Cisco Security Advisory - Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021

Started by Netwörkheäd, December 10, 2021, 07:27:52 PM

Previous topic - Next topic

Netwörkheäd

Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021

On December 9, 2021, the following vulnerability in the Apache Log4j Java logging library affecting all Log4j versions prior to 2.15.0 was disclosed:



  • CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints


For a description of this vulnerability, see the Fixed in Log4j 2.15.0 section of the Apache Log4j Security Vulnerabilities page.


To help detect exploitation of this vulnerability, Cisco has released Snort rules at the following location: Talos Rules 2021-12-10


This advisory will be updated as additional information becomes available.


This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd



     
         
Security Impact Rating:  Critical
   
   
       
CVE: CVE-2021-44228
Source: Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021
Let's not argue. Let's network!

deanwebb

^ This one is not just for CIsco, it's for *any* vendor that utilizes Apache Web Server in a product, which is a LOT of them.
Take a baseball bat and trash all the routers, shout out "IT'S A NETWORK PROBLEM NOW, SUCKERS!" and then peel out of the parking lot in your Ferrari.
"The world could perish if people only worked on things that were easy to handle." -- Vladimir Savchenko
Вопросы есть? Вопросов нет! | BCEB: Belkin Certified Expert Baffler | "Plan B is Plan A with an element of panic." -- John Clarke
Accounting is architecture, remember that!
Air gaps are high-latency Internet connections.