Remote Code Execution Vulnerability in Apache Log4j Affected Versions
CVE-2017-5645
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 17 April 2017
Badges
Summary
In versions of Apache Log4j 2.x prior to 2.8.2, vulnerabilities exist in the TCP and UDP socket servers that allow attackers to send specially crafted binary payloads. If these payloads are deserialized by the application receiving the log events, it may lead to the execution of arbitrary code. Organizations using affected versions of Log4j are advised to apply these updates promptly to mitigate potential exploitation risks.
Affected Version(s)
Apache Log4j All versions between 2.0-alpha1 and 2.8.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
94% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved