Splunk is committed to using inclusive and unbiased language. This blog post might contain terminology that we no longer use. For more information on our updated terminology and our stance on biased language, please visit our blog post. We appreciate your understanding as we work towards making our community more inclusive for everyone.
On December 10, a critical remote code execution vulnerability impacting at least Apache Log4j 2 (versions 2.0 to 2.14.1) was announced by Apache. This vulnerability is designated by Mitre as CVE-2021-44228 with the highest severity rating of 10.0. The vulnerability is also known as Log4Shell by security researchers. Log4j 2 is a commonly used open source third party Java logging library used in software applications and services. If exploited, this vulnerability allows adversaries to potentially take full control of the impacted system.
On December 14, Apache announced a second vulnerability impacting Log4j (CVE-2021-45046), found in Log4j version 2.1.0. On December 17, this vulnerability was upgraded by MITRE to a severity rating of 9.0 (Critical).
Splunk is focused on the fastest possible remediations for CVE-2021-44228 and CVE-2021-45046. Release candidates to address both vulnerabilities are in development for affected products, inclusive of the products listed below. Please return to this posting for the most up to date information.
Splunk is currently reviewing our supported products for impact and evaluating options for remediation and/or or mitigation. This includes implementing additional proactive measures within Splunk's internal environment and Splunkbase to address the dynamic threats related to CVE-2021-44228 and CVE-2021-45046. The below tables contain our most up-to-date guidance on our products. These products are tracked separately across On Prem and Cloud products.
Splunk has not observed successful exploitation of the Log4Shell vulnerability within Splunk Cloud. Splunk has also not observed successful exploitation of the Log4Shell vulnerability within our internal environment. Splunk does not have visibility into On-Prem deployments. Please see our blogs for guidance on detecting and protecting your deployment from Log4Shell:
Please return to this posting for the most up to date information. Current customers can file support tickets through standard channels for specific guidance.
A supplemental security advisory for Splunk Apps was published on December 14 and is being updated on an ongoing basis.
Splunk also reviewed a Denial of Service Vulnerability (CVE-2021-45105) found in Log4j version 2.16.0. Apache has designated this vulnerability a severity rating of 7.5 (High). Per Apache’s advisory, specific non-default configuration parameters need to be present to exploit this vulnerability. Splunk has evaluated where these configuration parameters may exist within our product portfolio, and we have updated the table below accordingly.
Splunk is additionally reviewing a Remote Code Execution Vulnerability (CVE-2021-44832) found in Log4j version 2.17.0. Apache has designated this vulnerability a severity rating of 6.6 (Moderate). Per Apache’s advisory, permission must be granted to the underlying configuration files, and a malicious configuration needs to be created, to exploit this vulnerability.
Unless CVE-2021-45105 or CVE-2021-44832 increase in severity, Splunk will address these vulnerabilities as part of the next regular maintenance release of each affected product. Customers also have the option to remove Log4j Version 2 from Splunk Enterprise out of an abundance of caution.
Core Splunk Enterprise functionality does not use Log4j version 2 and is not impacted. If Data Fabric Search (DFS) is used, there is an impact because this product feature leverages Log4j. If this feature is not used, there is no active attack vector related to CVE-2021-44228 or CVE-2021-45046. Guidance for determining if you are using DFS appears in the "Removing Log4j version 2 from Splunk Enterprise" section below.
All recent non-Windows versions of Splunk Enterprise include Log4j version 2 for the DFS feature. Windows versions of Splunk Enterprise do not include Log4j version 2. Customers may follow the guidance in the “Removing Log4j version 2 from Splunk Enterprise” section below to remove these packages out of an abundance of caution. Official patches to upgrade the Log4j packages and mitigate the vulnerabilities in all usage scenarios are available and linked in the table below for version 8.1 and 8.2. These patches are the preferred method for addressing CVE-2021-44228 in Splunk Enterprise. Patches to address CVE-2021-45046 are forthcoming.
Splunk Cloud is not impacted by CVE-2021-44228 or CVE-2021-45046. For potential impact on Splunk supported applications installed on Splunk Enterprise or Splunk Cloud, see the tables below.
These products are known to be impacted by CVE-2021-44228 and CVE-2021-45046. Unless explicitly stated, patches are cumulative to address both CVE-2021-44228 and CVE-2021-45046. The latest available update for an affected product should be used.
Product | Cloud/On-Prem | Impacted Versions | Fixed Version | Workaround |
Splunk Add-On for Java Management Extensions |
Both | 5.2.0 and older | CVE-2021-44228: 5.2.1 CVE-2021-45046: 5.2.2 CVE-2021-45105: not applicable due to configuration parameters |
None |
Splunk Add-On for JBoss |
Both | 3.0.0 and older | CVE-2021-44228: 3.0.1 CVE-2021-45046: 3.0.2 CVE-2021-45105: not applicable due to configuration parameters |
None |
Splunk Add-On for Tomcat |
Both | 3.0.0 and older | CVE-2021-44228: 3.0.1 CVE-2021-45046: 3.0.2 CVE-2021-45105: not applicable due to configuration parameters |
None |
Data Stream Processor | On-Prem | DSP 1.0.x, DSP 1.1.x, DSP 1.2.x | Patch and Procedure emailed to customers with active DSP licenses. Version 1.0.0 and 1.0.1 are out of support and will not receive a patch. Customers on supported versions (> 1.1.0) should patch to the following versions: CVE-2021-44228: 1.2.1-patch02, 1.2.2-patch02 CVE-2021-45046: 1.2.1-patch02, 1.2.2-patch02 CVE-2021-45105: not applicable due to configuration parameters |
None |
IT Essentials Work |
Both | 4.11, 4.10.x (Cloud only), 4.9.x | CVE-2021-44228: 4.11.1, 4.10.3, 4.9.5 CVE-2021-45046: 4.11.2, 4.10.4, 4.9.6, 4.7.4 CVE-2021-45105: not applicable due to configuration parameters |
See Splunk Docs |
IT Service Intelligence (ITSI) |
Both | 4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x | CVE-2021-44228: 4.11.1, 4.10.3, 4.9.5, 4.7.3 CVE-2021-45046: 4.11.2, 4.10.4, 4.9.6, 4.7.4 CVE-2021-45105: not applicable due to configuration parameters |
See Splunk Docs |
Splunk Connect for Kafka | On-Prem | All versions prior to 2.0.4 | CVE-2021-44228: 2.0.4 CVE-2021-45046: 2.0.5 CVE-2021-45105: 2.0.6 |
None |
Splunk Enterprise (including instance types like Heavy Forwarders) | On-Prem | All supported non-Windows versions of 8.1.x and 8.2.x only if DFS is used. See Removing Log4j from Splunk Enterprise below for guidance on unsupported versions. | CVE-2021-44228: 8.1.7.1, 8.2.3.2 CVE-2021-45046: 8.1.7.2, 8.2.3.3 or 8.2.4 CVE-2021-45105: not applicable due to configuration parameters |
See Removing Log4j from Splunk Enterprise section below |
Splunk Enterprise Amazon Machine Image (AMI) | On-Prem | See Splunk Enterprise | CVE-2021-44228 and CVE-2021-45046: 8.2.3.3, 8.1.7.2 | None |
Splunk Enterprise Docker Container | On-Prem | See Splunk Enterprise | CVE-2021-44228: latest, edge, 8.1, 8.1.7.1, 8.2, 8.2.3.2 CVE-2021-45046: latest, edge, 8.1, 8.1.7.2, 8.2, 8.2.3.3 CVE-2021-45105: not applicable due to configuration parameters |
None |
Splunk Logging Library for Java | On-Prem | 1.11.0 and older | CVE-2021-44228: 1.11.1 CVE-2021-45046: 1.11.2 CVE-2021-45105: 1.11.3 |
None |
Splunk OVA for VMWare |
On-Prem | 4.0.3 and older | Pending | None |
Splunk OVA for VMWare Metrics |
On-Prem | 4.2.1 and older | Pending | None |
Splunk VMWare OVA for ITSI |
On-Prem | 1.1.1 and older | CVE-2021-44228: TBD CVE-2021-45046: TBD |
None |
Splunk On-call / VictorOps | Cloud | Current | CVE-2021-44228: Fixed 12/15 CVE-2021-45046: Fixed 12/20 |
None |
Splunk Real User Monitoring | Cloud | Current | CVE-2021-44228: Fixed 12/13 CVE-2021-45046: Fixed 12/20 |
None |
Splunk Application Performance Monitoring | Cloud | Current | CVE-2021-44228: Fixed 12/13 CVE-2021-45046: Fixed 12/20 |
None |
Splunk Infrastructure Monitoring | Cloud | Current | CVE-2021-44228: Fixed 12/13 CVE-2021-45046: Fixed 12/20 |
None |
Splunk Log Observer | Cloud | Current | CVE-2021-44228: Fixed 12/16 CVE-2021-45046: Fixed 12/20 |
None |
Splunk Synthetics | Cloud | Current | CVE-2021-44228: Fixed 12/10 CVE-2021-45046: Fixed 12/20 |
None |
Splunk UBA OVA Software | On-Prem | 5.0.3a, 5.0.0 | See Removing Log4j from Splunk User Behavior Analytics section below |
Investigation has concluded that these products are not impacted by CVE-2021-44228 or CVE-2021-45046.
The guidance in this section is intended to be used in the case that Splunk Enterprise cannot be upgraded using the official patches for version 8.1 and 8.2. The guidance below will help you remove jar files associated with both vulnerabilities (CVE-2021-42288 and CVE-2021-45046).
If the Splunk Enterprise instance does not leverage DFS, the presence of those libraries does not introduce an active attack vector. Out of an abundance of caution, you may remove the unused jar files and directories from your Splunk Enterprise instances in the following paths:
Upon removal of these jar files, an administrator may see errors at Splunk startup pertaining to file integrity, specific to these jar files. These are expected as you are removing these unused jar files as a workaround. These errors may be ignored.
Jar files matching the same filename of the files found in the directories above, but found in other directories on your Splunk instances are likely from normal Splunk operation (e.g. search head bundle replication) and can be safely deleted. If any jar files return in the splunk_archiver app, disabling the default Bucket Copy Trigger search in that app will stop this behavior from happening.
*Since a Splunk Heavyweight Forwarder (HWF) is a full-instance copy of Splunk Enterprise with forwarding enabled, the above mitigation may also be applied to HWF instances.
To determine if Distributed Fabric Search is in use, you may run the following query from a Splunk search head:
| history | search search=*dfsjob* | rex field=search "(?P<dfs_cmd>\|\s*dfsjob)" | search dfs_cmd=* and search!=*eval* | where len(dfs_cmd) > 0
If the above search returns results, then DFS is enabled and searches have been run using the capability. You may also look for the parameter "disabled=false" in server.conf to determine if DFS is enabled.
Although Hadoop Data Roll (archiver) functionality does not introduce an active attack vector, users who do not use this functionality may choose to remove the Log4j files out of an abundance of caution. To determine if this feature is in use, you may run the following query from a Splunk search head:
index=_internal source=*/splunk_archiver.log | rex field=_raw "json=\"(?P<json>.*)\"" | chart values(json)
If the above search returns the following, then Hadoop Data Roll is NOT in use:
Only the DFS functionality of unsupported versions of Splunk Enterprise that include DFS (the 8.0 release and later) is affected by CVE-2021-44228 and CVE-2021-45046. The above removal guidance can be applied to those versions as well. Splunk has provided an official patch for supported versions 8.1.7.1 and 8.2.3.2.
Versions of UBA prior to 5.0 leveraged Apache Storm, which embeds Log4j. The presence of those libraries does not introduce an active attack vector. Out of an abundance of caution, you may follow the procedure here to completely remove Apache Storm and the Log4j libraries from your UBA AMI, OVA, and bare-metal installs.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.