search cancel

CVE-2021-44228: DX Netops NFA : Remote code injection in Log4j

book

Article ID: 230241

calendar_today

Updated On:

Products

CA Network Flow Analysis (NetQos / NFA) DX NetOps

Issue/Introduction

Is Network Flow Analysis (NFA) affected by this vulnerability?

Environment

Component : Network Flow Analysis

Cause

Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.
As per Apache's Log4j security guide: Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.

Resolution

NFA uses Log4j, however, it is not impacted by this vulnerability as it uses a version that is not affected by this vulnerability.  
 

Additional Information

NFA does not use JMSAppender, SocketServer, or Chainsaw classes which are considered vulnerable.

  • NFA Engineering will upgrade it's log4j libraries to the newly released Apache Log4j 2.17.1 for NFA 21.2.8.