A significant vulnerability in Log4J 2 was identified. This ultimately impacted Log4J 2.0-beta9 - 2.17.0. This KB addresses the Log4J2 vulnerability and its impact on Siteminder components, as well as how to remediate it.
Policy Server: r12.8.6 and older
Administrative UI: r12.8.6 and older
Access Gateway: r12.8.6 and older
SDK: r12.8.6 and older
ASA Agents: 12.7 and 12.8
(Not impacted, but mentioned here for completeness, are SiteMinder Web Agents, SiteMinder Web Agent Option Packs, SiteMinder Agent for SharePoint, SiteMinder ERP Agents, and Advanced Password Services.)
CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CVE-2021-45046
CVE-2021-4104
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CVE-2021-45105
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
CVE-2021-44832
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
This issue has been resolved in Siteminder r12.8.6a and higher.
r12.8.6a: Apache log4j 2.17.1
r12.8.7: Apache Log4j 2.17.2
r12.8.8: Apache Log4j 2.20.0
The following KB's outline how to manually update the Log4J for each Siteminder Component:
KB279552: Log4j 2.17.0 and older Vulnerability on Siteminder Policy Server r12.8.x
KB264006: Log4j 2.17.0 and older Vulnerability on Siteminder AdminUI r12.8.x
KB264008: Log4j 2.17.0 and older Vulnerability on Siteminder Access Gateway r12.8.x
KB264009: Log4j 2.17.0 and older Vulnerability on Siteminder SDK r12.8.x
KB264010: Log4j 2.17.0 and older Vulnerability on Siteminder r12.7 & r12.8 ASA Agents
To speak with a customer representative or a Support Engineer see Contact Support. Scroll to the bottom of the page and click on your respective region…