CVE-2021-44228

Known Exploited Vulnerability Entry External Catalog

Entry Details

CVE-2021-44228

Confirmed

Yes

2021-12-10 00:00 UTC


Timestamps

2021-12-10

2021-12-10


Scope

KEV entry: Apache Log4j2 Remote Code Execution Vulnerability | Affected: Apache / Log4j2 | Description: Apache Log4j2 contains a vulnerability where JNDI features do not protect against attacker-controlled JNDI-related endpoints, allowing for remote code execution. | Required action: For all affected software assets for which updates exist, the only acceptable remediation actions are: 1) Apply updates; OR 2) remove affected assets from agency networks. Temporary mitigations using one of the measures provided at https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures are only acceptable until updates are available. | Due date: 2021-12-24 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2021-44228


References
  • {'id': 'CVE-2021-44228', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-44228'}

8c563432-4922-46b2-ad09-f8284c01207b

405284c2-e461-4670-8979-7fd2c9755a60

2026-02-02 13:26 UTC

2026-02-06 07:53 UTC

Evidence (1)
Type Source Signal Confidence Details GCVE Metadata
vendor_report cisa-kev successful_exploitation 0.80
View details
{
  "cwes": [
    "CWE-20",
    "CWE-400",
    "CWE-502"
  ],
  "date_added": "2021-12-10",
  "due_date": "2021-12-24",
  "feed": "CISA Known Exploited Vulnerabilities Catalog",
  "knownRansomwareCampaignUse": "Known",
  "product": "Log4j2",
  "vendorProject": "Apache",
  "vulnerabilityName": "Apache Log4j2 Remote Code Execution Vulnerability"
}
-