CVE-2021-44228: DX Netops NFA : Remote code injection in Log4j
search cancel

CVE-2021-44228: DX Netops NFA : Remote code injection in Log4j


Article ID: 230241


Updated On:


CA Network Flow Analysis (NetQos / NFA) DX NetOps


Is Network Flow Analysis (NFA) affected by this vulnerability?


Component : Network Flow Analysis


Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.
As per Apache's Log4j security guide: Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.


NFA uses Log4j, however, it is not impacted by this vulnerability as it uses a version that is not affected by this vulnerability.  

Additional Information

NFA does not use JMSAppender, SocketServer, or Chainsaw classes which are considered vulnerable.

  • NFA Engineering will upgrade it's log4j libraries to the newly released Apache Log4j 2.17.1 for NFA 21.2.8.