

Customers must review and action these recommendations with absolute priority.ĭue to the severity of this vulnerability, this article provides communication on actions to take to mitigate risk in customer environments. The Security Bulletin provides information to customers regarding possible impact to products in their environment, and the appropriate actions to take to mitigate risk.

IMPORTANT: McAfee Enterprise has published SB10377 - REGISTERED - Security Bulletin - McAfee Enterprise products' status for "Log4Shell" (CVE-2021-44228).
#Mc afee serial number upgrade#
It’s recommended that customers upgrade vulnerable systems to Apache Log4j 2.15.0. For third-party applications, contact the applications vendors on steps to do so.
#Mc afee serial number code#
Attackers can leverage log messages or log message parameters to perform remote code execution on LDAP servers and other JNDI-related endpoints. This vulnerability is considered critical, with a CVSS(3.0) score of 10.0. McAfee Enterprise is aware of CVE-2021-44228, commonly referred to as Log4Shell, recently released by Apache. Updated the "Hunting, Vulnerability Assessment, and Investigation" section with a query for self-assessment of reported vulnerable versions of Log4j by hash. "Problem" area has been updated to reflect CVE-2021-45046 (CVSS(3.0) 3.7) and the added complexity on workarounds. Updated "Problem" area with summary, details around Java and CVE-2021-4104. Improved readability of product coverage section. Included screenshots representing EDR queries.Īdded information about newly released SIEM content pack containing alarm for Log4j exploit indicators.

Updated IOC detections observed for in-the-wild payloads. Updated with a rule set for McAfee Web Gateway (MWG) and UCE.Īdded AC3 blog posting detailing Expert Rule/ExtraDAT coverage. Added an updated ExtraDAT for use with the Expert Rule solution containing improved cleaning drivers.
