Security Advisory IBA-2021-04
maxView Storage Manager Remote Code Execution Vulnerability
Publishing Date: | 2021-12-17 |
Last Update: | 2021-12-17 |
Tracking ID: | IBA-2021-04 |
CVE: | CVE-2021-44228 |
CVSS Base Score: | 10.0 |
CVSS v3 Vector: | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Summary
CVE-2021-44228: has been determined to impact maxView GUI via the Apache Log4j open-source component it ships. maxView uses log4j 2.14.0 framework for logging tomcat webserver logs and it falls under the impacted product list. Though maxView doesn’t uses or exposes JNDI features, the lookup capability is not disabled by default in the log4J that gets shipped with maxView package.
Affected products
ibaPCs
ibaRackline & ibaDeskline products with (Adaptec/MicroSemi) MicroChip Raid Controllers
How do I know that I'm affected
Check if the maxView Storage Manager is installed on your System.
Until release of this advisory, (Adaptec/MicroSemi) MicroChip didn't provide a full list of the affected versions.
We currently assume that all versions are affected.
Customer Actions
Please uninstall the maxView Storage Manager. For further details please refer to the Adaptec Knowledge Base ID 17523
Technical Details
Issue
Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed.
Timeline
2021-12-14 | Security Advisory published by Adaptec |
2021-12-15 | Security advisory updated by Adaptec |
2021-12-17 | Security advisory published by iba AG |