A1 Journal article (refereed)
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication (2022)


Juvonen, A., Costin, A., Turtiainen, H., & Hämäläinen, T. (2022). On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication. IEEE Access, 10, 86542-86557. https://doi.org/10.1109/ACCESS.2022.3198947


JYU authors or editors


Publication details

All authors or editors: Juvonen, Artturi; Costin, Andrei; Turtiainen, Hannu; Hämäläinen, Timo

Journal or series: IEEE Access

eISSN: 2169-3536

Publication year: 2022

Publication date: 16/08/2022

Volume: 10

Pages range: 86542-86557

Publisher: Institute of Electrical and Electronics Engineers (IEEE)

Publication country: United States

Publication language: English

DOI: https://doi.org/10.1109/ACCESS.2022.3198947

Publication open access: Openly available

Publication channel open access: Open Access channel

Publication is parallel published (JYX): https://jyx.jyu.fi/handle/123456789/84864


Abstract

Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environments using the ACARS, ADS-B, and AIS protocols. We develop a systematic methodology and an experimental setup to study and identify the protocols’ exploitable fields and associated attack payload features. For our experiments, we employ software-defined radios (SDRs), use open-source software, develop novel tools, and develop features to existing software. We evaluate the feasibility of the attacks and demonstrate end-to-end RCE with all three studied protocols. We demonstrate that the aviation and maritime environments are susceptible to the exploitation of the Log4j2 vulnerabilities, and that the attacks are feasible for non-sophisticated attackers. To facilitate further studies related to Log4j2 attacks on aerospace, aviation, and maritime infrastructures, we release relevant artifacts (e.g., software, documentation, and scripts) as open-source, complemented by patches for bugs in open-source software used in this study.


Keywords: cyber security; wireless data transmission; wireless communication; marine traffic; air traffic; air navigation services; communications satellites; vulnerability; cyber attacks; Apache; Java

Free keywords: CVE-2021-44228; log4j; log4shell; vulnerability; exploitation; experimentation; proof-of-concept; aviation; avionics; ACARS; ADS-B; maritime; AIS; aerospace; satellite


Contributing organizations


Ministry reporting: Yes

Reporting Year: 2022

Preliminary JUFO rating: 2


Last updated on 2023-09-01 at 14:45