
=====================================================================

                                CERT-Renater

                      Note d'Information No. 2021/VULN672
_____________________________________________________________________

DATE                : 21/12/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running IBM(R) QRadar Risk Manager
                   7.3.0 - 7.3.3 Fix Pack 10, 7.4.0 - 7.4.3 Fix Pack 4.

=====================================================================
https://www.ibm.com/support/pages/node/6528440
_____________________________________________________________________

Security Bulletin: There are multiple vulnerabilities in the Apache
Log4j used in IBM(R) QRadar Risk Manager that may allow for remote code
execution (RCE).


Security Bulletin


Summary

Apache Log4j is used by IBM(R) QRadar Risk Manager to log system events. 
  This bulletin provides a remediation to address the multiple Apache
Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046 ) by upgrading
IBM(R) QRadar Risk Manager.


Vulnerability Details

CVEID:   CVE-2021-44228
DESCRIPTION:   Apache Log4j could allow a remote attacker to execute
arbitrary code on the system, caused by the failure to protect against
attacker controlled LDAP and other JNDI related endpoints by JNDI
features. By sending a specially crafted code string, an attacker could
exploit this vulnerability to load arbitrary Java code on the server and
take complete control of the system.
Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: 
https://exchange.xforce.ibmcloud.com/vulnerabilities/
214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

CVEID:   CVE-2021-45046
DESCRIPTION:   Apache Log4j could allow a remote attacker to execute
arbitrary code on the system, caused by an incomplete fix of
CVE-2021-44228 in certain non-default configurations. A remote attacker
with control over Thread Context Map (MDC) input data can craft
malicious input data using a JNDI Lookup pattern to obtain sensitive 
information and execute arbitrary code on the system.
CVSS Base score: 9
CVSS Temporal Score: See: 
https://exchange.xforce.ibmcloud.com/vulnerabilities/
215195 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)


Affected Products and Versions

Affected Products and Versions

IBM QRadar Risk Manager 7.3.0 - 7.3.3 Fix Pack 10

IBM QRadar Risk Manager 7.4.0 - 7.4.3 Fix Pack 4


Remediation/Fixes

IBM strongly recommends upgrading now to address the Apache Log4j
vulnerabilities (CVE-2021-44228 and  CVE-2021-45046 ) affecting QRadar
Risk Manager



Note:

Many QRadar products share a common install, as such to upgrade your
QRadar Risk Manager customers need to download the interim fixes linked
below.

Customers who do not use QRadar Risk Manager can also apply this fix to
update the unused vulnerable components.

QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 10 Interim Fix 01

QRadar / QRM / QVM / QRIF / QNI 7.4.3 Patch 4 Interim Fix 02



For information on upgrading QRadar please see the appropriate
documentation:

Upgrading 7.3.3

Upgrading 7.4


Workarounds and Mitigations

None


Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Note: QRadar software upgrades use a single SFS file to update multiple
products. The interim fix applies mitigations to IBM QRadar Risk
Manager, along with IBM QRadar SIEM and other products, even if the
software does not require any mitigations. For more information on
affected products, see QRadar:
Addendum to Apache Log4j CVE-2021-44228 vulnerability information.


Change History

15 Dec 2021: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the
impact of this vulnerability in their environments by accessing the
links in the Reference section of this Security Bulletin.


Document Location

Worldwide


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================

