CVE-2021-44228

From IVS Wiki
Revision as of 15:47, 13 December 2021 by IVSWikiBlue (talk | contribs)
Jump to: navigation, search

Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2021-44228

Affected Versions

This vulnerability only affects VALT servers running version 5.5 and higher. Older VALT servers are unaffected by the vulnerability.

You can check your VALT version on the General page under the Admin section.

https://ipivs.info/wiki/index.php/VALT_Administrator_Guide_5.5#General

Remediation

Intelligent Video Solutions recommends that you updated your VALT server to the latest release. The latest release includes a fix to this vulnerability. You can book an update with an IVS support engineer at http://ivs.com/book.

If you are unable to update your system, you can follow the steps below to address this specific vulnerability.

WARNING: The steps below outline using an automated script to update the VALT appliance. It is designed to be used on standard Valt appliances.

WARNING: This applies to VALT 5.5 - 5.5.8. DO NOT PERFORM THESE STEPS ON ANY OTHER VERSION!!

  1. Log into the Valt appliance via SSH or the terminal
  2. Type in the following, followed by pressing Enter: wget https://ivs.box.com/shared/static/w78x8elhkxgxmqgge1w4az1npc7sw6za.gz -O log4j.tar.gz
    Log4j1.png
  3. Type in the following, followed by pressing Enter: tar -xvf log4j.tar.gz
    Log4j2.png
  4. Type in the following, followed by pressing Enter: cd log4j
  5. Type in the following, followed by pressing Enter: sudo ./log4j.sh
  6. Enter the password if prompted.
    Log4j3.png
  7. The vulnerability has now been patched.