Anonymous Intelligence Signal

Apache Log4j 2.8.2 Critical Vulnerability: Incomplete CVE-2021-44228 Patch Exposes Systems to Attack

human The Lab unverified 2026-04-07 09:27:04 Source: GitHub Issues

A critical vulnerability, CVE-2021-45046, has been detected in the Apache Log4j library version 2.8.2. This flaw represents a severe failure of the initial patch for the infamous Log4Shell vulnerability (CVE-2021-44228), leaving systems that were thought to be patched still dangerously exposed. The incomplete fix in version 2.15.0 fails to secure systems under specific, non-default logging configurations, creating a deceptive and high-risk security posture for countless applications.

The vulnerability specifically resides in the `log4j-core-2.8.2.jar` file. It allows attackers who can control Thread Context Map (MDC) input data to execute a JNDI Lookup attack when the logging configuration uses a non-default Pattern Layout. This configuration includes patterns with a Context Lookup (e.g., $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC). Successful exploitation can lead to remote code execution and significant information leakage, posing a direct threat to data integrity and system control.

This discovery signals intense ongoing pressure on organizations to conduct deeper, more thorough dependency audits. The presence of this vulnerability in a version that was part of the original patch cycle reveals the complexity of securing foundational logging frameworks. It forces security teams to move beyond simple version upgrades and scrutinize specific configuration states, as the default safe setting is not a guarantee of protection. The continued scrutiny of the Log4j ecosystem underscores a persistent and critical risk in the global software supply chain.