

Per Apache’s advisory, specific non-default configuration parameters need to be present to exploit this vulnerability. Apache has designated this vulnerability a severity rating of 7.5 (High). Splunk also reviewed a Denial of Service Vulnerability ( CVE-2021-45105) found in Log4j version 2.16.0. Supplemental Security Advisory for Splunk AppsĪ supplemental security advisory for Splunk Apps was published on December 14 and is being updated on an ongoing basis. Current customers can file support tickets through standard channels for specific guidance. Please return to this posting for the most up to date information. Simulating, Detecting, and Responding to Log4Shell with Splunk.Detecting Log4j Vulnerability Continued.Please see our blogs for guidance on detecting and protecting your deployment from Log4Shell:

Splunk has also not observed successful exploitation of the Log4Shell vulnerability within our internal environment. Splunk does not have visibility into On-Prem deployments. Splunk has not observed successful exploitation of the Log4Shell vulnerability within Splunk Cloud. These products are tracked separately across On Prem and Cloud products. The below tables contain our most up-to-date guidance on our products. This includes implementing additional proactive measures within Splunk's internal environment and Splunkbase to address the dynamic threats related to CVE-2021-44228 and CVE-2021-45046. Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation. Release candidates to address both vulnerabilities are in development for affected products, inclusive of the products listed below. Splunk is focused on the fastest possible remediations for CVE-2021-44228 and CVE-2021-45046. On December 17, this vulnerability was upgraded by MITRE to a severity rating of 9.0 (Critical). On December 14, Apache announced a second vulnerability impacting Log4j ( CVE-2021-45046), found in Log4j version 2.1.0.
SPLUNK REX MULTIPLE VALUES FULL
If exploited, this vulnerability allows adversaries to potentially take full control of the impacted system.
SPLUNK REX MULTIPLE VALUES SOFTWARE
Log4j 2 is a commonly used open source third party Java logging library used in software applications and services. The vulnerability is also known as Log4Shell by security researchers. This vulnerability is designated by Mitre as CVE-2021-44228 with the highest severity rating of 10.0. On December 10, a critical remote code execution vulnerability impacting at least Apache Log4j 2 (versions 2.0 to 2.14.1) was announced by Apache.
