Last Modified Date
5/3/2022 3:22 PMDescription
This is a log4j vulnerability scanner that searches local fixed NTFS drives for any *.jar files containing JndiLookup.class which is a good indicator that a system is vulnerable to CVE-2021-44228Â along with other detection methods. Intended use is to help quickly identify Windows systems that may be vulnerable to CVE-2021-44228. If this check fails you will have to perform further incident response on the target system. See the CISA Guidance and GitHub repository for important information about CVE-2021-44228 and recommended remediation and mitigations.
Warning 1: This scanner is not an exhaustive or complete scan of a system for all indicators of CVE-2021-44228. It should be used in conjunction with other discovery processes to ensure identification of systems that require remediation of or mitigation against CVE-2021-44228.Â
Warning 2: Since all local drives will be scanned considerations must be made for performance impact to systems with slow drives or large amounts of data causing long scan times. Script timeout may need to be adjusted.Â
Warning 3: Due to environmental differences and security controls you may see "Access Denied" warnings when attempting to use this script. These systems may require a manual scan, as an administrator, locally on the device using the raw PowerShell script located here .Â
Type
Custom Service / Script Check
Category
Windows Third Party Apps
Target OS
Windows 8/8.1;Windows 10;Windows Server 2012 / 2012R2;Windows Server 2016;Windows Server 2019
Compatible with N-central
No
N-central minimum version
Compatible with RMM
Yes
Syntax
MD5 176C2807BFE6EBCD9EC1B3D6C0DB830D
Output
Download Link
https://files.n-able.com/NRCNable/media/Cookbook/Log4j+Vuln+Scanner+CVE-2021-44228+RMM+V2.0.amp
Keywords
CVE-2021-44228 log4j log4shell