• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Apache • Cybersecurity  /  CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild
CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild
15 December 2021

CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild

Written by Seqrite
Seqrite
Apache, Cybersecurity

A critical zero-day vulnerability (CVE-2021-44228) was recently discovered in Apache Log4J, the popular Java open source logging library used in countless worldwide applications.

The maximum severity vulnerability has been identified as ‘Log4Shell’, which, if exploited, could permit a remote attacker to take control of vulnerable systems and execute arbitrary code remotely.

According to some security researchers, the flaw is the most serious discovered in the past decade due to its ease of exploitation and the sheer number of affected enterprise applications and cloud services. It is the most high-profile security vulnerability on the internet right now and comes with a severity score of 10, the maximum severity rating possible.

After Log4Shell, security researchers identified a few more vulnerabilities in the same Log4j library. These new vulnerabilities are – CVE-2021-45046 – a Remote code execution, CVE-2021-45105 – a denial of services and CVE-2021-4104 – a remote code execution.

Apache addressed this vulnerability by releasing a patch and security advisory with mitigation details.

What is Apache Log4J “Log4Shell” vulnerability?

Log4j is an open-source Java-based logging utility in the Apache Logging Services. Logging untrusted or user-controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data provided in logged errors such as exception traces, authentication failures, and other unexpected vectors of user-controlled input.

Invulnerable Log4j, an unauthenticated, remote attacker, could exploit it by sending a specially crafted JNDI injection request to a target server and writing in a log file, leading to arbitrary code execution. This allowed attackers to inject malicious payloads from LDAP servers or other JNDI services such as DNS, RMI, NIS, NDS, CORBA, and IIOP when the message lookup mechanism is enabled.

  • Impacted Log4j versions: All versions from 2.0-beta9 to 2.14.1
  • Severity: Critical

Why is the “Log4Shell” vulnerability critical?

An unauthenticated, remote attacker can exploit this vulnerability in simple web requests that target identified vulnerable systems. Successful exploitation could lead to arbitrary code execution, and the attacker can take complete control of the system.

Apache Log4j is widely used in cloud and enterprise software services, so publicly available exploits code, easy exploitations & detection evasions techniques make this vulnerability very dangerous.

CVE-2021-45046, CVE-2021-45105, CVE-2021-4104 in log4j:

CVE-2021-45046 is Affecting versions from 2.0-beta9 to 2.15.0 excluding 2.12.2. Initially identified as “Low” severity, it is later moved to “Critical” remote code execution vulnerability. Logging configuration with non-default Pattern Layout with Context Lookup & control over Thread Context Map (MCD) pattern, the attacker can craft malicious input using JNDI Lookup pattern, which could lead to DOS or an information leak and remote code execution.

  • Impacted Log4j versions: All versions 0-beta9 to 2.15.0 excluding 2.12.2
  • Severity: Critical

CVE-2021-45105 is affecting Log4j versions from 2.0-beta9 to 2.16.0 wherein non-default configuration. The attacker can send crafted requests with recursive lookup, which control Thread Context Map data to cause a denial-of-service vulnerability.

  • Impacted Log4j versions: All versions from 2.0-beta9 to 2.16.0
  • Severity: High

CVE-2021-4104 is affecting Log4j version 1.2 when Log4j is configured to use JMSAppender to perform JNDI requests which can cause remote code execution.

  • Impacted Log4j versions: version 1.2
  • Severity: High

Mitigation of “Log4Shell” 

  • Immediately update to the latest Apache Log4j version from here.
  • Please refer to Vendor Advisory.
  • Update the Network security solutions and endpoints with the latest definitions.

Seqrite Coverage for “Log4Shell”

We have released IPS rules to identify and block remote attacks exploiting vulnerable Log4j installations. We’ll continue monitoring the developments around this threat and improve our detections if needed. We advise all our customers to patch their systems properly and keep the anti-virus software updated with the latest VDB updates.

 Previous PostTop 6 cybersecurity threats that every Startup or Business should...
Next Post  Seqrite EPS accredited with “Advanced Approved Endpoint Pro...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies