IBM Support

Security Bulletin: IBM Edge Application Manager is vulnerable to arbitrary code execution due to Apache Log4j (CVE-2021-44228)

Security Bulletin


Summary

IBM Edge Application Manager (IEAM) 4.3.0 has a dependency on IBM Cloud Pak Foundational Services (IBM Common Services) which includes an unused Operator that contains a vulnerable version of Apache Log4j as described in CVE-2021-44228. An upgrade has been released which includes Apache Log4j version 2.15.0 to address this vulnerability.

Vulnerability Details

CVEID:   CVE-2021-44228
DESCRIPTION:   Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker controlled LDAP and other JNDI related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system. Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Edge Application Manger4.3

Remediation/Fixes

IBM strongly recommends addressing this vulnerability now by upgrading.

By default subscriptions to the IBM Edge Application Manager (IEAM)operator and its dependent operands are set 
to automatic approval for its update channel. This means that new releases of IEAM or its dependencies for the
configured channel will be automatically applied. Note: A Cluster Administrator can set the approval strategy to Manual. In this case
a Cluster Administrator will need to manually approve pending changes. Otherwise, the latest version of IBM Cloud Pak Foundational Services (3.6.7) has been released and all IBM Edge Application Manager 4.3.0 instances will be upgraded automatically without user-intervention if automatic updates are enabled.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

17 Dec 2021: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS7L5K","label":"IBM Edge Application Manager"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"4.3","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
23 December 2021

UID

ibm16536936