CVE-2021-44228 has been determined to impact VMware Smart Assurance Network Configuration Manager 10.1.6.0 due to the Apache Log4j open source component it ships. This vulnerability and its impact on VMware products are documented in the following VMware Security Advisory (VMSA), review this document before continuing:
Notice: On December 14, 2021 the Apache Software Foundation notified the community that their initial guidance for CVE-2021-44228 workarounds was not sufficient. We believe the instructions in this article to be an effective mitigation for CVE-2021-44228, but in the best interest of our customers we must assume this workaround may not adequately address all attack vectors.
We expect to fully address both CVE-2021-44228 and CVE-2021-45046 by updating log4j to version 2.16 in forthcoming releases of “VMware Smart Assurance Network Configuration Manager”, as outlined by our software support policies. VMSA-2021-0028 will be updated when these releases are available. In the interim, we have updated this Knowledge Base article with revised guidance to remove all JndiLookup classes per Apache Software Foundation guidance. Please subscribe to this article to be informed when updates are published.
NCM 10.1.X
Please upgrade to 10.1.6.1 Patch as this release includes the log4j 2.17.1 that resolves the issue noted in CVE-2021-44228
Please refer VMware-Smart-Assurance-NCM-10161-GA-Patch-Release-Notes
Notes:
As per the details of the CVE-2021-44228, applications using log4j-core and including user input in log messages are vulnerable. Prior to 10.1.6 version, NCM was using log4j-api and log4j-to-slf4j for logging, thus NCM versions prior to 10.1.6 (i.e 9.6, 9.6.1, 10.1, 10.1.1, 10.1.3, 10.1.4) are not vulnerable to this vulnerability and only 10.1.6 stands vulnerable.
Change Log:
An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. However, there are different layers of protection in VMware Smart Assurance Network Configuration Manager that will make exploiting CVE-2021-44228 difficult.