CVE-2022-0070

8.8 HIGH

📋 TL;DR

This vulnerability is an incomplete fix for CVE-2021-3100 in Apache Log4j hotpatch packages. It allows attackers to escalate privileges by exploiting the hotpatch's failure to properly mimic Linux capabilities and cgroups of the target Java process. Organizations using AWS's Log4j hotpatch for Log4Shell mitigation are affected.

💻 Affected Systems

Products:
  • Apache Log4j hotpatch package
Versions: log4j-cve-2021-44228-hotpatch-1.1-16 and later versions before complete fix
Operating Systems: Linux systems using the AWS hotpatch
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the AWS Log4j hotpatch was deployed as a mitigation for Log4Shell (CVE-2021-44228).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges, allowing complete control over the affected server and potential lateral movement across the network.

🟠

Likely Case

Privilege escalation to root on the vulnerable system, enabling installation of backdoors, data theft, or further exploitation.

🟢

If Mitigated

Limited impact with proper isolation and least privilege controls, potentially containing the escalation to the affected container or process.

🌐 Internet-Facing: HIGH if vulnerable hotpatch is applied to internet-facing systems, as it could be chained with other vulnerabilities.
🏢 Internal Only: MEDIUM for internal systems, requiring initial access but providing significant escalation potential once compromised.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial access to the system, but privilege escalation is straightforward once the hotpatch is applied.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated hotpatch versions from AWS

Vendor Advisory: https://alas.aws.amazon.com/cve/html/CVE-2022-0070.html

Restart Required: No

Instructions:

1. Check current hotpatch version. 2. Update to the latest AWS-provided hotpatch. 3. Verify the hotpatch properly mimics Linux capabilities and cgroups. 4. Consider removing the hotpatch entirely if Log4j has been updated to a secure version.

🔧 Temporary Workarounds

Remove hotpatch and update Log4j

linux

Remove the vulnerable hotpatch and update Log4j to a patched version (2.17.0 or later) to address Log4Shell directly.

# Remove hotpatch package
# Update Log4j to version 2.17.0 or later

Isolate affected systems

all

Apply network segmentation and strict access controls to limit potential impact if exploitation occurs.

🧯 If You Can't Patch

  • Apply strict Linux capabilities and cgroups controls to limit what the hotpatch can access.
  • Monitor for privilege escalation attempts and unusual process behavior on systems with the hotpatch.

🔍 How to Verify

Check if Vulnerable:

Check if log4j-cve-2021-44228-hotpatch-1.1-16 or later is installed before the fixed version.

Check Version:

rpm -qa | grep log4j-cve-2021-44228-hotpatch

Verify Fix Applied:

Verify the hotpatch version has been updated to a version that properly handles Linux capabilities and cgroups.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Hotpatch process spawning with elevated privileges
  • Failed capability/cgroup mimic attempts

Network Indicators:

  • Unusual outbound connections from systems with hotpatch
  • Lateral movement attempts from affected systems

SIEM Query:

process_name:"hotpatch" AND (privilege_escalation OR failed_capability)

🔗 References

📤 Share & Export