(SM-2302) Log4j Vulnerability
Updated on May 12th, 2022Log4j 2.17.2 was released on 23rd of February. This version will be included
New release 2202 has been published. This release contains the latest version of log4j 2.17.1. Updated on February 8th, 2022New release 2202 has been published. This release contains the latest version of log4j 2.17.1. Updated on January 10th, 2022On December 28th another security issue was found in Log4j 2.17.0 and a new version 2.17.1 was released. The latest version is still undergoing reanalysis which may result in further changes. You can find more information on the following link https://nvd.nist.gov/vuln/detail/CVE-2021-44832
What is the impact on our customers? Java connector uses the log4j library for logging information into text files. This means that the recently discovered vulnerable logic of log4j is not used by our software and therefore should cause no harm.
How are we responding? We are going to encapsulate the latest available version of log4j in the upcoming release coming at the beginning of February. Updated on December 23rd 2021On December 23rd we have released a new Java connector with the Log4j 2.17.0. Contact product_support@snpgroup.com for more information.
SummaryOn December 17th 2021, the Apache Software Foundation released version 2.17.0 of the Log4j Java logging library, fixing the following security issues: CVE-2021-44228, a remote code execution vulnerability affecting Log4j 2.0-2.14. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. CVE-2021-45105, JNDI features used in the configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.
What is the impact on our customers?Java connector, which is part of our Storage Management (a component of the Reuse library), contains the Log4j 2.11.1 library which is used for handling log messages. For a full list of products that contain the Storage Management see here:
Even though the vulnerability of the Log4j library is critical, the threat is relevant only under specific circumstances which are not applicable in the case of our connector. Java connector is used for communication with external storage technologies listed below.
If you are not using any of the listed target storages, the security issue is not relevant to you, because the Java connector is not installed in your environment. Java libraries are unpacked and stored in a specified directory only after the connection to the specific storage has been configured.
How are we responding? We are working on the preparation of a new version of the Java connector with the fixed Log4j libraries. This will be available in the upcoming days and you will be informed by e-mail once it is available.
How should customers proceed?
To accelerate the resolution, including the following information in advance will be very helpful:
As soon as we have this information from you, we will be able to inform you if there is any security impact and if yes, what steps we recommend to mitigate it. |