Splunk Security Advisory for Apache Log4j (CVE-2021-44228, CVE-2021-45046 and others)

Splunk is committed to using inclusive and unbiased language. This blog post might contain terminology that we no longer use. For more information on our updated terminology and our stance on biased language, please visit our blog post. We appreciate your understanding as we work towards making our community more inclusive for everyone.

Updated 8:30 am PT, 1/7/22

On December 10, a critical remote code execution vulnerability impacting at least Apache Log4j 2 (versions 2.0 to 2.14.1) was announced by Apache. This vulnerability is designated by Mitre as CVE-2021-44228 with the highest severity rating of 10.0. The vulnerability is also known as Log4Shell by security researchers. Log4j 2 is a commonly used open source third party Java logging library used in software applications and services. If exploited, this vulnerability allows adversaries to potentially take full control of the impacted system.

On December 14, Apache announced a second vulnerability impacting Log4j (CVE-2021-45046), found in Log4j version 2.1.0. On December 17, this vulnerability was upgraded by MITRE to a severity rating of 9.0 (Critical).

Splunk is focused on the fastest possible remediations for CVE-2021-44228 and CVE-2021-45046. Release candidates to address both vulnerabilities are in development for affected products, inclusive of the products listed below. Please return to this posting for the most up to date information.

Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation. This includes implementing additional proactive measures within Splunk's internal environment and Splunkbase to address the dynamic threats related to CVE-2021-44228 and CVE-2021-45046. The below tables contain our most up-to-date guidance on our products. These products are tracked separately across On Prem and Cloud products.

Splunk has not observed successful exploitation of the Log4Shell vulnerability within Splunk Cloud. Splunk has also not observed successful exploitation of the Log4Shell vulnerability within our internal environment. Splunk does not have visibility into On-Prem deployments. Please see our blogs for guidance on detecting and protecting your deployment from Log4Shell:

Please return to this posting for the most up to date information. Current customers can file support tickets through standard channels for specific guidance.

Supplemental Security Advisory for Splunk Apps

A supplemental security advisory for Splunk Apps was published on December 14 and is being updated on an ongoing basis.

Additional Guidance for CVE-2021-45105 and CVE-2021-44832

Splunk also reviewed a Denial of Service Vulnerability (CVE-2021-45105) found in Log4j version 2.16.0. Apache has designated this vulnerability a severity rating of 7.5 (High). Per Apache’s advisory, specific non-default configuration parameters need to be present to exploit this vulnerability. Splunk has evaluated where these configuration parameters may exist within our product portfolio, and we have updated the table below accordingly.

Splunk is additionally reviewing a Remote Code Execution Vulnerability (CVE-2021-44832) found in Log4j version 2.17.0. Apache has designated this vulnerability a severity rating of 6.6 (Moderate). Per Apache’s advisory, permission must be granted to the underlying configuration files, and a malicious configuration needs to be created, to exploit this vulnerability.

Unless CVE-2021-45105 or CVE-2021-44832 increase in severity, Splunk will address these vulnerabilities as part of the next regular maintenance release of each affected product. Customers also have the option to remove Log4j Version 2 from Splunk Enterprise out of an abundance of caution.

Summary of Impact for Splunk Enterprise and Splunk Cloud

Core Splunk Enterprise functionality does not use Log4j version 2 and is not impacted. If Data Fabric Search (DFS) is used, there is an impact because this product feature leverages Log4j. If this feature is not used, there is no active attack vector related to CVE-2021-44228 or CVE-2021-45046. Guidance for determining if you are using DFS appears in the "Removing Log4j version 2 from Splunk Enterprise" section below.

All recent non-Windows versions of Splunk Enterprise include Log4j version 2 for the DFS feature. Windows versions of Splunk Enterprise do not include Log4j version 2. Customers may follow the guidance in the “Removing Log4j version 2 from Splunk Enterprise” section below to remove these packages out of an abundance of caution. Official patches to upgrade the Log4j packages and mitigate the vulnerabilities in all usage scenarios are available and linked in the table below for version 8.1 and 8.2. These patches are the preferred method for addressing CVE-2021-44228 in Splunk Enterprise. Patches to address CVE-2021-45046 are forthcoming.

Splunk Cloud is not impacted by CVE-2021-44228 or CVE-2021-45046. For potential impact on Splunk supported applications installed on Splunk Enterprise or Splunk Cloud, see the tables below.

Impacted Products

These products are known to be impacted by CVE-2021-44228 and CVE-2021-45046. Unless explicitly stated, patches are cumulative to address both CVE-2021-44228 and CVE-2021-45046. The latest available update for an affected product should be used.

Product
Cloud/On-Prem
Impacted Versions
Fixed Version
Workaround

Splunk Add-On for Java Management Extensions

(App ID 2647)

Both
5.2.0 and older

CVE-2021-44228: 5.2.1

CVE-2021-45046: 5.2.2

CVE-2021-45105: not applicable due to configuration parameters

None

Splunk Add-On for JBoss

(App ID 2954)

Both
3.0.0 and older

CVE-2021-44228: 3.0.1

CVE-2021-45046: 3.0.2

CVE-2021-45105: not applicable due to configuration parameters

None

Splunk Add-On for Tomcat

(App ID 2911)

Both
3.0.0 and older

CVE-2021-44228: 3.0.1

CVE-2021-45046: 3.0.2

CVE-2021-45105: not applicable due to configuration parameters

None
Data Stream Processor
On-Prem
DSP 1.0.x, DSP 1.1.x, DSP 1.2.x

Patch and Procedure emailed to customers with active DSP licenses. Version 1.0.0 and 1.0.1 are out of support and will not receive a patch. Customers on supported versions (> 1.1.0) should patch to the following versions:

CVE-2021-44228: 1.2.1-patch02, 1.2.2-patch02

CVE-2021-45046: 1.2.1-patch02, 1.2.2-patch02

CVE-2021-45105: not applicable due to configuration parameters

None

IT Essentials Work

(App ID 5403)

Both
4.11, 4.10.x (Cloud only), 4.9.x

CVE-2021-44228: 4.11.1, 4.10.3, 4.9.5

CVE-2021-45046: 4.11.2, 4.10.4, 4.9.6, 4.7.4

CVE-2021-45105: not applicable due to configuration parameters

See Splunk Docs

IT Service Intelligence (ITSI)

(App ID 1841)

Both
4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x

CVE-2021-44228: 4.11.1, 4.10.3, 4.9.5, 4.7.3

CVE-2021-45046: 4.11.2, 4.10.4, 4.9.6, 4.7.4

CVE-2021-45105: not applicable due to configuration parameters

See Splunk Docs
Splunk Connect for Kafka
On-Prem
All versions prior to 2.0.4

CVE-2021-44228: 2.0.4

CVE-2021-45046: 2.0.5

CVE-2021-45105: 2.0.6

None
Splunk Enterprise (including instance types like Heavy Forwarders)
On-Prem
All supported non-Windows versions of 8.1.x and 8.2.x only if DFS is used. See Removing Log4j from Splunk Enterprise below for guidance on unsupported versions.

CVE-2021-44228: 8.1.7.1, 8.2.3.2

CVE-2021-45046: 8.1.7.2, 8.2.3.3 or 8.2.4

CVE-2021-45105: not applicable due to configuration parameters

See Removing Log4j from Splunk Enterprise section below
Splunk Enterprise Amazon Machine Image (AMI)
On-Prem
See Splunk Enterprise
CVE-2021-44228 and CVE-2021-45046: 8.2.3.3, 8.1.7.2
None
Splunk Enterprise Docker Container
On-Prem
See Splunk Enterprise

CVE-2021-44228: latest, edge, 8.1, 8.1.7.1, 8.2, 8.2.3.2

CVE-2021-45046: latest, edge, 8.1, 8.1.7.2, 8.2, 8.2.3.3

CVE-2021-45105: not applicable due to configuration parameters

None
Splunk Logging Library for Java
On-Prem
1.11.0 and older

CVE-2021-44228: 1.11.1

CVE-2021-45046: 1.11.2

CVE-2021-45105: 1.11.3

None

Splunk OVA for VMWare

(App ID 3216)

On-Prem
4.0.3 and older
Pending
None

Splunk OVA for VMWare Metrics

(App ID 5096)

On-Prem
4.2.1 and older
Pending
None

Splunk VMWare OVA for ITSI

(App ID 4760)

On-Prem
1.1.1 and older

CVE-2021-44228: TBD

CVE-2021-45046: TBD

None
Splunk On-call / VictorOps
Cloud
Current

CVE-2021-44228: Fixed 12/15

CVE-2021-45046: Fixed 12/20

None
Splunk Real User Monitoring
Cloud
Current

CVE-2021-44228: Fixed 12/13

CVE-2021-45046: Fixed 12/20

None
Splunk Application Performance Monitoring
Cloud
Current

CVE-2021-44228: Fixed 12/13

CVE-2021-45046: Fixed 12/20

None
Splunk Infrastructure Monitoring
Cloud
Current

CVE-2021-44228: Fixed 12/13

CVE-2021-45046: Fixed 12/20

None
Splunk Log Observer
Cloud
Current

CVE-2021-44228: Fixed 12/16

CVE-2021-45046: Fixed 12/20

None
Splunk Synthetics
Cloud
Current

CVE-2021-44228: Fixed 12/10

CVE-2021-45046: Fixed 12/20

None
Splunk UBA OVA Software
On-Prem
5.0.3a, 5.0.0
See Removing Log4j from Splunk User Behavior Analytics section below

Products Confirmed Not Vulnerable

Investigation has concluded that these products are not impacted by CVE-2021-44228 or CVE-2021-45046.

Removing Log4j Version 2 from Splunk Enterprise

The guidance in this section is intended to be used in the case that Splunk Enterprise cannot be upgraded using the official patches for version 8.1 and 8.2. The guidance below will help you remove jar files associated with both vulnerabilities (CVE-2021-42288 and CVE-2021-45046).

If the Splunk Enterprise instance does not leverage DFS, the presence of those libraries does not introduce an active attack vector. Out of an abundance of caution, you may remove the unused jar files and directories from your Splunk Enterprise instances in the following paths:

Upon removal of these jar files, an administrator may see errors at Splunk startup pertaining to file integrity, specific to these jar files. These are expected as you are removing these unused jar files as a workaround. These errors may be ignored.

Jar files matching the same filename of the files found in the directories above, but found in other directories on your Splunk instances are likely from normal Splunk operation (e.g. search head bundle replication) and can be safely deleted. If any jar files return in the splunk_archiver app, disabling the default Bucket Copy Trigger search in that app will stop this behavior from happening.

*Since a Splunk Heavyweight Forwarder (HWF) is a full-instance copy of Splunk Enterprise with forwarding enabled, the above mitigation may also be applied to HWF instances.

Determining if DFS is in use

To determine if Distributed Fabric Search is in use, you may run the following query from a Splunk search head:

| history 
| search search=*dfsjob* 
|  rex field=search "(?P<dfs_cmd>\|\s*dfsjob)" 
| search dfs_cmd=* and search!=*eval* 
| where len(dfs_cmd) > 0

If the above search returns results, then DFS is enabled and searches have been run using the capability. You may also look for the parameter "disabled=false" in server.conf to determine if DFS is enabled.

Determining if Hadoop Data Roll is in use

Although Hadoop Data Roll (archiver) functionality does not introduce an active attack vector, users who do not use this functionality may choose to remove the Log4j files out of an abundance of caution. To determine if this feature is in use, you may run the following query from a Splunk search head:

index=_internal source=*/splunk_archiver.log
| rex field=_raw "json=\"(?P<json>.*)\"" 
| chart values(json)

If the above search returns the following, then Hadoop Data Roll is NOT in use:

Unsupported Versions of Splunk Enterprise

Only the DFS functionality of unsupported versions of Splunk Enterprise that include DFS (the 8.0 release and later) is affected by CVE-2021-44228 and CVE-2021-45046. The above removal guidance can be applied to those versions as well. Splunk has provided an official patch for supported versions 8.1.7.1 and 8.2.3.2.

Removing Log4j Version 2 from Splunk User Behavior Analytics

Versions of UBA prior to 5.0 leveraged Apache Storm, which embeds Log4j. The presence of those libraries does not introduce an active attack vector. Out of an abundance of caution, you may follow the procedure here to completely remove Apache Storm and the Log4j libraries from your UBA AMI, OVA, and bare-metal installs.

References

Change Log

Related Articles

KubeCon 2025 London: OpenTelemetry Steals the Show and Splunk’s Bold Moves
Bulletins
2 Minute Read

KubeCon 2025 London: OpenTelemetry Steals the Show and Splunk’s Bold Moves

Read about the highlights of KubeCon London 2025 in this blog and why OTel is a force to be reckoned with.
Cribl Litigation Update
Bulletins
1 Minute Read

Cribl Litigation Update

An update on Splunk's intellectual property and unfair competition complaint against Cribl filed on October 5, 2022.
Supplementary Security Advisory for Splunk Apps/Add-ons
Bulletins
4 Minute Read

Supplementary Security Advisory for Splunk Apps/Add-ons

This security advisory specifically pertains to Apps/Add-ons (i.e. Extensions) to Splunk Products for CVE 2021-44228 and CVE-2021-45046.
Splunk Security Advisory for Apache Log4j (CVE-2021-44228, CVE-2021-45046 and others)
Bulletins
12 Minute Read

Splunk Security Advisory for Apache Log4j (CVE-2021-44228, CVE-2021-45046 and others)

Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation.Please return to this posting for the most up to date information.
GM Blog Hackathon Updates
Bulletins
1 Minute Read

GM Blog Hackathon Updates

Splunk takes pride in our culture and in our vision of bringing Data to Everything – we care about our customers, communities and doing business the right way.