ArcGIS Enterprise

ArcGIS and Apache Log4j Vulnerabilities

Esri is actively investigating the impact of the following Log4j library vulnerabilities as some Esri products contain this common logging tool:

This bulletin contains the latest information about Esri products and will be updated as new information becomes available.

Initial Post 12/12/21 – Last Updated 1/26/22 – 12pm PT

The Joint Cybersecurity Advisory, representing cybersecurity organizations around the globe, provides a useful summary of Log4j vulnerability mitigation guidance that customers may want to reference in addition to our product specific recommendations.  Two aspects your organization should consider implementing are alerting and blocking mechanisms for this issue.  To help ease implementing the recommended blocking mechanism of a Web Application Firewall (WAF) with Esri products, we have a Web Application Filter Rules guide located within the customer accessible documents area of the ArcGIS Trust Center.

Note that our mitigation measures are in alignment with Emergency Directive 22-02 Mitigate Apache Log4 Vulnerability.

ArcGIS Enterprise

Several ArcGIS Enterprise components contain the vulnerable log4j library, however there is no known exploit available for any version of a base ArcGIS Enterprise deployment (including the ArcGIS Server, Portal for ArcGIS, and ArcGIS Data Store components) or stand-alone ArcGIS Server at this time.

Esri has evaluated the potential impact of CVE-2021-45105, an infinite recursion denial-of-service attack against Log4j, in Portal for ArcGIS, ArcGIS Server, and ArcGIS Data Store and determined that those software components do not use the pattern layouts necessary for attackers to exploit the vulnerability.

Out of an abundance of caution, Esri has created Log4Shell mitigation scripts that are strongly recommended to be applied to all installations of ArcGIS Enterprise and ArcGIS Server of any version of the software.  The scripts remove the JndiLookup class which is the only mitigation measure recommended by Apache Log4j that does not require updating the Log4j version. This action fully addresses CVE-2021-44228 and CVE-2021-45046.  The scripts have been validated for versions 10.6 and above, however they should work on older versions of ArcGIS Enterprise and ArcGIS Server as well. Separate detailed instructions and scripts are available for:

Notes:

ArcGIS Notebook Server

This product consists of two parts, the underlying framework and a Docker container image:

ArcGIS Online

Though a Log4j exploit has not been identified for ArcGIS Online, out of an abundance of caution, patching and updates were completed to eliminate the vulnerable code from this FedRAMP authorized SaaS offering.

Esri Managed Cloud Services

EMCS Advanced and Advanced+ have implemented web filter mitigations for Log4j vulnerabilities. We have applied the scripts that remove the JNDILookup class to all affected systems as recommended in this announcement.

ArcMap

Does not include Log4j and is therefore not vulnerable to these CVE’s.  See Desktop Extensions section if utilizing optional, separate install extensions.

ArcGIS Monitor

Does not contain Log4j and is therefore not vulnerable to these CVE’s.

ArcGIS Pro

All ArcGIS Pro versions under General Availability support contain Log4j, but are not known to be exploitable as the software does not listen for remote traffic.  ArcGIS Pro includes Log4j by default to support two functional areas:

ArcGIS Pro GeoAnalytics Desktop Tools

ArcGIS Pro SAS-ArcGIS Bridge

See Desktop Extensions section below if utilizing optional, separate install extensions.

Desktop Extensions

Below is a summary of optional (non-default) extensions and their vulnerability status:

ArcGIS Pro Data Interoperability Extension

ArcMap Data Interoperability Extension

License Manager

This product utilizes components from Flexera, and Esri does NOT include the vulnerable example files referenced by Flexera in their Log4j statement. Log4j is not included with Esri’s License Manager and is therefore NOT vulnerable to the CVE’s in this announcement.

Esri Geoportal Server

This open source product was updated to version 2.65 on Dec 17th to resolve Log4j issues, please upgrade to this latest release.

Validating Mitigations and Security Scanner False Positive Alerts

Bottomline, several security scanners by default perform rudimentary validation of Log4j security issues resulting in false positive critical alerts even after Esri’s mitigation scripts are run.  To avoid false positives, make sure the scanner is appropriately configured and ensure your team is looking at the right location/plugin results – or just use a simpler, purpose-built security tool to validate and provide your security team the assurance the issue has been addressed.

– Esri Software Security & Privacy Team

Next Article

ArcGIS Insights supports Snowflake

Read this article