Description
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Published: 2021-12-10
Score: 10 Critical
EPSS: 94.4% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2842-1 apache-log4j2 security update
Debian DSA Debian DSA DSA-5020-1 apache-log4j2 security update
Debian DSA Debian DSA DSA-5022-1 apache-log4j2 security update
Github GHSA Github GHSA GHSA-jfh8-c2jp-5v3q Remote code injection in Log4j
Ubuntu USN Ubuntu USN USN-5192-1 Apache Log4j 2 vulnerability
Ubuntu USN Ubuntu USN USN-5192-2 Apache Log4j 2 vulnerability
Ubuntu USN Ubuntu USN USN-5197-1 Apache Log4j 2 vulnerability
References
Link Providers
http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html cve-icon cve-icon
http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html cve-icon cve-icon
http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html cve-icon cve-icon
http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html cve-icon cve-icon
http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html cve-icon cve-icon
http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html cve-icon cve-icon
http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html cve-icon cve-icon
http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html cve-icon cve-icon
http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html cve-icon cve-icon
http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2022/Dec/2 cve-icon cve-icon
http://seclists.org/fulldisclosure/2022/Jul/11 cve-icon cve-icon
http://seclists.org/fulldisclosure/2022/Mar/23 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/10/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/10/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/10/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/13/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/13/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/14/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/15/3 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf cve-icon cve-icon
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q cve-icon
https://github.com/cisagov/log4j-affected-db cve-icon cve-icon
https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md cve-icon cve-icon
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ cve-icon cve-icon
https://logging.apache.org/log4j/2.x/security.html cve-icon cve-icon cve-icon
https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-44228 cve-icon
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20211210-0007/ cve-icon cve-icon
https://support.apple.com/kb/HT213189 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd cve-icon cve-icon
https://twitter.com/kurtseifried/status/1469345530182455296 cve-icon cve-icon
https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-44228 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-44228 cve-icon
https://www.debian.org/security/2021/dsa-5020 cve-icon cve-icon
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html cve-icon cve-icon
https://www.kb.cert.org/vuls/id/930724 cve-icon cve-icon
https://www.lunasec.io/docs/blog/log4j-zero-day/ cve-icon
https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html cve-icon cve-icon
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
History

Fri, 20 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:cisco:cloudcenter_suite:4.10\(0.15\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.3\(0\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.4\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5\(0\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.004.000.003:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.000.001:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.001.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.002.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.001.001:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.003:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:7.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:4.10.0.15:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5.1:*:*:*:*:*:*:*
Vendors & Products Cisco connected Analytics For Network Deployment

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Fri, 08 Aug 2025 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:cisco:unified_intelligence_center:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.94358}

epss

{'score': 0.9447}


Thu, 03 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Intel datacenter Manager
Netapp brocade San Navigator
Netapp solidfire \& Hci Storage Node
Netapp solidfire Enterprise Sds
Siemens 6bk1602-0aa12-0tp0
Siemens 6bk1602-0aa12-0tp0 Firmware
Siemens 6bk1602-0aa22-0tp0
Siemens 6bk1602-0aa22-0tp0 Firmware
Siemens 6bk1602-0aa32-0tp0
Siemens 6bk1602-0aa32-0tp0 Firmware
Siemens 6bk1602-0aa42-0tp0
Siemens 6bk1602-0aa42-0tp0 Firmware
Siemens 6bk1602-0aa52-0tp0
Siemens 6bk1602-0aa52-0tp0 Firmware
Siemens capital
CPEs cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:*
cpe:2.3:a:intel:datacenter_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire_enterprise_sds:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:capital:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:capital:2019.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:capital:2019.1:sp1912:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:3.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip_prepay:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2020.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2021.1:-:*:*:*:*:*:*
cpe:2.3:h:siemens:6bk1602-0aa12-0tp0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6bk1602-0aa22-0tp0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6bk1602-0aa32-0tp0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6bk1602-0aa42-0tp0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6bk1602-0aa52-0tp0:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:*
Vendors & Products Intel audio Development Kit
Intel data Center Manager
Intel sensor Solution Firmware Development Kit
Intel system Debugger
Siemens captial
Intel datacenter Manager
Netapp brocade San Navigator
Netapp solidfire \& Hci Storage Node
Netapp solidfire Enterprise Sds
Siemens 6bk1602-0aa12-0tp0
Siemens 6bk1602-0aa12-0tp0 Firmware
Siemens 6bk1602-0aa22-0tp0
Siemens 6bk1602-0aa22-0tp0 Firmware
Siemens 6bk1602-0aa32-0tp0
Siemens 6bk1602-0aa32-0tp0 Firmware
Siemens 6bk1602-0aa42-0tp0
Siemens 6bk1602-0aa42-0tp0 Firmware
Siemens 6bk1602-0aa52-0tp0
Siemens 6bk1602-0aa52-0tp0 Firmware
Siemens capital

Tue, 25 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Tue, 04 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-12-10'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 00:45:00 +0000

Type Values Removed Values Added
References

Subscriptions

Apache Log4j
Apple Xcode
Bentley Synchro Synchro 4d
Cisco Advanced Malware Protection Virtual Private Cloud Appliance Automated Subsea Tuning Broadworks Business Process Automation Cloud Connect Cloudcenter Cloudcenter Cost Optimizer Cloudcenter Suite Cloudcenter Suite Admin Cloudcenter Workload Manager Common Services Platform Collector Connected Mobile Experiences Contact Center Domain Manager Contact Center Management Portal Crosswork Data Gateway Crosswork Network Automation Crosswork Network Controller Crosswork Optimization Engine Crosswork Platform Infrastructure Crosswork Zero Touch Provisioning Customer Experience Cloud Agent Cx Cloud Agent Cyber Vision Cyber Vision Sensor Management Extension Data Center Network Manager Dna Center Dna Spaces Dna Spaces\ Dna Spaces Connector Emergency Responder Enterprise Chat And Email Evolved Programmable Network Manager Finesse Firepower 1010 Firepower 1120 Firepower 1140 Firepower 1150 Firepower 2110 Firepower 2120 Firepower 2130 Firepower 2140 Firepower 4110 Firepower 4112 Firepower 4115 Firepower 4120 Firepower 4125 Firepower 4140 Firepower 4145 Firepower 4150 Firepower 9300 Firepower Threat Defense Fog Director Fxos Identity Services Engine Integrated Management Controller Supervisor Intersight Virtual Appliance Iot Operations Dashboard Mobility Services Engine Network Assurance Engine Network Dashboard Fabric Controller Network Insights For Data Center Network Services Orchestrator Nexus Dashboard Nexus Insights Optical Network Controller Packaged Contact Center Enterprise Paging Server Prime Service Catalog Sd-wan Vmanage Smart Phy Ucs Central Ucs Central Software Ucs Director Unified Communications Manager Unified Communications Manager Im \& Presence Service Unified Communications Manager Im And Presence Service Unified Computing System Unified Contact Center Enterprise Unified Contact Center Express Unified Contact Center Management Portal Unified Customer Voice Portal Unified Intelligence Center Unified Sip Proxy Unified Workforce Optimization Unity Connection Video Surveillance Manager Video Surveillance Operations Manager Virtual Topology System Virtualized Infrastructure Manager Virtualized Voice Browser Wan Automation Engine Webex Meetings Server Workload Optimization Manager
Debian Debian Linux
Fedoraproject Fedora
Intel Computer Vision Annotation Tool Datacenter Manager Genomics Kernel Library Oneapi Sample Browser Secure Device Onboard System Studio
Netapp Active Iq Unified Manager Brocade San Navigator Cloud Insights Cloud Manager Cloud Secure Agent Oncommand Insight Ontap Tools Snapcenter Solidfire \& Hci Storage Node Solidfire Enterprise Sds
Percussion Rhythmyx
Redhat Amq Streams Camel Quarkus Integration Jboss Data Grid Jboss Enterprise Application Platform Jboss Enterprise Application Platform Eus Jboss Enterprise Bpms Platform Jboss Fuse Logging Openshift Openshift Application Runtimes
Siemens 6bk1602-0aa12-0tp0 6bk1602-0aa12-0tp0 Firmware 6bk1602-0aa22-0tp0 6bk1602-0aa22-0tp0 Firmware 6bk1602-0aa32-0tp0 6bk1602-0aa32-0tp0 Firmware 6bk1602-0aa42-0tp0 6bk1602-0aa42-0tp0 Firmware 6bk1602-0aa52-0tp0 6bk1602-0aa52-0tp0 Firmware Capital Comos Desigo Cc Advanced Reports Desigo Cc Info Center E-car Operation Center Energy Engage Energyip Energyip Prepay Gma-manager Head-end System Universal Device Integration System Industrial Edge Management Industrial Edge Management Hub Logo\! Soft Comfort Mendix Mindsphere Navigator Nx Opcenter Intelligence Operation Scheduler Sentron Powermanager Siguard Dsa Sipass Integrated Siveillance Command Siveillance Control Pro Siveillance Identity Siveillance Vantage Siveillance Viewpoint Solid Edge Cam Pro Solid Edge Harness Design Spectrum Power 4 Spectrum Power 7 Sppa-t3000 Ses3000 Sppa-t3000 Ses3000 Firmware Teamcenter Vesys Xpedition Enterprise Xpedition Package Integrator
Snowsoftware Snow Commander Vm Access Proxy
Sonicwall Email Security
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-10-21T23:25:23.121Z

Reserved: 2021-11-26T00:00:00.000Z

Link: CVE-2021-44228

cve-icon Vulnrichment

Updated: 2024-08-04T04:17:24.696Z

cve-icon NVD

Status : Analyzed

Published: 2021-12-10T10:15:09.143

Modified: 2026-02-20T16:15:59.363

Link: CVE-2021-44228

cve-icon Redhat

Severity : Critical

Publid Date: 2021-12-10T02:01:00Z

Links: CVE-2021-44228 - Bugzilla

cve-icon OpenCVE Enrichment

No data.