It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

Project Subscriptions

Vendors Products
Computer Vision Annotation Tool Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Audio Development Kit Subscribe
Datacenter Manager Subscribe
Genomics Kernel Library Subscribe
Secure Device Onboard Subscribe
Sensor Solution Firmware Development Kit Subscribe
System Debugger Subscribe
System Studio Subscribe
Amq Streams Subscribe
Camel Quarkus Subscribe
Integration Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Fuse Subscribe
Logging Subscribe
Openshift Subscribe
Openshift Application Runtimes Subscribe
Siemens Subscribe
6bk1602-0aa12-0tp0 Subscribe
6bk1602-0aa12-0tp0 Firmware Subscribe
6bk1602-0aa22-0tp0 Subscribe
6bk1602-0aa22-0tp0 Firmware Subscribe
6bk1602-0aa32-0tp0 Subscribe
6bk1602-0aa32-0tp0 Firmware Subscribe
6bk1602-0aa42-0tp0 Subscribe
6bk1602-0aa42-0tp0 Firmware Subscribe
6bk1602-0aa52-0tp0 Subscribe
6bk1602-0aa52-0tp0 Firmware Subscribe
Captial Subscribe
Desigo Cc Advanced Reports Subscribe
Desigo Cc Info Center Subscribe
E-car Operation Center Subscribe
Energy Engage Subscribe
Energyip Subscribe
Energyip Prepay Subscribe
Gma-manager Subscribe
Head-end System Universal Device Integration System Subscribe
Industrial Edge Management Subscribe
Industrial Edge Management Hub Subscribe
Logo\! Soft Comfort Subscribe
Mindsphere Subscribe
Navigator Subscribe
Opcenter Intelligence Subscribe
Operation Scheduler Subscribe
Sentron Powermanager Subscribe
Siguard Dsa Subscribe
Sipass Integrated Subscribe
Siveillance Command Subscribe
Siveillance Control Pro Subscribe
Siveillance Identity Subscribe
Siveillance Vantage Subscribe
Siveillance Viewpoint Subscribe
Solid Edge Cam Pro Subscribe
Solid Edge Harness Design Subscribe
Spectrum Power 4 Subscribe
Spectrum Power 7 Subscribe
Sppa-t3000 Ses3000 Subscribe
Sppa-t3000 Ses3000 Firmware Subscribe
Teamcenter Subscribe
Tracealertserverplus Subscribe
Xpedition Enterprise Subscribe
Xpedition Package Integrator Subscribe
Sonicwall Subscribe
Email Security Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5022-1 apache-log4j2 security update
Github GHSA Github GHSA GHSA-7rjr-3q55-vv33 Incomplete fix for Apache Log4j vulnerability
Ubuntu USN Ubuntu USN USN-5197-1 Apache Log4j 2 vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://www.openwall.com/lists/oss-security/2021/12/14/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/15/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/12/18/1 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2021-44228 cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/ cve-icon cve-icon
https://logging.apache.org/log4j/2.x/security.html cve-icon cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-45046 cve-icon
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 cve-icon cve-icon
https://security.gentoo.org/glsa/202310-16 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd cve-icon cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-45046 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-44228 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-45046 cve-icon
https://www.debian.org/security/2021/dsa-5022 cve-icon cve-icon
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html cve-icon cve-icon
https://www.kb.cert.org/vuls/id/930724 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2021/12/14/4 cve-icon
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2022.html cve-icon cve-icon
History

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.9434}

epss

{'score': 0.94434}


Tue, 25 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Wed, 05 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-05-01'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 31 Oct 2024 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Cvat
Cvat computer Vision Annotation Tool
CPEs cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:* cpe:2.3:a:cvat:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
Vendors & Products Intel computer Vision Annotation Tool
Cvat
Cvat computer Vision Annotation Tool

Wed, 14 Aug 2024 00:45:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-10-21T23:25:22.768Z

Reserved: 2021-12-14T00:00:00.000Z

Link: CVE-2021-45046

cve-icon Vulnrichment

Updated: 2024-08-04T04:32:13.624Z

cve-icon NVD

Status : Analyzed

Published: 2021-12-14T19:15:07.733

Modified: 2025-10-27T17:35:56.240

Link: CVE-2021-45046

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-12-14T00:00:00Z

Links: CVE-2021-45046 - Bugzilla

cve-icon OpenCVE Enrichment

No data.