemens6bk1602-0aa42-0tp0 Firmware Version < 2.7.0
   Siemens6bk1602-0aa42-0tp0 Version-
Siemens6bk1602-0aa52-0tp0 Firmware Version < 2.7.0
   Siemens6bk1602-0aa52-0tp0 Version-

01.05.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog

Apache Log4j2 Deserialization of Untrusted Data Vulnerability

Schwachstelle

Apache Log4j2 contains a deserialization of untrusted data vulnerability due to the incomplete fix of CVE-2021-44228, where the Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.34% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9 2.2 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
nvd@nist.gov 5.1 4.9 6.4
AV:N/AC:H/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 9 2.2 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.

http://www.openwall.com/lists/oss-security/2021/12/14/4
Third Party Advisory
Mailing List
Mitigation
https://logging.apache.org/log4j/2.x/security.html
Vendor Advisory
Release Notes
Mitigation
https://www.kb.cert.org/vuls/id/930724
Third Party Advisory
US Government Resource