CVE-2021-4104 
                        Detail
                     
                    
                    
                        
                            
                                
                                    Modified This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.
                                 
                             
                            
                            Current Description  
                            JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
                            
                                
                                    
                                
                                    Analysis
                                        Description 
                                    JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
                                 
                            
                            
                            
                            
                                Metrics 
                                 
                                
                                    CVSS Version 4.0
                                     
                                    CVSS Version 3.x
                                     
                                    CVSS Version 2.0
                                     
                                
                                
                                    
                                        
                                            NVD enrichment efforts reference publicly available information to associate
                                            vector strings. CVSS information contributed by other sources is also
                                            displayed.
                                         
                                     
                                
                                
                                
                                    CVSS 4.0 Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
                                       
                                             NVD assessment
                                       not yet provided.   
                                     
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 3.x Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
												Vector:  
													CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H 
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 2.0 Severity and Vector Strings:   
                                    
                                    
                                        
                                        
                                        
												Vector:  
													(AV:N/AC:M/Au:S/C:P/I:P/A:P) 
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                             
                            
                                
                                
                                
                                
                                    References to Advisories, Solutions, and Tools 
                                    
                                        By selecting these links, you will be leaving NIST webspace.
                                        We have provided these links to other web sites because they
                                        may have information that would be of interest to you. No
                                        inferences should be drawn on account of other sites being
                                        referenced, or not, from this page. There may be other web
                                        sites that are more appropriate for your purpose. NIST does
                                        not necessarily endorse the views expressed, or concur with
                                        the facts presented on these sites. Further, NIST does not
                                        endorse any commercial products that may be mentioned on
                                        these sites. Please address comments about this page to [email protected] 
                                    
                                        
                                        
                                            URL 
                                            Source(s) 
                                            Tag(s) 
                                         
                                         
                                        
                                        
                                            
                                            
                                                http://www.openwall.com/lists/oss-security/2022/01/18/3 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://access.redhat.com/security/cve/CVE-2021-4104 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://security.gentoo.org/glsa/202209-02 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://security.gentoo.org/glsa/202310-16 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://security.gentoo.org/glsa/202312-02 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://security.gentoo.org/glsa/202312-04 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://security.netapp.com/advisory/ntap-20211223-0007/ 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://www.cve.org/CVERecord?id=CVE-2021-44228 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://www.kb.cert.org/vuls/id/930724 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://www.oracle.com/security-alerts/cpuapr2022.html 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://www.oracle.com/security-alerts/cpujan2022.html 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                        
                                            
                                            
                                                https://www.oracle.com/security-alerts/cpujul2022.html 
                                             
                                            
                                            Apache Software Foundation, CVE 
                                            
                                            
                                                
                                             
                                         
                                         
                                    
                                 
                                
                                
                                    Weakness Enumeration 
                                    
                                        
                                        
                                            CWE-ID 
                                            CWE Name 
                                            Source 
                                         
                                         
                                        
                                        
                                            
                                                CWE-502 
                                                
                                             
                                            Deserialization of Untrusted Data 
                                            
														
														NIST   
														 
														
														
															
															
															
														
														Apache Software Foundation   
														 
                                             
                                         
                                         
                                    
                                 
                                
                                
                                    Change History 
                                     19 change records found show changes 
                                     
                                    
	
		
			 
			
				CVE Modified by CVE  11/21/2024 1:36:54 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.openwall.com/lists/oss-security/2022/01/18/3 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://access.redhat.com/security/cve/CVE-2021-4104 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/202209-02 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/202310-16 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/202312-02 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/202312-04 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.netapp.com/advisory/ntap-20211223-0007/ 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.cve.org/CVERecord?id=CVE-2021-44228 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.kb.cert.org/vuls/id/930724 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.oracle.com/security-alerts/cpuapr2022.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.oracle.com/security-alerts/cpujan2022.html 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.oracle.com/security-alerts/cpujul2022.html 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Apache Software Foundation  5/14/2024 5:47:22 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				CVE Modified by Apache Software Foundation  12/22/2023 4:15:36 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://security.gentoo.org/glsa/202312-04 [No types assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Apache Software Foundation  12/20/2023 3:15:42 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://security.gentoo.org/glsa/202312-02 [No types assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Source Update by Apache Software Foundation  11/06/2023 10:40:10 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						Source 
						
							
							
							
								Red Hat, Inc. 
								  
							
						
							
								Apache Software Foundation 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Apache Software Foundation  11/06/2023 10:40:10 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CWE 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation CWE-502 
								  
					 
					
						Removed 
						CWE 
						
							
							
							
								Red Hat, Inc. CWE-502 
								  
							
						
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation http://www.openwall.com/lists/oss-security/2022/01/18/3 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://access.redhat.com/security/cve/CVE-2021-4104 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://security.gentoo.org/glsa/202209-02 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://security.gentoo.org/glsa/202310-16 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://security.netapp.com/advisory/ntap-20211223-0007/ [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://www.cve.org/CVERecord?id=CVE-2021-44228 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://www.kb.cert.org/vuls/id/930724 [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://www.oracle.com/security-alerts/cpuapr2022.html [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://www.oracle.com/security-alerts/cpujan2022.html [No types assigned] 
								  
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								Apache Software Foundation https://www.oracle.com/security-alerts/cpujul2022.html [No types assigned] 
								  
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. http://www.openwall.com/lists/oss-security/2022/01/18/3 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://access.redhat.com/security/cve/CVE-2021-4104 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://security.gentoo.org/glsa/202209-02 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://security.gentoo.org/glsa/202310-16 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://security.netapp.com/advisory/ntap-20211223-0007/ 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://www.cve.org/CVERecord?id=CVE-2021-44228 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://www.kb.cert.org/vuls/id/930724 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://www.oracle.com/security-alerts/cpuapr2022.html 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://www.oracle.com/security-alerts/cpujan2022.html 
								  
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								Red Hat, Inc. https://www.oracle.com/security-alerts/cpujul2022.html 
								  
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  10/26/2023 3:15:37 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/202310-16 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  10/05/2022 1:53:48 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						CPE Configuration 
						
							
							
							
								OR
     *cpe:2.3:a:oracle:retail_allocation:14.1.3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:retail_allocation:15.0.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:retail_allocation:16.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:retail_allocation:19.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* 
								  
							
						
							
								
								Record truncated, showing 2048 of 3578 characters.  View Entire Change Record OR
     *cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*
     *cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*
     *cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*
     *cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:* versions up to (excluding) 12.0.0.4.0
     *cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:fusion_middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:goldengate: 
								
								
						 
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://security.gentoo.org/glsa/202209-02 No Types Assigned 
								  
							
						
							
								https://security.gentoo.org/glsa/202209-02 Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.oracle.com/security-alerts/cpuapr2022.html No Types Assigned 
								  
							
						
							
								https://www.oracle.com/security-alerts/cpuapr2022.html Patch, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.oracle.com/security-alerts/cpujul2022.html No Types Assigned 
								  
							
						
							
								https://www.oracle.com/security-alerts/cpujul2022.html Third Party Advisory 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  9/07/2022 1:15:11 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.gentoo.org/glsa/202209-02 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  7/25/2022 2:18:30 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.oracle.com/security-alerts/cpujul2022.html [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  4/19/2022 8:16:34 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.oracle.com/security-alerts/cpuapr2022.html [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  2/18/2022 11:35:57 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CWE 
						
							
							
								
								
							
							
						 
							
						
							
								NIST CWE-502 
								  
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								OR
     *cpe:2.3:a:oracle:retail_allocation:14.1.3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:retail_allocation:15.0.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:retail_allocation:16.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:retail_allocation:19.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								http://www.openwall.com/lists/oss-security/2022/01/18/3 No Types Assigned 
								  
							
						
							
								http://www.openwall.com/lists/oss-security/2022/01/18/3 Mailing List 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.oracle.com/security-alerts/cpujan2022.html No Types Assigned 
								  
							
						
							
								https://www.oracle.com/security-alerts/cpujan2022.html Patch, Third Party Advisory 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  2/07/2022 11:16:38 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.oracle.com/security-alerts/cpujan2022.html [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  1/18/2022 2:15:10 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								http://www.openwall.com/lists/oss-security/2022/01/18/3 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				Modified Analysis by NIST  1/06/2022 8:45:13 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CVSS V3.1 
						
							
							
								
								
							
							
						 
							
						
							
								NIST AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H 
								  
					 
					
						Removed 
						CVSS V3.1 
						
							
							
							
								NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H 
								  
							
						
								
								
						 
					 
					
						Added 
						CVSS V2 
						
							
							
								
								
							
							
						 
							
						
							
								NIST (AV:N/AC:M/Au:S/C:P/I:P/A:P) 
								  
					 
					
						Removed 
						CVSS V2 
						
							
							
							
								NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P) 
								  
							
						
								
								
						 
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 No Types Assigned 
								  
							
						
							
								https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://security.netapp.com/advisory/ntap-20211223-0007/ No Types Assigned 
								  
							
						
							
								https://security.netapp.com/advisory/ntap-20211223-0007/ Third Party Advisory 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  12/23/2021 8:15:10 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://security.netapp.com/advisory/ntap-20211223-0007/ [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  12/21/2021 6:15:09 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 [No Types Assigned] 
								  
					 
				 
			
		 
	
		
			 
			
				Initial Analysis by NIST  12/16/2021 4:18:16 PM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						CVSS V3.1 
						
							
							
								
								
							
							
						 
							
						
							
								NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H 
								  
					 
					
						Added 
						CVSS V2 
						
							
							
								
								
							
							
						 
							
						
							
								NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P) 
								  
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								OR
     *cpe:2.3:a:apache:log4j:1.2:*:*:*:*:*:*:* 
								  
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								OR
     *cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_a-mq_streaming:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* 
								  
					 
					
						Added 
						CPE Configuration 
						
							
							
								
								
							
							
						 
							
						
							
								OR
     *cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://access.redhat.com/security/cve/CVE-2021-4104 No Types Assigned 
								  
							
						
							
								https://access.redhat.com/security/cve/CVE-2021-4104 Mitigation, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 No Types Assigned 
								  
							
						
							
								https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 Issue Tracking, Patch, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.cve.org/CVERecord?id=CVE-2021-44228 No Types Assigned 
								  
							
						
							
								https://www.cve.org/CVERecord?id=CVE-2021-44228 Not Applicable, Third Party Advisory 
								  
					 
					
						Changed 
						Reference Type 
						
							
							
							
								https://www.kb.cert.org/vuls/id/930724 No Types Assigned 
								  
							
						
							
								https://www.kb.cert.org/vuls/id/930724 Mitigation, Patch, Third Party Advisory, US Government Resource 
								  
					 
				 
			
		 
	
		
			 
			
				CVE Modified by Red Hat, Inc.  12/16/2021 12:15:09 AM  
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://www.kb.cert.org/vuls/id/930724 [No Types Assigned] 
								  
					 
				 
			
		  
	 
                                 
                             
                         
                        
                            
                                Quick Info 
                                CVE Dictionary Entry:  CVE-2021-4104  NVD
                                Published Date:  12/14/2021  NVD
                                Last Modified:  11/21/2024  
                                Source:  Apache Software Foundation