Vulnerability Assessment

This document describes the impact of the Apache Log4j vulnerability on Cisco DNA Center.

In December 2021, the Apache Software Foundation disclosed vulnerabilities in the open-source Log4j logging library. Log4j is widely used in the Cisco DNA Center solution and Cisco is actively evaluating the product lineup to verify what is safe and what is affected.

For more information, see the Cisco Security Advisory: Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021.


Note

This document presents more information as it becomes available.


Prerequisites

There are no specific prerequisites or requirements for this document.

Components Used

The information in this document is based on the following software and hardware versions:

  • Cisco DNA Center release 1.0 and later.

Advisory Table

The following advisory table lists the specific bug for this vulnerability, product versions that are impacted, and available patch releases with a fix. Product versions with no patch release shown have passed the End of Software Maintenance stage and are not considered for review.

Application 1.0.x 1.1.x 1.2.x 1.3.x 2.0.x 2.1.1.x 2.1.2.x 2.2.2.x 2.2.3.x 2.3.x

Defect ID: CSCwa47322

Cisco DNA Center

Impacted

Impacted

Impacted

Impacted

Impacted

Impacted

Impacted

Impacted

Impacted

Impacted

Patched Release

2.1.2.8

2.2.2.8

2.2.3.4

2.3.2.1.70507 CA Release

Frequently Asked Questions

  • Q1: How often is the document revised with the latest information?

    Answer: The document is reviewed weekly and updated in the morning (U.S. hours).

  • Q2: When are patches released?

    Answer: All patched software for currently maintained releases has been released and documented in the advisory table.

  • Q3: Is there a workaround that can be implemented until the fix is ready?

    Answer: We recommend that you follow the PSIRT advisory and ensure that patches are applied as soon as possible once released for affected versions.

  • Q5: What actions do I take if my organization's security scanner (for example, Qualys) picks up CVE-2021-45105, CVE-2021-45046, and CVE-2021-44832 after I patched my Cisco DNA Center product?

    Answer: No action is needed. Cisco has reviewed CVE-2021-45105, CVE-2021-45046, and CVE-2021-44832 and has determined that no Cisco products or cloud offerings are impacted by this vulnerability. This information has been highlighted in the advisory as well.


    Note

    Although we are not currently vulnerable to CVE-2021-44832 and CVE-2021-45105, Cisco DNA Center release 2.2.3.5 and 2.3.2.3 will move to Log4j 2.17, where applicable.
  • Q7: My security scanner shows that I'm vulnerable to CVE-2021-4104. What should I do?

    Answer: Cisco DNA Center does not provide write access to the Log4j configuration and does not use the JMS Appender, both of which are required for this vulnerability to be exploited. No action is required. For more information, see https://nvd.nist.gov/vuln/detail/CVE-2021-4104.