
===================================================================                               CERT-Renater

                     Note d'Information No. 2021/VULN668
_____________________________________________________________________

DATE                : 20/12/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Linux running IBM QRadar SIEM versions prior to
                                        4.1.5.

====================================================================https://www.ibm.com/support/pages/node/6526640
_____________________________________________________________________


Security Bulletin: Log4j as used in IBM® QRadar User Behavior Analytics 
application add on to IBM® QRadar SIEM is vulnerable to remote code 
execution (RCE) (CVE-2021-44228)


Security Bulletin


Summary
Log4j is used by IBM® QRadar User Behavior Analytics application to log
system events. This bulletin provides a remediation for the
vulnerability, CVE-2021-44228 by upgrading IBM® QRadar User Behavior
Analytics application add on to IBM® QRadar SIEM and thus addressing the
exposure to the log4j vulnerability.


Vulnerability Details

CVEID:         CVE-2021-44228
DESCRIPTION:   Apache Log4j could allow a remote attacker to execute
arbitrary code on the system, caused by the failure to protect against
attacker controlled LDAP and other JNDI related endpoints by JNDI
features. By sending a specially crafted code string, an attacker could
exploit this vulnerability to load arbitrary Java code on the server and
take complete control of the system. Note: The vulnerability is also
called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: 
https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the 
current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)


Affected Products and Versions

Affected Product(s)                  Version(s)
QRadar User Behavior Analytics       All


Remediation/Fixes
Updated in version 4.1.4

Recommended to upgrade to version 4.1.5


The recommendation is to apply the fix as soon as possible.

Note: An issue was found impacting some upgrades from earlier versions
of UBA to versions 4.1.3 and 4.1.4. UBA version 4.1.5 has been released
to address the upgrade issue and address CVE-2021-44228. More
information can be found in the following technote:
https://www.ibm.com/support/pages/node/6527260


Workarounds and Mitigations
None


Get Notified about Future Security Bulletins
Subscribe to My Notifications to be notified of important product
support alerts like this.


References
Complete CVSS v3 Guide
On-line Calculator v3


Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


Change History
14 Dec 2021: Initial Publication
17 Dec 2021: Added comments about upgrade issues
17 Dec 2021: Further comments about upgrade issues


*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the
impact of this vulnerability in their environments by accessing the
links in the Reference section of this Security Bulletin.


Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open
standard designed to convey vulnerability severity and help to determine
urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS
IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE
RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY
VULNERABILITY.


========================================================+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=======================================================