Date Published: 2021-12-22
QID 317121: Cisco Unified Communications Manager IM and Presence Service (formerly CUPS) Apache Log4j Vulnerability (cisco-sa-apache-log4j-qRuKNEbd)
This bug has been filed to evaluate the product against the vulnerability in the Apache Log4j Java library disclosed on December 9th, 2021.
Cisco has reviewed this product and concluded that it contains a vulnerable version of Apache Log4j and is affected by the following vulnerability:
Cisco Unified Communications Manager IM And Presence Service (formerly CUPS) following versons: 11.5(1)SU7
Note: All version that are "End of Support" are not evaluated
QID Detection Logic (Authenticated):
The check matches the Cisco Unified Communications Product version retrieved via Unix Auth using " Active Master Version:" command.
Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints
Customers are advised to refer to cisco-sa-apache-log4j-qRuKNEbd for more information.Workaround:
The following COP file has been published to address the log4j vulnerability (CVE-2021-44228) to be applied through CLI only: ciscocm.V11.5_log4j_CVE-2021-44228_C0156-3.k4.cop.sha512
- cisco-sa-apache-log4j-qRuKNEbd - tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd