Log4j Vulnerability - Please Post All Questions Here


Userlevel 7
Badge +23

Summary
 

The following thread describes the potential exposure to the Apache Log4j vulnerability and steps to update Commvault software.

It has been confirmed that a small subset of Commvault agents are impacted. 

 

Update as of 1st February: Maintenance Release to bring Log4j version to 2.17.1 across Commvault software platform has been released. This release includes the upgrade of components that previously used Log4j 1.x. 

 

Update as of 20th December: Maintenance Release including relevant hotfixes now available for Commvault software, see section “Maintenance Releases”. Please note customers who have already applied hotfixes for Log4j 2.16, do not need to install.

For customers with Commvault Hyperscale X and Distributed storage, please see section new Community article here: 

 

Apache Log4j information

  • CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints. From log4j 2.15.0, this behavior has been disabled by default
  • CVE-2021-45046: Apache Log4j 2.15.0 was incomplete in certain non-default configurations. Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default
  • CVE-2021-45105: Apache Log4j2 did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. 
  • CVE-2021-4104: JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data.

  • CVE-2021-44832: Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code.

Note: Log4j version 1.x is NOT affected.

There’s a great blog article that covers the potential impact.

 

Updates:

CVE-2021-45105: Commvault can confirm that the affected Log4j2 function is NOT leveraged by Commvault software and thus there is no immediate need to update Commvault to use Log4j 2.17. 

CVE-2021-4104: The Commvault software does not use the JMSAppender module and, therefore, the vulnerability about log4j 1.x versions does not affect any Commvault products.

CVE-2021-44832: The Commvault software does not use the JdbcAppender module and, therefore, the vulnerability about remote code execution attack does not affect any Commvault products.

 

Identifying and Updating Commvault

 

Exposure:

Note: check FAQ at the bottom of this post for specific version questions.

The exposure impacts the below Commvault product features:

Cloud Apps package
Oracle agent - Database archiving, data masking, and logical dump backup
Microsoft SQL Server agent - Database archiving, data masking, and table level restore

Commvault Distributed Storage

Commvault Hyperscale X

 

Identifying affected servers using the Commvault Log4j report

 

Please use the below direct link to download the Commvault Log4J Affected Servers report then follow step 4 to import and run

https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789  

 

Alternatively, follow steps 1-3 to manually download the Commvault report:

  1. Log into cloud.commvault.com and click the Software Store tile icon 
  2. Search the Store for Log4j and click the Download button for the “Log4J affected servers” report 
  3. Log into Command Center and navigate to Reports
  4. At the top right of the Reports page, click Actions and Import report. Proceed to select the downloaded report file to import into Command Center. 
  5. Now you can run the report.

This report will show you any servers with Cloud Apps, SQL Server, and Oracle Database packages installed that may be affected by Log4j vulnerability.
Note: If the resulting report shows No Data to Display, then there are no affected clients in this CommCell

The easiest course of action is to upgrade all servers listed in this report (Oracle, Cloud Apps, and SQL) – that would be the recommendation. However, at a minimum, servers with Database Archiving, Data Masking, or Extent based backups (SQL table level restore) features enabled should have highest priority as the vulnerable log4j package is actively used, while otherwise the packages are dormant.

 

Maintenance Releases

 

The table below outlines the specific Maintenance Releases that will both address Log4j 2.x vulnerabilities as well as update Log4j 1.x components to 2.17.1 (the latest release of Log4j)

Note: If the previous Log4j 2.16 hotfixes has already been applied, then this latest Maintenance Release is optional 

Feature Release

Maintenance Release

11.26

11.26.21

11.25

11.25.32

11.24

11.24.48

11.23

11.23.47

11.20

11.20.90

SP16

SP16.153

 

How to deploy Maintenance Release:

 

  1. First perform a disaster recovery backup using steps HERE .
  2. OPTIONAL: create a server group containing all the affected servers using instructions HERE.  This can make it easier to select servers for the upgrade process.
  3. Go to documentation to find the list of updates: https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html
  4. Download the maintenance pack for the version the CommServe is running on. 

    If you do not know the CommServe version, in Command Center search for About and click the About search result to bring up the version popup. 
  5. Extract the Maintenance Pack
  6. Follow instructions HERE to copy the software packages to the cache using Command Center.  
  7. Proceed to Install updates following instructions HERE .  You can update only the affected clients to avoid the CommServe services stopping, however it is recommended to update the CommServe and all affected servers as shown on the report for completeness.
  8. Once completed re-rerun the report to show that the servers have the appropriate fixes

Note: For instructions on how to apply Log4j 2.16 hotfixes on older Maintenance Release, please see FAQ

 

See Commvault Online Documentation for additional information:

https://documentation.commvault.com/11.25/essential/146231_security_vulnerability_and_reporting.html

 

HyperScale X and CDS (Hedvig)

 

For all detailed information on how to update HyperScale X and Commvault Distributed Storage (CDS) to address Log4j vulnerabilities, please see article here:

 

 

Log4j FAQ 

 

Q:   There is a new vulnerability in 2.15 is Commvault addressing this? 

A:   The LOG4J 2.15 version (GA Dec. 06, 2021) disabled the essential exploit functions by default was released last week on Dec 6, 2021. This was considered the market-acceptable, non-vulnerable upgrade package up to today.  

 The Apache organization released a new version, 2.16, on Monday, Dec.13, 2021, which physically removes the vulnerable functions. 

 This evening, the security groups issued a new vulnerability CVE-2021-45046 targeting concerns with the 2.15 version and recommending the shift to 2.16.   

  This significant change affects all client remediation methods, requiring an upgrade to version 2.16.  Log4j 2.16 hotfixes have now been released, please see table above

 

Q: When will new hotfixes be available for 2.16 log4j? 

A: Log4j 2.16 hotfixes have now been released, please see table above

 

Q:  I've noticed older 1.x versions of log4j being used in the platform.  Are these vulnerable? 

A:   We have some older instances in the installed component structure related to the older generation Log4J 1.x files which are not part of the current CVE Log4J 2.x vulnerability. We are doing further investigation on those conditions to determine a course of action.  

We do plan to remove all 1.x references in the Feb 1st maintenance release to prevent “false alarms”.  That version is not vulnerable to the current respective CVEs, but it would clear up the scanning concerns.

 

Q:  I noticed HyperScale 1.5 is using end of life versions of Log4j.  Is this being resolved? 

A:  The 1.x versions of log4j bundled with HyperScale 1.5 are maintained and supported by Redhat.  These versions are not affected by this CVE. 

 

Q: Are older versions like v10 and v9 affected?

A: These versions are not affected

 

Q: Why are some updates showing skipped during Copy to Cache?

A: These are updates for Operating Systems your CommCell does not have.  It’s more informational than error related.

 

Q: Why does the report show No Records Available or No Items to Display?

A: This means there are no affected clients in this CommCell

 

Q: What order should I apply the updates?

A: The Maintenance Release needs to be installed first, then the Hotfix Pack.  The best option is to use Copy to Cache, followed by pushing the updates out from the GUI as per the instructions.  This will ensure everything is applied as needed in the correct order.

 

Q: Can I remove versions manually?

A: No, removing anything manually will potentially cause features to not work properly.  Use the Maintenance Releases and Hotfix packs to remediate.

 

Q: Is Anti-virus a concern?

A: It is possible that an AV service may lock the affected files out of concern and cause features to not work properly.  Use the Maintenance Releases and Hotfix packs to remediate.

 

Q: How do I download Maintenance Release using CommCell Console?

A: Please follow Commvault Online Documentation steps below

https://documentation.commvault.com/11.25/expert/2705_downloading_commvault_software_using_commcell_console.html

 

Q: Is Metallic vulnerable to the vulnerability?

A: We have found that the Log4j vulnerability has no impact on Metallic or the security and privacy of your data backups. Metallic does not use the impacted libraries as per the Apache Log4j advisory.

We will continue to proactively monitor and provide any further updates, while customers with questions can reach out to Metallic.io/support.

 

Q: Log4j scanner is still picking up DbArchiveEngine.jar as potentially vulnerable?

A: Some Log4j scanners are actually incorrectly picking up DbArchiveEngine.jar as potentially vulnerable when in fact it is already patched. This is because the scanner was unable to determine the version of Log4j used and ending up marking it as “potentially vulnerable”. Please note that if you have patched Commvault clients with either the 2.16 hotfix or the latest Maintenance Release, then this DbArchiveEngine.jar binary is also patched and will not have the Log4j 0-day vulnerability. 

 

Q: I have updated to latest Maintenance Release but Log4j Affected Servers report is still showing my clients as not fixed?

A: There has been a new Log4j Affected Servers report released on December 22nd that has updated the checks to correctly report fixed for clients on the latest Maintenance Release. This new report is version 1.1.2.3 whereas the previous report is 1.1.2.2.

 

Q: How do I apply the Log4j hotfixes if I am already on the older minimum required Maintenance Release?

A: Please follow below steps:

  1. Ensure the Commserve and affected clients are on the minimum required Maintenance Release pack. 
    1. If not, please download and install using the CommCell Console 
    2. Alternatively, you may download the minimum required Maintenance Release from the links in the table below
  2. Download the Log4J-Fix pack for your version
  3. Unzip the contents of the download
  4. Run Copy To Cache and point to the folder created by the unzip to add the new updates to your software cache
  5. Push out updates to the clients
  6. Verify client status by checking the Log4j Affected Servers report or Client Details report or viewing the client properties

Log4j 2.16 fixes (CVE-2021-44228, CVE-2021-45046)

Feature Release

Minimum Required
Maintenance Release

Update Link (includes 2.16 fix)

Installed Windows
Updates

Installed
Unix Updates

11.26

11.26.2

11.26 Log4J-2.16 Fix

1755

1755

11.25

11.25.9

11.25 Log4J-2.16 Fix

2763

2779

2763

2779

11.24

11.24.23

11.24 Log4J-2.16 Fix

4552

4564

4551

4564

11.23

11.23.37

11.23 Log4J-2.16 Fix

4160

4178

4161

4178

11.22

11.22.50

11.22 Log4J-2.16 Fix

3911

3920

3912

3920

11.21

11.21.66

11.21 Log4J-2.16 Fix

3587

3599

3588

3599

11.20

11.20.77

11.20 Log4J-2.16 Fix

4562

4574

4561

4574

SP16

SP16.128

SP16 Log4J-2.16 Fix

2943

2946

2942

2946


344 replies

Badge

I received the Log4JAffectedServers.xml file from CV Support.  Does Anyone have instructions as to How to Run the Report to see what servers are Vulnerable in my Environment?  The XML report is Located here: https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789

  1. Log into the Command Center

  2. From the navigation pane, click Reports.

    The Reports page appears.

  3. At the top of the page, click Actions > Import report.

  4. Specify the location where the report XML file is saved, and then click Open.

    The report template appears in the list on the Reports tab and is deployed to the Reports page.

Userlevel 5
Badge +11

I received the Log4JAffectedServers.xml file from CV Support.  Does Anyone have instructions as to How to Run the Report to see what servers are Vulnerable in my Environment?  The XML report is Located here: https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789

Hi @Jeremy Fisher 

 

You should be able to import this report into your webconsole with the import option:

https://documentation.commvault.com/11.25/essential/97429_importing_report_templates.html

 

Thank you

Userlevel 2
Badge +9

What specifically does this report check? Are only the specified agents and features enabled, or log4j v2.x or both?

Userlevel 3
Badge +6

@Stuart Painter@Jordan

i Just noticed that there is another fix been released and the documentation is been updated.. Can there please send out a notification to all customers to aware that the earlier provided fix isn’t enough..

https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html

Badge

Hi all,

One of my customers has tried to install the 4552 update but got a message on 4553: “None of the updates are applicable for the packages installed on the machine”. Since he was installing this on a Commserve/MediaAgent/VSA combination machine I suspect that indeed the 4553 is not necessary, but am I right here?

Thansk in advance for your answers!

Userlevel 2
Badge +7

Hi,

Once the hotfix has been copied to cache all clients in Commcell Console are showing as “Needs Update” and not just clients with the SQL agent installed. 

Most show the “File System Core” as the package that requires an update (SP24-HotFix-4552)

For Hyperscale it is showing as “Base0 Module” package requiring updates (SP24-HotFix-4383,  SP24-HotFix-4413, SP24-HotFix-4485 and SP24-HotFix-4551).

Is this expected behaviour and is it best to run an “Update Sofwtare” for all clients and not just the for the clients with agents listed in the “affected” section of this KB?

Thanks

Badge +5

Hello guys,

newest info is that 11.25 Log4J Fix is deprecated (please use SP16 Log4J-2.16 Fix). This is probably based on the news that log4j 2.15 is vulnerable after all. We have, however, updated *a lot* of customers in the last days with the former fix. What does it mean? Is the now deprecated fix to be replaced with the “2.16” version, as it does not help to fix the vulnerablility?

If so, can the new one be installed right over the 1st fix? There’s no mentioning in BOL.

Thanks.

Userlevel 3
Badge +6

Hi all,

One of my customers has tried to install the 4552 update but got a message on 4553: “None of the updates are applicable for the packages installed on the machine”. Since he was installing this on a Commserve/MediaAgent/VSA combination machine I suspect that indeed the 4553 is not necessary, but am I right here?

Thansk in advance for your answers!

the 4553 and the updated version 4564 (regarding 2.16) is for specific agents

Userlevel 7
Badge +15

Hi @0ber0n 

The report Log4J affected servers report checks affected clients/agents and displays their update status for log4j updates in a report format, so you can check your environment status in one simple location.

Thanks,

Stuart

Userlevel 7
Badge +15

@Stuart Painter@Jordan

i Just noticed that there is another fix been released and the documentation is been updated.. Can there please send out a notification to all customers to aware that the earlier provided fix isn’t enough..

https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html

HI @M Scheepers 

Yes, this is the latest information that highlights the need to update to log4j 2.16 to resolve both CVE-2021-44228 and CVE-2021-45046.

Everyone here at Commvault is working extremely hard to get both the hotfixes and messaging out to customers - this Community and Documentation pages are just some of the ways we’re publishing these resources. There are and will be more communications issued through various channels to ensure everyone is well informed.

Thanks,

Stuart

Userlevel 7
Badge +15

Hi all,

One of my customers has tried to install the 4552 update but got a message on 4553: “None of the updates are applicable for the packages installed on the machine”. Since he was installing this on a Commserve/MediaAgent/VSA combination machine I suspect that indeed the 4553 is not necessary, but am I right here?

Thansk in advance for your answers!

Hi @HenkFikke01 

You are correct, not all the hotfixes are applicable to all servers as not all servers will have affected packages.

Take a look at the Log4J affected servers report to help identify affected servers in your environment, as a reminder:

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

Thanks,

Stuart

Badge

If the Log4j Report shows none of your clients are affected , So do we still have to upgrade to the latest hotfix and log4j fix.. 

Badge

Hi all,

Would anyone be able to confirm if ii am correct in saying, if i do not have the below option enabled on my SQL server agents i do not have to apply the Log4j fix?  

Thanks in advance

 

 

Userlevel 7
Badge +15

Hi,

Once the hotfix has been copied to cache all clients in Commcell Console are showing as “Needs Update” and not just clients with the SQL agent installed. 

Most show the “File System Core” as the package that requires an update (SP24-HotFix-4552)

For Hyperscale it is showing as “Base0 Module” package requiring updates (SP24-HotFix-4383,  SP24-HotFix-4413, SP24-HotFix-4485 and SP24-HotFix-4551).

Is this expected behaviour and is it best to run an “Update Sofwtare” for all clients and not just the for the clients with agents listed in the “affected” section of this KB?

Thanks

Hi @Tom Evans 

Running updates to all clients certainly won’t hurt, different hotfixes will apply different clients and packages.

Take a look at the Log4J affected servers report to help identify affected servers in your environment, as a reminder:

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

So, for these affected clients, there is an update to FileSystemCore package to remove log4j binaries as part of the update.

Thanks,

Stuart

Userlevel 7
Badge +15

Hello guys,

newest info is that 11.25 Log4J Fix is deprecated (please use SP16 Log4J-2.16 Fix). This is probably based on the news that log4j 2.15 is vulnerable after all. We have, however, updated *a lot* of customers in the last days with the former fix. What does it mean? Is the now deprecated fix to be replaced with the “2.16” version, as it does not help to fix the vulnerablility?

If so, can the new one be installed right over the 1st fix? There’s no mentioning in BOL.

Thanks.

Hi @Ingo Maus 

The Security and Vulnerability Reporting page has the latest info:

https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html

With log4j 2.15 fixes now superseded by log4j 2.16 fixes.

So if you have already applied the initial hotfixes updating to log4j 2.15, you can go ahead and then install these later log4j 2.16 fixes over the top.

If you have not yet applied any hotfixes, please go straight for the log4j 2.16 fixes.

Thanks,

Stuart

Userlevel 7
Badge +15

If the Log4j Report shows none of your clients are affected , So do we still have to upgrade to the latest hotfix and log4j fix.. 

Hi @chandrashekar 

Commvault has responded to the log4j vulnerability by providing these hotfixes, report and this guidance to enable you to make your own decisions for your environment. 

These hotfixes have been provided “out of band” for our customers to install and resolve these vulnerabilities immediately and they will also be rolled up into an MR release.

These Maintenance Releases are provided to ensure you have the latest fixes for Commvault and so by keeping up to date and installing MR packs, you will still benefit from these fixes, but after some time.

Best advice as of now is to update to the minimum version and log4j 2.16 hotfixes for any clients that may be at risk from this vulnerability.

Thanks,

Stuart

Userlevel 7
Badge +15

Hi @JustinWilloughby 

Commvault has responded to the log4j vulnerability by providing these hotfixes, report and this guidance to enable you to make your own decisions for your environment. 

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

These hotfixes have been provided “out of band” for our customers to install and resolve these vulnerabilities immediately and they will also be rolled up into an MR release.

These Maintenance Releases are provided to ensure you have the latest fixes for Commvault and so by keeping up to date and installing MR packs, you will still benefit from these fixes, but after some time.

Best advice as of now is to update to the minimum version and log4j 2.16 hotfixes for any clients that may be at risk from this vulnerability.

Thanks,

Stuart

Badge

Do we have to update commserve, media agents ,fre servers with  Log4j hotfix  SP16 Log4J-2.16 Fix .. or only clients which are having sql,oracle agents and  which are affected should be updated ..

 

Userlevel 7
Badge +15

Do we have to update commserve, media agents ,fre servers with  Log4j hotfix  SP16 Log4J-2.16 Fix .. or only clients which are having sql,oracle agents and  which are affected should be updated ..

 

Hi @chandrashekar 

Please take a look at the guidance in the sticky post at the top of the page, this is being updated regularly, with more questions coming in, we’re updating the page and this now includes an FAQ section that will get added to over time - please do check back regularly.

Take a look at the Log4J affected servers report to help identify affected servers in your environment, as a reminder:

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

Thanks,

Stuart

Badge

Hi @JustinWilloughby 

Commvault has responded to the log4j vulnerability by providing these hotfixes, report and this guidance to enable you to make your own decisions for your environment. 

This vulnerability may affect the following products:

  • Cloud Apps package

  • Oracle agent - Database archiving, data masking, and logical dump backup

  • Microsoft SQL Server agent - Database archiving, data masking, and table level restore

These hotfixes have been provided “out of band” for our customers to install and resolve these vulnerabilities immediately and they will also be rolled up into an MR release.

These Maintenance Releases are provided to ensure you have the latest fixes for Commvault and so by keeping up to date and installing MR packs, you will still benefit from these fixes, but after some time.

Best advice as of now is to update to the minimum version and log4j 2.16 hotfixes for any clients that may be at risk from this vulnerability.

Thanks,

Stuart

Thanks Stuart, 

We do not run Cloud Apps, Oracle Agents.we so have SQL agents but they do not do these tasks below

Microsoft SQL Server agent - Database archiving, data masking, and table level restore

as show from one of the client default subclients

So with this in mind would you say im ok not applying the fix.?

 

Userlevel 7
Badge +15

Thanks Stuart, 

We do not run Cloud Apps, Oracle Agents.we so have SQL agents but they do not do these tasks below

Microsoft SQL Server agent - Database archiving, data masking, and table level restore

as show from one of the client default subclients

So with this in mind would you say im ok not applying the fix.?

 

Hi @JustinWilloughby 

Let’s take the SQL agent as an example as you mention you have some SQL clients.

The vulnerable log4j 2.x binaries may not be used by SQL agent unless the highlighted features are are actually configured and used.

However, these vulnerable binaries may still be found on the client systems and still represent some risk of exposure, perhaps a lower risk as they may not be used, but some risk nonetheless.

So, our best advice right now to apply the minimum versions stated in the guidance above and the hotfixes provided to ensure your environment is protected.

Thanks,

Stuart

Badge +2

I do see Commvault has updated Security Vulnerability and Reporting (commvault.com) to include a new Log4J-2.16 Fix.  Are there any instructions on if you have the previous Log4J Fix already installed?  I.E.  Can you just add the new one to the cache and install over the old one?  Or do you have to somehow remove the old first?

Userlevel 7
Badge +15

I do see Commvault has updated Security Vulnerability and Reporting (commvault.com) to include a new Log4J-2.16 Fix.  Are there any instructions on if you have the previous Log4J Fix already installed?  I.E.  Can you just add the new one to the cache and install over the old one?  Or do you have to somehow remove the old first?

Hi @Dave S 

Yes, you can import the new fixes and deploy these over the top of the previous ones - no need for uninstall.

Likewise if you have any clients that didn’t get the previous hotfixes, you can jump straight to the latest ones.

Thanks,

Stuart

Userlevel 4
Badge +13

Is there way to determen if the Log4J-2.16 is in the cache? What HotFix numbers should I see?

//Henke

Userlevel 4
Badge +13

I downloaded the report showing what servers may be effected by Log4j, but the result isn’t what I expected.

Is there no result in the report immediately once installed to the webconsole?

//Henke

Reply