QID 317118

Date Published: 2021-12-13

QID 317118: Cisco Application Policy Infrastructure Controller (APIC) Apache Log4j Vulnerability (cisco-sa-apache-log4j-qRuKNEbd)

This bug has been filed to evaluate the product against the vulnerability in the Apache Log4j Java library disclosed on December 9th, 2021.

Cisco has reviewed this product and concluded that it contains a vulnerable version of Apache Log4j and is affected by the following vulnerability:

Affected Products:
Cisco Nexus Dashboard (Cisco APIC) Prior to v2.1.2c (7-Jan-2022)
Note:Potential detection as the workaround cannot be checked.

QID Detection Logic(Authenticated):
The check matches Cisco APIC version retrieved via Unix Auth using "show version" command.

Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints

  • CVSS V3 rated as Critical - 10 severity.
  • CVSS V2 rated as Critical - 9.3 severity.
  • Solution

    Customers are advised to refer to cisco-sa-apache-log4j-qRuKNEbd for more information.Workaround:
    Mitigate the problem by installing ND in a secure network that disallows external access to ND on these ports - TCP/9003, UDP/5640, and UDP/30000 (e.g. using a firewall).

    CVEs related to QID 317118

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-apache-log4j-qRuKNEbd URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd