Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-5645
Severity
9.8CRITICAL
EPSS
94.0%
top 0.10%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 17
Latest updateDec 10
Description
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages69 packages
Also affects: Enterprise Linux 6.0, 6.7, 7.0, 7.3, 7.4, 7.5, 7.6
Patches
🔴Vulnerability Details
4💥Exploits & PoCs
1Nuclei▶
Apache Log4j Server - Deserialization Command Execution
📋Vendor Advisories
8🕵️Threat Intelligence
1Unit42▶
Another Apache Log4j Vulnerability Is Actively Exploited in the Wild (CVE-2021-44228) (Updated)↗2021-12-10