12-10-2021 08:30 AM - edited 12-29-2021 09:04 AM
Update 12/28
On December 9, 2021, a Remote Code Execution (RCE) vulnerability (CVE-2021-44228) was identified in the log4j library (https://www.lunasec.io/docs/blog/log4j-zero-day/). The log4j project released version 2.15 to address this issue. New information has come to light identifying ways to exploit log4j 2.15 when the formatMsgNoLookups parameter was not set. CVE-2021-45046 was assigned to this and fixed on December 16, 2021 in log4j 2.16.
We have continued to assess the impact and mitigate the vulnerability across our platform (tracked as PI-010403) as the security community has identified new issues in log4j.
Due to the nature of these issues, these are considered critical vulnerabilities.
What Jamf products are impacted by the log4j vulnerability?
Jamf Pro (hosted on-premises): Patched
We strongly encourage everyone running Jamf Pro on-premises to update to 10.34.2 or follow the manual instructions above as soon as possible.
Jamf Pro (Jamf Cloud and Jamf Cloud Premium): Mitigated and Patched
Jamf Connect: Not affected
Jamf Connect does not use the affected libraries.
Jamf Now: Not affected
Jamf Now does not use the affected libraries.
Jamf Protect: Not affected
Jamf Protect does not use the affected libraries.
Jamf School: Not affected
Jamf School does not use the affected libraries.
Jamf Threat Defense: Not affected
Jamf Threat Defense does not use the affected libraries.
Jamf Data Policy: Not affected
Jamf Data Policy does not use the affected libraries.
Jamf Private Access: Not affected
Jamf Private Access does not use the affected libraries.
Health Care Listener: Not vulnerable
While Health Care Listener does utilize the library that includes the vulnerability, it cannot be exploited by an attacker. Healthcare Listener 2.2.2 assets containing the updated version of Log4j 2.17 are available for download on Jamf Account.
Jamf Infrastructure Manager: Not vulnerable
While Jamf Infrastructure Manager does utilize the library that includes the vulnerability, it cannot be exploited by an attacker. Jamf Infrastructure Manager 2.2.2 assets containing the updated version of Log4j 2.17 are available for download on Jamf Account.
Next Steps
On December 17, 2021, we released Jamf Pro 10.34.2 to address the vulnerability. For more information on what’s included in this release, review the release announcement on Jamf Nation or read the release notes here.
If you cannot upgrade to this latest release, you can choose to manually update the log4j instances of the affected systems as described in our technical documenta.... If you choose to implement the manual workaround as described, future updates (to versions after 10.34.2) will not be affected. For assistance with this workaround, reach out to support@jamf.com.
UPDATE 12/18
We are aware of CVE-2021-45105 that was remediated in log4j 2.17.0. At this time, this new vulnerability does not seem to affect any Jamf products or services. The conditions required for the exploitation of the vulnerability are not met by Jamf's use of the log4j library. No further action is required at this time.
UPDATE 12/28
We are aware of CVE-2021-44832 that was remediated in log4j 2.17.1. Based on public disclosures to date, this vulnerability does not affect any Jamf products or services. The conditions required for the exploitation of the vulnerability are not met by Jamf’s use of the log4j library. No further action is required at this time. We will continue to monitor the situation and will report on new information as it becomes available.
If you have any questions, please reach out to Customer Success for assistance.
Solved! Go to Solution.
Posted on 12-28-2021 06:33 PM
UPDATE 12/28
We are aware of CVE-2021-44832 that was remediated in log4j 2.17.1. Based on public disclosures to date, this vulnerability does not affect any Jamf products or services. The conditions required for the exploitation of the vulnerability are not met by Jamf’s use of the log4j library. No further action is required at this time. We will continue to monitor the situation and will report on new information as it becomes available.
Posted on 12-10-2021 09:19 AM
Will we be notified on the fix for jamf cloud? I have security folks asking for statuses on all our SaaS right now.
Posted on 12-10-2021 09:47 AM
We will update customers for all Jamf products, including Jamf Cloud, when we are able to share more information.
Posted on 12-10-2021 09:49 AM
@tlarkin See Aaron's response above. I didn't want you to miss it. 😀
Posted on 12-21-2021 10:11 AM
Can you get Aaron_Kiemele a badge like yours that states his position or employment status with Jamf. Right now it looks like some random person off the street.
Posted on 12-10-2021 10:42 AM
While awaiting official guidance from Jamf, Jamf (esp on-prem) admins might want to review this post RCE 0-day exploit found in log4j
12-10-2021 10:51 AM - edited 12-10-2021 10:52 AM
I applied that mitigation and rebooted my server. I'm running 10.34.
Scanning it now to see if anything was dropped on the server. Nothing yet.
Went through stuff like this with Exchange back in March! Not fun!
I also have a case opened (critical) and waiting to hear back from them.
Posted on 12-10-2021 10:59 AM
So, there's a potential Security issue...and this is the medium for notice? Seems like there's something missing in this process....
Posted on 12-10-2021 02:11 PM
Any update?
Posted on 12-10-2021 02:56 PM
I have our infosec team asking for an update as well. Anything?
Posted on 12-10-2021 03:56 PM
It has been 7 hours since this post was made and we've seen more info from JAMF customers regarding impact and remediation than from JAMF.
An update would be appreciated.
Posted on 12-10-2021 04:02 PM
Instead of whining at JAMF, why not just TURN YOUR SERVERS OFF for the weekend; at least?
I'm sure JAMF is doing all they can and I appreciate their efforts.
Posted on 12-10-2021 04:20 PM
I'm certain that they are working diligently toward addressing this issue.
I've worked with them on addressing a number of issues and they have been incredibly helpful in resolving things.
Although some kind of follow up on the progress made while investigating and remediating the issue would help to alleviate some concern. We all appreciate their effort, you seem to be under the misconception that I don't.
12-10-2021 05:00 PM - edited 12-17-2021 12:50 PM
Posted on 12-10-2021 06:31 PM
Where can we download Jamf Pro 10.34.1?
Posted on 12-10-2021 07:06 PM
To access the latest version of Jamf Pro, log into Jamf Account with your Jamf ID. The latest version is located in the Products section under “Jamf Pro.”
12-10-2021 07:40 PM - edited 12-17-2021 12:49 PM
Posted on 12-13-2021 07:39 AM
Does this impact the Jamf ADCS tool in any way?
Posted on 12-13-2021 09:27 AM
@landon_Starr The ADCS Connector is not impacted by this issue.
12-21-2021 09:59 AM - edited 12-21-2021 10:04 AM
Do you have documentation from Jamf or some report stating it is not impacted?
Edit: Just googled you and realized you are the CISO. I'm leaving my question up because you really need a badge stating your position with Jamf. By just looking at your profile it looks like you are a random person off the street. Your job title should be under your name, not this "New Contributor III."
Posted on 12-13-2021 10:27 AM
For Jamf Infrastructure Manager is it not exploitable because Java is not actively running?
I notice these JAR files containing log4j 2.13.3 version components in JIM 2.2.0 at:
C:\Program Files\Jamf\Infrastructure Manager\jamf-im-enroll-2.2.0-2.2.0.jar
C:\Program Files\Jamf\Infrastructure Manager\jamf-im-launcher-2.2.0-2.2.0.jar
Are these needed or can they be deleted?
Posted on 12-13-2021 12:11 PM
@fgonzale JIM is not exploitable since no untrusted user data is ever logged. We purposely minimize what information is logged by JIM to mitigate any potential data handling issues.
Deleting the JAR files above would however cause JIM to no longer function correctly.
Posted on 12-13-2021 12:51 PM
Thank you for looking into this. This is obviously a small, but vital and extremely sensitive component.
Posted on 12-14-2021 09:18 AM
It looks like the Jamf Infrastructure Manager was just updated to version 2.2.1 which includes a newer 2.15 log4j library.
https://docs.jamf.com/infrastructure-manager/2.2.1/Jamf_Infrastructure_Manager_Release_History.html
Thank you!
Posted on 12-14-2021 01:00 PM
A new CVE affecting log4j 2.15.0.
log4j 2.16.0 has been released in response.
12-14-2021 04:20 PM - edited 12-17-2021 12:51 PM
Update 12/14 - We are aware of CVE-2021-45046 that was remediated in log4j 2.16.0. Based on what we know today, this new vulnerability does not affect Jamf products. The conditions required for the exploitation of the vulnerability are not met by Jamf's use of the log4j library. We will continue to investigate and monitor, but no further action is required to remediate this CVE with Jamf products.
Aaron Kiemele
Chief Information Security Officer, Jamf
Posted on 12-14-2021 06:06 PM
Thanks for confirming that this CVE does not affect JAMF at this time. Would there be any issue if we go ahead and update log4j to v2.16.0 using prior manual remediation steps anyway for consistency? I can imagine that our IT Security would prefer that we err on the side of caution and update anyway for consistency.
12-15-2021 10:00 AM - edited 12-15-2021 10:00 AM
@R_C As 2.16.0 does not resolve any issues we are aware of, I would not recommend straying off the recommended workflow.
Posted on 12-16-2021 12:31 PM
Can you elaborate on these conditions? I know our security group would want context. Can you help us out? Esp if further down you are NOT recommending the manual update here(but to 2.16):
https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
Posted on 12-16-2021 12:43 PM
Posted on 12-16-2021 01:21 PM
This is what was changed in 2.16.0 and what Jamf is not using and why it won't effect Jamf Services.
https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0
12-17-2021 02:21 AM - edited 12-17-2021 02:32 AM
If Jamf Services are not affected by the changes in 2.16.0 then there is no reason not to include 2.16.0 instead of 2.15.0 in the release asap.
Posted on 12-15-2021 06:23 AM
Hello,
I have a question regarding the cloud instances.
Posted on 12-16-2021 10:05 AM
It goes both ways. Your security team would not be happy if Jamf asked it to disclose the "appropriate security controls" used to prevent access to your network, would they?
Posted on 12-15-2021 06:31 AM
Sounds like this may not be the end of the story. Looks like as of Monday 2.15.0 was found to not fully patch the vulnerability in all configuration.
https://logging.apache.org/log4j/2.x/security.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
Posted on 12-15-2021 06:43 AM
Posted on 12-16-2021 03:49 PM
For customers that are Government Contractors CISA is REQUIRING companies be patched to 2.16 no later than 12/24 It would be great if jamf would patch the installers to accommodate for this, I realize this can be done manually but it will have to be done each time the JSS is upgraded.
https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance
Note: CISA will continue to update this webpage as well as our community-sourced GitHub repository as we have further guidance to impart and additional vendor information to provide.
CISA and its partners, through the Joint Cyber Defense Collaborative, are responding to active, widespread exploitation of a critical remote code execution (RCE) vulnerability (CVE-2021-44228) in Apache’s Log4j software library, versions 2.0-beta9 to 2.14.1, known as "Log4Shell." Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information. An unauthenticated remote actor could exploit this vulnerability to take control of an affected system.
In order for these vulnerabilities to be remediated in products and services that use affected versions of Log4j, the maintainers of those products and services must implement these security updates. Users of such products and services should refer to the vendors of these products/services for security updates. Given the severity of the vulnerabilities and the likelihood of an increase in exploitation by sophisticated cyber threat actors, CISA urges vendors and users to take the following actions.
Posted on 12-17-2021 01:44 AM
Question: How to check, if a Jamf Pro (Windows) server is already affected by active use of the Log4j vulnerability?
Would you see some suspicious entries in Jamf or Apache logs?
Posted on 12-17-2021 06:33 AM
Aaron_Kiemele Is it possible to put a DATE on your UPDATE as we can't see if it was posted BEFORE or AFTER the last reply in this thread
THX
Posted on 12-17-2021 07:28 AM
Great point, thank you. I will correct going forward.