A critical zero-day vulnerability in Apache Log4j2, a library used by millions for Java applications, that is being actively exploited in the wild was recently discovered that can allow a threat actor to gain system-level access to the vulnerable servers. Tracked as CVE-2021-42288, CERTS from different countries like New Zealand, Austria, and Germany have already spotted it being used by adversaries in the wild.

Apache is aware of the security vulnerability and already released the Apache Log4J v2.15.0 to address the issue.

A working proof of concept of this vulnerability was published on GitHub

______________________________

A. Nature of the Vulnerabilities

The following vulnerabilities were described as:

CVE-2021-44228

A security vulnerability in Apache Log4j versions 2.0-beta9 to 2.14.1 has a CVSS score of 10.0. Logging untrusted or user-controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user-controlled input.

______________________________

B. List of Vulnerable Systems

Vulnerable Windows OS:

  • All Log4J versions prior to v2.15.0 are affected by this specific issue.

______________________________

C. Actions to be Taken

CERT-PH recommends the following actions be taken:

  • Test and apply the necessary patches for the packages/applications/systems/devices:
    • Apache Log4j version 2.15.0

Note: For those who cannot upgrade to 2.15.0, in releases >=2.10, this behavior can be mitigated by setting either the system property log4j2.formatMsgNoLookups or the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS to true. For releases >=2.7 and <=2.14.1, all PatternLayout patterns can be modified to specify the message converter as %m{nolookups} instead of just %m. For releases >=2.0-beta9 and <=2.10.0, the mitigation is to remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class.

______________________________

D. Indicator of Compromised (IOC)