Description In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
CVSS vector CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Exploitability: 0.7 | Impact: 5.9 Attack Vector: Network
Complexity: High
Privileges: High
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages6 packages Show 1 more packages
🔴 Vulnerability Details5 OSV logback vulnerabilities ↗ 2025-07-02 ▶ GHSA Deserialization of Untrusted Data in logback ↗ 2021-12-17 ▶ OSV Deserialization of Untrusted Data in logback ↗ 2021-12-17 ▶ OSV CVE-2021-42550: In logback version 1 ↗ 2021-12-16 ▶ CVEList RCE from attacker with configuration edit priviledges through JNDI lookup ↗ 2021-12-16 ▶
📋 Vendor Advisories3 Ubuntu logback vulnerabilities ↗ 2025-07-02 ▶ Red Hat logback: remote code execution through JNDI call from within its configuration file ↗ 2021-12-16 ▶ Debian CVE-2021-42550: logback - In logback version 1.2.7 and prior versions, an attacker with the required privi... ↗ 2021 ▶
🕵️ Threat Intelligence2 Sentinelone Log4j One Month On | Crimeware and Exploitation Roundup ↗ 2022-01-10 ▶ Sentinelone Log4j One Month On | Crimeware and Exploitation Roundup ↗ 2022-01-10 ▶