<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Apache log4j2 log messages substitution (CVE-2021-44228)</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-21-245</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2021-12-12T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2021-12-12T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2021-12-12T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Apache Log4j &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled (CVE-2021-44228).
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            The following products are NOT impacted:FortiOS (includes FortiGate &amp; FortiWiFi)FortiAnalyzerFortiManagerFortiAPFortiAuthenticatorFortiDeceptorFortiMailFortiVoiceFortiRecorderFortiSwitch &amp; FortiSwitchManagerFortiAnalyzer CloudFortiManager CloudFortiGate CloudFortiWeb CloudFortiGSLB CloudFortiToken CloudFortiPhish CloudFortiSwicth Cloud in FortiLANCloudFortiEDR AgentFortiNACThe following products are impacted and fixes are being worked on. This advisory will be updated as soon as ETAs are available.FortiAnalyzer-BigDataFortiSIEMFortiCASBFortiPortalFortiNACFortiConvertorFortiAIOpsFortiPolicyShieldXFortiSOARFortiEDR Cloud
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Please upgrade to FortiPortal version 6.0.9 or abovePlease upgrade to FortiSIEM version 6.0.5 or abovePlease upgrade to FortiAIOps version 1.0.3 or abovePlease upgrade to FortiAnalyzer-BigData version 7.2.3 or abovePlease upgrade to FortiPolicy version 7.2.0 or aboveFixed from FortiLANCloud 22.1Fixed from FortiConverter Service Portal 21.4Fixed from FortiCASB 22.1For full details of protections and detections for the IoCs related to this vulnerability, please see the https://www.fortiguard.com/outbreak-alert/log4j2-vulnerabilityIPS Signature protection (FortiOS)Fortinet have released IPS signature Apache.Log4j.Error.Log.Remote.Code.Execution, with VID 51006 to address this threat. This signature was initially released in IPS package (version 19.215). Please note that, since this is an emergency release, the default action for this signature is set to pass. Please modify the action according to your need.Web Application Firewall (FortiWeb &amp; FortiWeb Cloud)Web Application signatures to prevent this vulnerability were added in database 0.00301 and have been updated in the latest release 0.00305 for additional coverage
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-21-245</cvrf:URL>
            <cvrf:Description>Apache log4j2 log messages substitution (CVE-2021-44228)</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://logging.apache.org/log4j/2.x/security.html</cvrf:URL>
            <cvrf:Description>https://logging.apache.org/log4j/2.x/security.html</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <Vulnerability Ordinal="1">
        <Title>Apache log4j2 log messages substitution (CVE-2021-44228)</Title>
        <cvrf:CVE>CVE-2021-44228</cvrf:CVE>
        <cvrf:CVE>CVE-2021-44832</cvrf:CVE>
        <cvrf:CVE>CVE-2021-45105</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>9.8</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-21-245</URL>
                <Description>Apache log4j2 log messages substitution (CVE-2021-44228)</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://logging.apache.org/log4j/2.x/security.html</URL>
                <Description>https://logging.apache.org/log4j/2.x/security.html</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>