Description
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
Published: 2021-12-14
Score: 9 Critical
EPSS: 94.3% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5022-1 apache-log4j2 security update
Github GHSA Github GHSA GHSA-7rjr-3q55-vv33 Incomplete fix for Apache Log4j vulnerability
Ubuntu USN Ubuntu USN USN-5197-1 Apache Log4j 2 vulnerability
References
Link Providers
http://www.openwall.com/lists/oss-security/2021/12/14/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/15/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/18/1 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2021-44228 cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/ cve-icon cve-icon
https://logging.apache.org/log4j/2.x/security.html cve-icon cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-45046 cve-icon
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 cve-icon cve-icon
https://security.gentoo.org/glsa/202310-16 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-45046 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-44228 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-45046 cve-icon
https://www.debian.org/security/2021/dsa-5022 cve-icon cve-icon
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html cve-icon cve-icon
https://www.kb.cert.org/vuls/id/930724 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2021/12/14/4 cve-icon
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2022.html cve-icon cve-icon
History

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.9434}

epss

{'score': 0.94434}


Tue, 25 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Wed, 05 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-05-01'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 31 Oct 2024 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Cvat
Cvat computer Vision Annotation Tool
CPEs cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:* cpe:2.3:a:cvat:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
Vendors & Products Intel computer Vision Annotation Tool
Cvat
Cvat computer Vision Annotation Tool

Wed, 14 Aug 2024 00:45:00 +0000

Type Values Removed Values Added
References

Subscriptions

Apache Log4j
Cvat Computer Vision Annotation Tool
Debian Debian Linux
Fedoraproject Fedora
Intel Audio Development Kit Datacenter Manager Genomics Kernel Library Oneapi Secure Device Onboard Sensor Solution Firmware Development Kit System Debugger System Studio
Redhat Amq Streams Camel Quarkus Integration Jboss Data Grid Jboss Enterprise Application Platform Jboss Enterprise Application Platform Eus Jboss Fuse Logging Openshift Openshift Application Runtimes
Siemens 6bk1602-0aa12-0tp0 6bk1602-0aa12-0tp0 Firmware 6bk1602-0aa22-0tp0 6bk1602-0aa22-0tp0 Firmware 6bk1602-0aa32-0tp0 6bk1602-0aa32-0tp0 Firmware 6bk1602-0aa42-0tp0 6bk1602-0aa42-0tp0 Firmware 6bk1602-0aa52-0tp0 6bk1602-0aa52-0tp0 Firmware Captial Comos Desigo Cc Advanced Reports Desigo Cc Info Center E-car Operation Center Energy Engage Energyip Energyip Prepay Gma-manager Head-end System Universal Device Integration System Industrial Edge Management Industrial Edge Management Hub Logo\! Soft Comfort Mendix Mindsphere Navigator Nx Opcenter Intelligence Operation Scheduler Sentron Powermanager Siguard Dsa Sipass Integrated Siveillance Command Siveillance Control Pro Siveillance Identity Siveillance Vantage Siveillance Viewpoint Solid Edge Cam Pro Solid Edge Harness Design Spectrum Power 4 Spectrum Power 7 Sppa-t3000 Ses3000 Sppa-t3000 Ses3000 Firmware Teamcenter Tracealertserverplus Vesys Xpedition Enterprise Xpedition Package Integrator
Sonicwall Email Security
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-10-21T23:25:22.768Z

Reserved: 2021-12-14T00:00:00.000Z

Link: CVE-2021-45046

cve-icon Vulnrichment

Updated: 2024-08-04T04:32:13.624Z

cve-icon NVD

Status : Analyzed

Published: 2021-12-14T19:15:07.733

Modified: 2025-10-27T17:35:56.240

Link: CVE-2021-45046

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-12-14T00:00:00Z

Links: CVE-2021-45046 - Bugzilla

cve-icon OpenCVE Enrichment

No data.