Skip to main content

Security Advisory IBA-2021-04

maxView Storage Manager Remote Code Execution Vulnerability

Publishing Date:2021-12-17
Last Update:2021-12-17
Tracking ID:IBA-2021-04
CVE:CVE-2021-44228
CVSS Base Score:10.0
CVSS v3 Vector:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Summary

CVE-2021-44228: has been determined to impact maxView GUI via the Apache Log4j open-source component it ships. maxView uses log4j 2.14.0 framework for logging tomcat webserver logs and it falls under the impacted product list. Though maxView doesn’t uses or exposes JNDI features, the lookup capability is not disabled by default in the log4J that gets shipped with maxView package.

Affected products

ibaPCs
ibaRackline & ibaDeskline products with (Adaptec/MicroSemi) MicroChip Raid Controllers

How do I know that I'm affected

Check if the maxView Storage Manager is installed on your System.
Until release of this advisory, (Adaptec/MicroSemi) MicroChip didn't provide a full list of the affected versions.

We currently assume that all versions are affected.

Customer Actions

Please uninstall the maxView Storage Manager. For further details please refer to the Adaptec Knowledge Base ID 17523

Technical Details

Issue

Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed.

Timeline

2021-12-14 Security Advisory published by Adaptec
2021-12-15 Security advisory updated by Adaptec
2021-12-17 Security advisory published by iba AG
|Security Advisories Back