MobileIron Core Log4Shell Direct Check (CVE-2021-44228)

critical Nessus Plugin ID 156941


A MobileIron Core application installed on the remote host is affected by a remote code execution vulnerability.


A remote code execution vulnerability exists in MobileIron Core in the bundled Apache Log4j logging library.
Apache Log4j is vulnerable due to insufficient protections on message lookup substitutions when dealing with user controlled input. A remote, unauthenticated attacker can exploit this, via a web request, to execute arbitrary code with the permission level of the running Java process.

This plugin requires that both the scanner and target machine have internet access.


Apply the mitigation referenced in the vendor advisory vendor advisory.

See Also

Plugin Details

Severity: Critical

ID: 156941

File Name: mobileiron_log4shell.nbin

Version: 1.49

Type: remote

Family: Web Servers

Published: 1/21/2022

Updated: 3/19/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information


Risk Factor: Critical

Score: 10.0


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-44228


Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mobileiron:mobileiron_core

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/12/2021

Vulnerability Publication Date: 12/11/2021

CISA Known Exploited Vulnerability Due Dates: 12/24/2021

Exploitable With


Core Impact

Reference Information

CVE: CVE-2021-44228

IAVA: 0001-A-0650, 2021-A-0573