pitstop.manageengine.com Open in urlscan Pro
136.143.190.74  Public Scan

URL: https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengin...
Submission: On January 18 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Welcome to manageengine Portal

Skip to Content Skip to Menu Skip to Footer


?Unknown
ManageEngine | Community and Support
 * Home
 * My Requests
 * Help Center
 * Community
 * * Sign In
   * Sign Up
 * Font Size
   -+
   Layout
   
   Full Width
   

 * Knowledge Base
 * Community




TICKETS


KEEP TRACK OF YOUR TICKETS AND MONITOR YOUR TEAM'S DATA.



KNOWLEDGE BASE


BROWSE THE KNOWLEDGE BASE AND FIND SOLUTIONS.




JOIN THE MANAGEENGINE COMMUNITY


 * Community
 * ManageEngine
 * Security




UPDATE ON THE RECENT APACHE LOG4J2 VULNERABILITY - IMPACT ON MANAGEENGINE
ON-PREMISES PRODUCTS

 * Priyanka
   Follow
 * Priyanka
 * Discussion
 * 1 month ago



A high severity vulnerability (CVE-2021-44228) impacting multiple versions of
the Apache Log4j2 utility was disclosed publicly on December 9, 2021. The
vulnerability impacts Apache Log4j2 versions below 2.15.0. Find the details of
this vulnerability documented here:
https://logging.apache.org/log4j/2.x/security.html



ManageEngine products bundled with vulnerable Log4j2 (as of 13th December,
2021):

 

Product name

Jar version in bundled dependency

ADManager Plus

V2.11.1

ADAudit Plus

V2.10.0

DataSecurity Plus

V2.10.0

EventLog Analyzer

V2.9.1

M365 Manager Plus

V2.11.1

RecoveryManager Plus

V2.11.1

Exchange Reporter Plus

V2.11.1

Log360

V2.9.1

Log360 UEBA

V2.11.1

Cloud Security Plus

V2.9.1

M365 Security Plus

V2.11.1

Analytics Plus

V2.7

 

 

Please note that we have not identified any exploitable cases due to Log4j2 in
the above products as we do not use Log4j directly for logging. But, some of the
third parties we use bundle Log4j2 as a dependency. So as an additional safety
measure, customers are instructed to apply the mitigation steps listed below:

 


 1.  ADManager Plus 
 2.  ADAudit Plus 
 3.  DataSecurity Plus 
 4.  EventLog Analyzer 
 5.  M365 Manager Plus
     
 6.  M365 Security Plus 
     
 7.  RecoveryManager Plus
 8.  Exchange Reporter Plus 
 9.  Log360
     
 10. Log360 UEBA
     
 11. Cloud Security Plus
     
 12. Analytics Plus

 

Other ManageEngine products that are not listed above are not impacted by this
vulnerability.

We are continuing to analyze the issue and will update this advisory if any new
information becomes available.

 

For any additional details or assistance, please contact
security@manageengine.com






5 users find this useful.



32 REPLIES

Reply
20 more
CB
CB
Craig B
Follow
 * Craig B
 * 1 month ago

We are finding vulnerable log4j in the java that is installed with AdSelfService
portal. Specifically java SE runtime 8 update 162. Wasn't sure if we could
remove/update that without breaking the underlying ADselfservice


CB
CB
Craig B
Follow
 * Craig B
 * 1 month ago

To update my post above I see the same issue with java installed by AdAudit Plus
and OpManager both have versions of java installed in ManageEngine\"name of
product"\jre\bin that shows old version of log4j so my same question applies.
How do you go about patching or removing java from these products


CB
CB
Craig B
Follow
 * Craig B
 * 1 month ago

This has nothing to do with the jar files in LIB, the report we are getting from
our AV product is very specific to the java that must be installed with it.
Listed under installation folder\jre\bin


RW
RW
Rick Wegner
Follow
 * Rick Wegner
 * 1 month ago

Is there an update on Log4j 1.x Vulnerability (CVE-2021-4104) considering this
CVE potentially affects products not listed like ServiceDesk Plus.

Do the Log4j 1.2 products in ServiceDesk Plus have JMSAppender configured?

From https://www.kb.cert.org/vuls/id/930724
"To mitigate: audit your logging configuration to ensure it has no JMSAppender
configured. Log4j 1.x configurations without JMSAppender are not impacted by
this vulnerability. "


PA
PA
Patrik
Follow
 * Patrik
 * 30 days ago

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104
CVE-2021-4104 log4j version 1.2.x is vulnerable.
Its used in both Password Manager and ADselfservice to my knowledge. Any advice
as of yet?


BR
BR
Brian
Follow
 * Brian
 * 29 days ago

found this on an up to date Desktop Central install:
LICENSE Log4j.txt
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
And:
C:\ManageEngine\DesktopCentral_Server\Patch\ManageEngine_Desktop_Central-10.1.0-SP-2127.20\SERVER\lib\log4j-1.2.15.jar


Akshaya M
Follow
 * Akshaya M
 * 29 days ago

Hello Brian,

Desktop Central product is not affected by the recent apache RCE, since the
log4j 1.x version library is not vulnerable to the CVE-2021-44228. We've
mentioned all the affected ManageEngine products above in the post.

Regarding the jar located in Patch directory,
1. Before installation of PPM, as per our flow the existing data will be backed
up to the location <Installation_Folder>\Patch\
2. This backup will only be used to restore the setup in-case of any failure
while installing the PPM.
3. After successful installation of the PPM, the Patch folder will be cleaned by
routine monthly scheduler task and the jar files present inside this folder will
not be used anywhere in the class-path.

Thanks.


RO
RO
ross
Follow
 * ross
 * 27 days ago

dear ME people,

in this thread and others i've seen you all note that "since the log4j 1.x
version library is not vulnerable to the CVE-2021-44228." this is, of course,
true.

but i think many of us are just learning that we have log4j 1.x as integral
parts of our ManageEngine products and we'd like to know what/when you'll be
doing something about it. it went EOL in august of 2015, so it's been a full 6
years since anyone paid attention to vulnerabilities, and there appear to be
many.


RO
RO
ross
Follow
 * ross
 * 27 days ago

there is a patch available for ADSelfService Plus that removes the log4j
dependency.

https://www.manageengine.com/products/self-service-password/service-pack.html

the most recent (6119).

after the installation, the log4j-.1.x files are moved to 'patch' directories -
like \ManageEngine\ADSelfService
Plus\Patch\ManageEngine_ADSelfService_Plus-5.5.0-SP-9.9.0\SERVER\lib - at which
point, they can be deleted. see the notes above for deletion.


SA
SA
Sam
Follow
 * Sam
 * 25 days ago

Hi ME people,

Appended to mr. Ross's post, I'd just like to add that we also got no response
for an update on Log4j 1.x Vulnerability (CVE-2021-4104). You all mention
CVE-2021-44228, but not 4104. Much appreciated.


JA
JA
jacob aguinaga
Follow
 * jacob aguinaga
 * 21 days ago

Is there any update on these? I am still seeing a handful of ME products with
vulnerable outdated versions still being marked critical with multiple
vulnerability scanners.


GS
GS
gsezen
Follow
 * gsezen
 * 20 days ago

https://nvd.nist.gov/vuln/detail/CVE-2021-44228

CVE-2021-44228 Detail
Current Description
Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features
used in configuration, log messages, and parameters do not protect against
attacker controlled LDAP and other JNDI related endpoints. An attacker who can
control log messages or log message parameters can execute arbitrary code loaded
from LDAP servers when message lookup substitution is enabled. From log4j
2.15.0, this behavior has been disabled by default. From version 2.16.0, this
functionality has been completely removed. Note that this vulnerability is
specific to log4j-core and does not affect log4net, log4cxx, or other Apache
Logging Services projects.

QUICK INFO
CVE Dictionary Entry:
CVE-2021-44228
NVD Published Date:
12/10/2021
NVD Last Modified:
12/28/2021
Source:
Apache Software Foundation


Reply to Priyanka
A

Attach a file(Up to 20 MB )

Add Comment

Add Topic
Follow
Subscribe to receive notifications from this topic.

STATS


32 followers
32 replies
32.4k views

TAGS


security
apache
vulnerability

PARTICIPANTS


BM
loading...
Barry Mcnamara
CC
loading...
Chris CB
PH
loading...
Phil
JK
loading...
Joshua Kubli
BR
loading...
Brock
more


Still can’t find an answer?
Send us a ticket and we will get back to you.
Submit a ticket
Still can’t find an answer?
Create a ticket, and we will get back to you.
Create a Ticket

COMPANY

 * About us
 * News
 * Events
 * Customers
 * PitStop
 * Partner portal
 * Government
 * Newsletter
 * Cookie Policy
 * Careers
 * Site map
 * Trademarks
 * EULA
 * Contact us
 * Feedback
 * Privacy policy
 * Security Response Center

REGIONAL WEBSITES

 * Global (English)
   * América Latina (Spanish)
   * Australia (English)
   * Brazil (Português)
   * China (中文)
   * Denmark (norsk)
   * Deutschland (German)
   * Europe (English)
   * France (French)
   * Greek (English)
   * India (English)
   * Israel (עברית)
   * Italy (italiano)
   * Japan (日本語)
   * Korea (한국어)
   * México (Español)
   * Nederland (Dutch)
   * Poland (Polskie)
   * Russian (русский)
   * Schweiz (French)
   * South Africa (English)
   * Spain (España)
   * Sverige (svenska)
   * Taiwan (中文)
   * Türkiye (Türk)
   * United Kingdom (English)

FOLLOW US:


ManageEngine is a division of
Zoho Corp.

© 2021, Zoho Corp. All Rights Reserved.


We're Online!

How may I help you today?