Critical vulnerabilities in Apache Log4j identified by CVE-2021-44228 and CVE-2021-45046
1. Impacted Products (Under Evaluation)
- VMware Horizon
- VMware vCenter Server
- VMware HCX
- VMware NSX-T Data Center
- VMware Unified Access Gateway
- VMware WorkspaceOne Access
- VMware Identity Manager
- VMware vRealize Operations
- VMware vRealize Operations Cloud Proxy
- VMware vRealize Automation
- VMware vRealize Lifecycle Manager
- VMware Site Recovery Manager, vSphere Replication
- VMware Carbon Black Cloud Workload Appliance
- VMware Carbon Black EDR Server
- VMware Tanzu GemFire
- VMware Tanzu GemFire for VMs
- VMware Tanzu Greenplum
- VMware Tanzu Operations Manager
- VMware Tanzu Application Service for VMs
- VMware Tanzu Kubernetes Grid Integrated Edition
- VMware Tanzu Observability by Wavefront Nozzle
- Healthwatch for Tanzu Application Service
- Spring Cloud Services for VMware Tanzu
- Spring Cloud Gateway for VMware Tanzu
- Spring Cloud Gateway for Kubernetes
- API Portal for VMware Tanzu
- Single Sign-On for VMware Tanzu Application Service
- App Metrics
- VMware vCenter Cloud Gateway
- VMware vRealize Orchestrator
- VMware Cloud Foundation
- VMware Workspace ONE Access Connector
- VMware Horizon DaaS
- VMware Horizon Cloud Connector
- VMware NSX Data Center for vSphere
- VMware AppDefense Appliance
- VMware Cloud Director Object Storage Extension
- VMware Telco Cloud Operations
- VMware vRealize Log Insight
- VMware Tanzu Scheduler
- VMware Smart Assurance NCM
- VMware Smart Assurance SAM [Service Assurance Manager]
- VMware Integrated OpenStack
- VMware vRealize Business for Cloud
- VMware vRealize Network Insight
- VMware Cloud Provider Lifecycle Manager
- VMware SD-WAN VCO
- VMware NSX-T Intelligence Appliance
- VMware Horizon Agents Installer
- VMware Tanzu Observability Proxy
- (Additional products will be added)
2. Introduction
Critical vulnerabilities in Apache Log4j identified by CVE-2021-44228 and CVE-2021-45046 have been publicly disclosed which impact VMware products.
This is an ongoing event, please check this advisory for frequent updates as they develop.
3. Problem Description
Description
Multiple products impacted by remote code execution vulnerabilities via Apache Log4j (CVE-2021-44228, CVE-2021-45046).
Known Attack Vectors
A malicious actor with network access to an impacted VMware product may exploit these issues to gain full control of the target system.
Resolution
Fixes for CVE-2021-44228 and CVE-2021-45046 are documented in the ‘Fixed Version’ column of the ‘Response Matrix’ below.
Workarounds
Workarounds for CVE-2021-44228 and CVE-2021-45046 are documented in the ‘Workarounds’ column of the ‘Response Matrix’ below.
Additional Documentation
None.
Acknowledgements
None.
Notes
- Exploitation attempts in the wild of CVE-2021-44228 have been confirmed by VMware.
- A supplemental blog post & frequently asked questions list was created for additional clarification. Please see: https://via.vmw.com/vmsa-2021-0028-faq
- Unaffected VMware products can be referred to on the Knowledge Base article: https://kb.vmware.com/s/article/87068
- On December 14, 2021 the Apache Software Foundation notified the community that their initial guidance for CVE-2021-44228 workarounds were not sufficient in removing all possible attack vectors. In addition, a new vulnerability identified by CVE-2021-45046 was published. In response, VMware has aligned with the new guidance and will be updating associated documentation with workarounds and fixes to address both vulnerabilities completely.
- On December 17, 2021 the Apache Software Foundation updated the severity of CVE-2021-45046 to 9.0, in response we have aligned our advisory.
- A new vulnerability identified by CVE-2021-45105 has been disclosed by the Apache Software Foundation that impacts log4j releases prior to 2.17 in non-default configurations. Shortly after this announcement VMware began investigating the potential impact of this vulnerability. At the time of this update, we have not found a valid attack vector to exploit CVE-2021-45105 in any VMware products, but investigations will continue. VMware will update log4j to 2.17 in future releases of our products.
Response Matrix:
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
VMware Horizon
|
8.x, 7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware vCenter Server
|
7.x, 6.7.x, 6.5.x
|
Virtual Appliance
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vCenter Server
|
6.7.x, 6.5.x
|
Windows
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware HCX
|
4.3
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
N/A
|
N/A
|
N/A
|
N/A
|
|
VMware HCX
|
4.2.x, 4.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware HCX
|
4.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware NSX-T Data Center
|
3.x, 2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Unified Access Gateway
|
21.x, 20.x, 3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Workspace ONE Access
|
21.x, 20.10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Identity Manager
|
3.3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware vRealize Operations
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware vRealize Operations Cloud Proxy
|
Any
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Automation
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Automation
|
7.6
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Lifecycle Manager
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Carbon Black Cloud Workload Appliance
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Carbon Black EDR Server
|
7.6.0, 7.5.x, 7.4.x, 7.3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Site Recovery Manager, vSphere Replication
|
8.5, 8.4, 8.3
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Tanzu GemFire
|
9.10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Tanzu GemFire for VMs
|
1.14.x, 1.13.x, 1.10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Tanzu Greenplum
|
6.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Tanzu Operations Manager
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Tanzu Application Service for VMs
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Tanzu Kubernetes Grid Integrated Edition
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Tanzu Observability by Wavefront Nozzle
|
3.x, 2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
Healthwatch for Tanzu Application Service
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
Healthwatch for Tanzu Application Service
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
Spring Cloud Services for VMware Tanzu
|
3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
None
|
|
Spring Cloud Services for VMware Tanzu
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
None
|
|
Spring Cloud Gateway for VMware Tanzu
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
Spring Cloud Gateway for Kubernetes
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
API Portal for VMware Tanzu
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
Single Sign-On for VMware Tanzu Application Service
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
App Metrics
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Workaround Pending
|
None
|
|
VMware vCenter Cloud Gateway
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Orchestrator
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Orchestrator
|
7.6
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Cloud Foundation
|
4.x, 3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Workspace ONE Access Connector (VMware Identity Manager Connector)
|
21.08.0.1, 21.08, 20.10, 19.03.0.1
|
Windows
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Horizon DaaS
|
9.1.x, 9.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Horizon Cloud Connector
|
1.x, 2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
None
|
|
VMware NSX Data Center for vSphere
|
6.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware AppDefense Appliance
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
N/A
|
None
|
|
VMware Cloud Director Object Storage Extension
|
2.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Cloud Director Object Storage Extension
|
2.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Telco Cloud Operations
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Log Insight
|
8.2, 8.3, 8.4, 8.6
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Tanzu Scheduler
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Smart Assurance NCM
|
10.1.6
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Smart Assurance SAM [Service Assurance Manager]
|
10.1.0.x, 10.1.2, 10.1.5,
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Integrated OpenStack
|
7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Business for Cloud
|
7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware vRealize Network Insight
|
5.3, 6.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Cloud Provider Lifecycle Manager
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware SD-WAN VCO
|
4.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware NSX-T Intelligence Appliance
|
1.2.x, 1.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
Patch Pending
|
None
|
|
VMware Horizon Agents Installer
|
21.x.x, 20.x.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
||
VMware Tanzu Observability Proxy
|
10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
Critical
|
None
|
4. References
FIRST CVSSv3 Calculator:
CVE-2021-44228: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H (10.0)
CVE-2021-45046: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H (9.0)
Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
5. Change Log
2021-12-10: VMSA-2021-0028
Initial security advisory.
2021-12-11: VMSA-2021-0028.1
Updated advisory with workaround information for multiple products including vCenter Server Appliance, vRealize Operations, Horizon, vRealize Log Insight, Unified Access Gateway.
2021-12-13: VMSA-2021-0028.2
Revised advisory with updates to multiple products.
2021-12-15: VMSA-2021-0028.3
Revised advisory with updates to multiple products. In addition, added CVE-2021-45046 information and noted alignment with new Apache Software Foundation guidance.
2021-12-17: VMSA-2021-0028.4
Revised advisory with updates to multiple products.
2021-12-20: VMSA-2021-0028.5
Added a note on current CVE-2021-45105 investigations.
2021-12-21: VMSA-2021-0028.6
Revised advisory with updates to multiple products, including vRealize Operations and vRealize Log Insight.