A new zero-day vulnerability has been discovered for the java logging library log4j, which is widely used in many applications.
This allows attackers, who exploit the zero-day vulnerability, to have full control over the systems. This vulnerability tracked in the NVD database as CVE-2021-44228 allows remote code execution. This vulnerability has not been evaluated by NIST and its CVSS score has not been disclosed yet. This vulnerability has been evaluated by NIST and its CVSS 3.1 score has been determined to be 10.0.
Affected Systems
All versions of the log4j library between 2.0.1 and 2.14.1 are affected, including many services and applications written in Java.
IoC’s
Log4g IoCs | Download Excel |
Recommended Solution(s)
It is urgently recommended to upgrade Log4j versions to log4j-2.15.0-rc1 to prevent
exploitation of this vulnerability.
To avoid the effects of vulnerability; It is recommended to follow the steps prepared by our Technical team for Imperva WAF, F5 WAF and McAfee IPS.
Security Warning | Recommended Solution(s) | ZIP |
---|---|---|
CVE-2021-44228 F5 WAF | View PDF | |
CVE-2021-44228 Imperva WAF | View PDF | |
CVE-2021-44228 Mcfee IPS | View PDF | Download ZIP |
CVE / CWE
CVE-2021-44228
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.