Apache Log4j Vulnerabilities (Log4Shell, CVE-2021-44228, CVE-2021-45046) - Impact to Siemens Products
Apache Log4j vulnerability CVE-2021-44228 ("Log4Shell") and CVE-2021-45046 allow unauthenticated remote code execution via JNDI injection in logging statements. An attacker sends a crafted message to any service using affected Log4j versions; when the message is logged, embedded code is automatically executed. A secondary vulnerability (CVE-2021-45046) initially published as denial-of-service was reclassified to also permit information disclosure and local/remote code execution. Siemens products across multiple divisions (product lifecycle management, process automation, energy, building control, cloud services) are affected. Fixes range from patched versions to no-fix-available status depending on product line.
- Network access to any service running affected Siemens products (often web-facing or accessible from engineering networks)
- The targeted service must pass user-controlled data to Log4j for logging
- No credentials required
/api/v1/advisories/a778466d-cd3a-437f-a4be-1e8844f512eaGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.