CVE-2021-44228

GPTKB entity

Statements (61)
Predicate Object
gptkbp:instance_of gptkb:terrorist_attack
gptkbp:bfsLayer 3
gptkbp:bfsParent gptkb:Company
gptkbp:availability gptkb:High
Publicly available.
gptkbp:certification 10.0
gptkbp:content_type Full disclosure
gptkbp:data_privacy gptkb:High
gptkbp:defense_mechanism JNDI injection.
gptkbp:difficulty Critical
critical
gptkbp:discovered_by December 9, 2021
Security researcher.
gptkbp:distributor gptkb:software_framework
gptkbp:enemy gptkb:television_channel
gptkbp:game_components JNDI.
https://www.w3.org/2000/01/rdf-schema#label CVE-2021-44228
gptkbp:impact Java applications
Allows attackers to execute arbitrary code.
Remote Code Execution (RCE)
gptkbp:interacts_with gptkb:None
gptkbp:is_a_solution_for Upgrade to Log4j 2.15.0 or later.
gptkbp:is_described_as A critical vulnerability in Apache Log4j 2.
gptkbp:is_protected_by Disable Jndi Lookup class.
gptkbp:is_referenced_in https://nvd.nist.gov/vuln/detail/ CVE-2021-44228
gptkbp:is_vulnerable_to Ongoing.
Code Injection
Easily exploitable
JNDI lookup exploit
Responsible disclosure.
Severe impact on security.
Under investigation.
Zero-day.
gptkbp:latest_version Log4j 2.0 to 2.14.1
gptkbp:objective Unchanged
gptkbp:platform Any platform using Log4j.
gptkbp:published_year 2021-12-10
gptkbp:related_model gptkb:CVE-2021-45046
gptkb:CVE-2021-45105
gptkbp:released Available.
gptkbp:reports_to CVE Numbering Authority (CNA)
Git Hub user
gptkbp:restoration Update to the latest version.
gptkbp:risk_factor High.
gptkbp:role gptkb:None
gptkbp:runtime gptkb:High
gptkbp:security_features gptkb:High
Severe.
Critical.
Apache Log4j Security Advisory.
Immediate response required.
Log4j 2.15.0.
Monitor systems for exploitation.
gptkbp:status Publicly disclosed
gptkbp:supports gptkb:Apache_Log4j_2.x
Web servers using Log4j.
gptkbp:sustainability_initiatives Apply security patches.
gptkbp:threats gptkb:Low
gptkbp:type Vulnerability
gptkbp:updates Log4j 2.16.0.
gptkbp:year_created 2021-12-09