CVE-2021-42550
moderate-risk
Published 2021-12-16
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
Do I need to act?
~
2.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.6/10
Medium
NETWORK
/ HIGH complexity
Affected Products (17)
Logback
Logback
Logback
Logback
Logback
Logback
Logback
Logback
Logback
Logback
Logback
Logback
References (14)
Vendor Advisory
http://logback.qos.ch/news.html
Mailing List
http://seclists.org/fulldisclosure/2022/Jul/11
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211229-0001/
Vendor Advisory
http://logback.qos.ch/news.html
Mailing List
http://seclists.org/fulldisclosure/2022/Jul/11
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211229-0001/
45
/ 100
moderate-risk
Severity
20/34 · Moderate
Exploitability
6/34 · Minimal
Exposure
19/34 · Moderate