Skip to main content
NetApp Knowledge Base

CVE-2021-44228 vulnerability is reported on SnapCenter Server

Views:
257
Visibility:
Public
Votes:
0
Category:
snapcenter
Specialty:
snapx
Last Updated:

Applies to

  • SnapCenter Server (4.3 and earlier)

Issue

A security scan reports a critical vulnerability on the SnapCenter Server (Windows)

Plugin id:
	156002

Plugin Name:
	Apache Log4j < 2.15.0 Remote Code Execution

Severity:
	critical

Plugin Text:
	
	"<plugin_output>
	  Path              : C:\Program Files\NetApp\SnapCenter\SnapCenter Plugin for VMware\lib\log4j-1.2.17.jar
	  Installed version : 1.2.17
	  Fixed version     : 2.15.0
	</plugin_output>"


Description:
	"The version of Apache Log4j on the remote host is < 2.15.0. It is, therefore, affected by a remote code execution vulnerability in the JDNI parser due to improper log validation. 
	An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands. 

	Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number."


Solution:
	Upgrade to Apache Log4j version 2.15.0 or later, or apply the vendor mitigation.


CVE:
	CVE-2021-44228

CVSSv3 Score:	
	10

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.