Armis Logo< Back

CVE-2021-44228:

Apache Log4j2 Remote Code Execution Vulnerability (Log4Shell)


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

10.0Critical
  • Published Date:Dec 10, 2021
  • CISA KEV Date:Dec 10, 2021
  • Industries Affected:20

Threat Predictions

  • EPSS Score:94.4
  • EPSS Percentile:100%

Exploitability

  • Score:3.9
  • Attack Vector:NETWORK
  • Attack Complexity:LOW
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:CHANGED

Impact

  • Score:6.0
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

Apache Log4j2 Remote Code Execution Vulnerability (Log4Shell)

Overview

CVE-2021-44228, also known as Log4Shell, is a severe vulnerability in the Apache Log4j2 library that affects versions 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1). The vulnerability stems from the JNDI (Java Naming and Directory Interface) features used in configuration, log messages, and parameters that fail to protect against attacker-controlled LDAP and other JNDI-related endpoints. When message lookup substitution is enabled, an attacker who can inject malicious strings into logs can trigger remote code execution by forcing the application to connect to a malicious LDAP server. This vulnerability has been assigned a CVSS score of 10.0 (Critical) due to its ease of exploitation and severe impact. The vulnerability affects countless applications and services worldwide as Log4j is widely used in enterprise Java applications, cloud services, and web applications.

Remediation

  • To remediate the Log4Shell vulnerability, take the following actions:
  • 1. Update to a patched version:
  • Update to Log4j 2.17.0 or later (recommended)
  • For Java 8 environments: Update to Log4j 2.12.4 or later
  • For Java 7 environments: Update to Log4j 2.3.2 or later
  • 2. If immediate patching is not possible, implement one of these mitigations:
  • Set system property: -Dlog4j2.formatMsgNoLookups=true
  • Remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
  • Configure the "NoLookups" flag for PatternLayout in the Log4j configuration
  • 3. Implement network controls:
  • Block outbound connections to unknown or suspicious domains
  • Implement egress filtering to block LDAP/JNDI connections to external servers
  • Deploy WAF rules to detect and block exploitation attempts
  • 4. Scan your environment:
  • Identify all applications using vulnerable Log4j versions
  • Prioritize internet-facing applications for immediate remediation
  • Use vulnerability scanners to detect vulnerable instances
  • 5. Monitor for exploitation:
  • Watch for suspicious outbound connection attempts
  • Monitor logs for exploitation patterns like "${jndi:ldap://...}"

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Medium
Manufacturing icon
Manufacturing
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Transportation and Warehousing icon
Transportation and Warehousing
Health Care and Social Assistance icon
Health Care and Social Assistance
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Wholesale Trade icon
Wholesale Trade
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Accommodation and Food Services icon
Accommodation and Food Services
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!