QID 317118
Date Published: 2021-12-13
QID 317118: Cisco Application Policy Infrastructure Controller (APIC) Apache Log4j Vulnerability (cisco-sa-apache-log4j-qRuKNEbd)
This bug has been filed to evaluate the product against the vulnerability in the Apache Log4j Java library disclosed on December 9th, 2021.
Cisco has reviewed this product and concluded that it contains a vulnerable version of Apache Log4j and is affected by the following vulnerability:
Affected Products:
Cisco Nexus Dashboard (Cisco APIC) Prior to v2.1.2c (7-Jan-2022)
Note:Potential detection as the workaround cannot be checked.
QID Detection Logic(Authenticated):
The check matches Cisco APIC version retrieved via Unix Auth using "show version" command.
Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints
Customers are advised to refer to cisco-sa-apache-log4j-qRuKNEbd for more information.Workaround:
Mitigate the problem by installing ND in a secure network that disallows external access to ND on these ports - TCP/9003, UDP/5640, and UDP/30000 (e.g. using a firewall).
- cisco-sa-apache-log4j-qRuKNEbd -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
CVEs related to QID 317118
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-apache-log4j-qRuKNEbd |
|