Advisory Published

FG-IR-21-245: Apache log4j2 log messages substitution (CVE-2021-44228)

First published: Sun Dec 12 2021(Updated: )

Apache Log4j <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled (CVE-2021-44228).

Affected SoftwareAffected VersionHow to fix
Apache Log4j<=2.14.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of FG-IR-21-245?

    The severity of FG-IR-21-245 is critical due to the potential for remote code execution.

  • How do I fix FG-IR-21-245?

    To fix FG-IR-21-245, upgrade Apache Log4j to version 2.15.0 or later.

  • What products are affected by FG-IR-21-245?

    FG-IR-21-245 affects Apache Log4j versions up to and including 2.14.1.

  • What type of vulnerability is FG-IR-21-245?

    FG-IR-21-245 is a remote code execution vulnerability caused by JNDI features in Apache Log4j.

  • Can FG-IR-21-245 be exploited remotely?

    Yes, FG-IR-21-245 can be exploited remotely if an attacker can control log messages or parameters.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203