Patch
CVE-2021-44228
with vRx
🔒 Mitigation of JNDI Lookup in Log4j 2.x (CVE-2021-44228)
This remediation script scans for and disables JNDI lookup functionality in Log4j 2.x without requiring an upgrade, mitigating the CVE-2021-44228 (Log4Shell) vulnerability. It provides a temporary solution for environments where upgrading is not immediately possible.
🔍 How it works:
The script searches for all log4j-core*.jar files in the system and identifies the Log4j version.
If a vulnerable 2.x version is detected, it disables JNDI lookups by modifying the JAR file to prevent exploitation.
The process is automated and ensures the vulnerable feature is disabled without requiring a Log4j update.
⚠️ Why it matters: CVE-2021-44228 is a critical vulnerability that allows remote code execution. By disabling JNDI lookups, the primary exploitation path is closed, providing a temporary solution while upgrading to a secure version of Log4j is planned.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
More than 600 customers trust vRx:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.