<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: threat Sharing Report: CVE-2021-44228: Apache Log4j RCE in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/threat-Sharing-Report-CVE-2021-44228-Apache-Log4j-RCE/m-p/578326#M10952</link>
    <description>&lt;P&gt;The blog posting at&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html" target="_blank"&gt;https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html&lt;/A&gt;&amp;nbsp;should answer your question.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Dec 2021 14:08:06 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2021-12-14T14:08:06Z</dc:date>
    <item>
      <title>threat Sharing Report: CVE-2021-44228: Apache Log4j RCE</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/threat-Sharing-Report-CVE-2021-44228-Apache-Log4j-RCE/m-p/578304#M10950</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am checking for the update that if the Splunk application is also exposed to threat due to&amp;nbsp;Vulnerability - &amp;nbsp;Apache Log4j.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let us know the work around if there is any impact.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;User&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 11:37:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/threat-Sharing-Report-CVE-2021-44228-Apache-Log4j-RCE/m-p/578304#M10950</guid>
      <dc:creator>sauravkumar702</dc:creator>
      <dc:date>2021-12-14T11:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: threat Sharing Report: CVE-2021-44228: Apache Log4j RCE</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/threat-Sharing-Report-CVE-2021-44228-Apache-Log4j-RCE/m-p/578326#M10952</link>
      <description>&lt;P&gt;The blog posting at&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html" target="_blank"&gt;https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html&lt;/A&gt;&amp;nbsp;should answer your question.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 14:08:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/threat-Sharing-Report-CVE-2021-44228-Apache-Log4j-RCE/m-p/578326#M10952</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-14T14:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: threat Sharing Report: CVE-2021-44228: Apache Log4j RCE</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/threat-Sharing-Report-CVE-2021-44228-Apache-Log4j-RCE/m-p/578329#M10953</link>
      <description>&lt;P&gt;&lt;EM&gt;I am checking for the update that if the Splunk application is also exposed to threat due to&amp;nbsp;Vulnerability - &amp;nbsp;Apache Log4j.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Yes, These Splunk Products are impacted:&lt;BR /&gt;(in simple, Splunk Enterprise, with Data Federated Search(DFS) feature utilized, is impacted)&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" width="100%" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Product&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Cloud/On-Prem&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Impacted Versions&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Fixed Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Workaround&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Add-On: Java Management Extensions&lt;/TD&gt;&lt;TD&gt;Both&lt;/TD&gt;&lt;TD&gt;5.2.0 and previous&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Add-On: JBoss&lt;/TD&gt;&lt;TD&gt;Both&lt;/TD&gt;&lt;TD&gt;3.0.0, 2.1.0&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Add-On: Tomcat&lt;/TD&gt;&lt;TD&gt;Both&lt;/TD&gt;&lt;TD&gt;3.0.0, 2.1.0&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Data Stream Processor&lt;/TD&gt;&lt;TD&gt;On-Prem&lt;/TD&gt;&lt;TD&gt;DSP 1.0.x, DSP 1.1.x, DSP 1.2.x&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IT Essentials Work&lt;/TD&gt;&lt;TD&gt;Both&lt;/TD&gt;&lt;TD&gt;4.11, 4.10.x (Cloud only), 4.9.x&lt;/TD&gt;&lt;TD&gt;4.11.1, 4.10.3, additional versions pending for release early this week&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IT Service Intelligence (ITSI)&lt;/TD&gt;&lt;TD&gt;Both&lt;/TD&gt;&lt;TD&gt;4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x&lt;/TD&gt;&lt;TD&gt;4.11.1, 4.10.3, additional versions pending for release early this week&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Splunk Connect for Kafka&lt;/TD&gt;&lt;TD&gt;On-Prem&lt;/TD&gt;&lt;TD&gt;2.0.3&lt;/TD&gt;&lt;TD&gt;2.0.4&lt;/TD&gt;&lt;TD&gt;Released the patched version on 12/11/21&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;U&gt;&lt;STRONG&gt;Splunk Enterprise&lt;/STRONG&gt;&lt;/U&gt;&lt;/TD&gt;&lt;TD&gt;On-Prem&lt;/TD&gt;&lt;TD&gt;All supported non-Windows versions of 8.1.x and 8.2.x&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;only if&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;DFS is used. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Removing Log4j from Splunk Enterprise&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;below for guidance on unsupported versions.&lt;/TD&gt;&lt;TD&gt;8.1.7.1, 8.2.3.2&lt;/TD&gt;&lt;TD&gt;See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Removing Log4j from Splunk Enterprise&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section below&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Splunk Enterprise Amazon Machine Image (AMI)&lt;/TD&gt;&lt;TD&gt;On-Prem&lt;/TD&gt;&lt;TD&gt;See Splunk Enterprise&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Splunk Enterprise Docker Container&lt;/TD&gt;&lt;TD&gt;On-Prem&lt;/TD&gt;&lt;TD&gt;See Splunk Enterprise&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Splunk Logging Library for Java&lt;/TD&gt;&lt;TD&gt;On-Prem&lt;/TD&gt;&lt;TD&gt;1.11.0&lt;/TD&gt;&lt;TD&gt;1.11.1&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Stream Processor Service&lt;/TD&gt;&lt;TD&gt;Cloud&lt;/TD&gt;&lt;TD&gt;Current&lt;/TD&gt;&lt;TD&gt;Pending&lt;/TD&gt;&lt;TD&gt;TBD&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Please let us know the work around if there is any impact.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Removing Log4j from Splunk Enterprise&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If the Splunk Enterprise instance does not leverage DFS, the presence of those libraries does not introduce an active attack vector. Out of an abundance of caution, you may remove the unused jar files from your Splunk Enterprise instances in the following paths:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;$SPLUNK_HOME/bin/jars/vendors/spark&lt;/LI&gt;&lt;LI&gt;$SPLUNK_HOME/bin/jars/vendors/libs/splunk-library-javalogging-*.jar&lt;/LI&gt;&lt;LI&gt;$SPLUNK_HOME/bin/jars/SplunkMR*&lt;/LI&gt;&lt;LI&gt;$SPLUNK_HOME/bin/jars/thirdparty/hive*&lt;/LI&gt;&lt;LI&gt;$SPLUNK_HOME/etc/apps/splunk_archiver/java-bin/jars/*&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Upon removal of these jar files, an administrator may see errors at Splunk startup pertaining to file integrity, specific to these jar files. These are expected as you are removing these unused jar files as a workaround. These errors may be ignored.&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Since a Splunk Heavyweight Forwarder (HWF) is a full-instance copy of Splunk Enterprise with forwarding enabled, the above mitigation may also be applied to HWF instances.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;| makeresults&amp;nbsp; - If this reply helped you, a karma point would be appreciated, thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 14:25:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/threat-Sharing-Report-CVE-2021-44228-Apache-Log4j-RCE/m-p/578329#M10953</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2021-12-14T14:25:26Z</dc:date>
    </item>
  </channel>
</rss>

