KB Article #181969
Impact and resolution of CVE-2021-44228 (Log4Shell) for SecureRelay
Context
A 0-day vulnerability in the popular Java logging library, log4j, was published on GitHub along with a POC that shows the possibility of Remote Code Execution (RCE) if log4j logs an attacker-controlled string value, CVE-2021-44228.
Axway is aware of Log4j CVE-2021-44228 and is evaluating its impact on all Axway products. As conclusions and recommendations are available we will be publishing them in the dedicated Alert on support.axway.com: https://support.axway.com/news/1331/lang/en
The current article intends to provide recommendations and technical clarifications with regards to the impact of CVE-2021-44228 in SecureRelay.
This article also provides recommendations for product versions still using log4j 1.x, which has received additional scrutiny and is known to be impacted by CVE-2019-17571 and CVE-2021-4104.
Note
All products and versions mentioned in this article are not affected by the log4j 1.x attack vectors as they do not use neither SocketServer nor JMSAppender. The Socket and JMS Appenders are not part of the standard product configuration and are not supported features.
Permanent Solution
Permanent solution: Use log4j version 2.17 or higher. All supported product versions potentially impacted by CVE-2021-44228 will issue updates to include log4j 2.17 or higher.
Mitigation
Important
As of 12/18/2021 a new vulnerability has been exposed in all log4j 2.x <= 2.16 (CVE-2021-45105). None of the products and versions listed in this section are impacted by this issues as the do not use Context Lookups as part of the log4j configuration
Secure Relay | >= 2.7.4 | 2.14.0 | Possible impact | 1. For the Master Agent See the required steps described in the mitigation for the backend application (CFT, TSIM, Gateway etc...). 2. Update the Router Agent Note that the Router Agent must be restarted after applying the changes. a. Replace lib/log4j-api-2.14.0.jar, lib/log4j-core-2.14.0.jar and lib/log4j-1.2-api-2.14.0.jar with the ones from 2.17.0 version |
Secure Relay | 2.7.3 | 2.13.1 | Possible impact | 1. For the Master Agent See the required steps described in the mitigation for the backend application (CFT, TSIM, Gateway etc...). 2. Update the Router Agent Note that the Router Agent must be restarted after applying the changes. a. Replace lib/log4j-api-2.13.1.jar and lib/log4j-core-2.13.1.jar with the ones from 2.17.0 version |
Secure Relay | < 2.7.3 | log4j 1.x | Not vulnerable | As an extraordinary precaution for log4j 1.x we recommend that you:
org.apache.log4j.net.JMSAppender org.apache.log4j.net.SocketServer org.apache.log4j.net.SocketAppender org.apache.log4j.net.SocketHubAppender org.apache.log4j.net.SimpleSocketServer
zip -q -d log4j-*.jar org/apache/log4j/net/JMSAppender.class |