CVE-2022-0070
Amazon Linux vulnerability analysis and mitigation

Overview

CVE-2022-0070 is a security vulnerability discovered in AWS's Log4j hotpatch solution, which was initially released to address the critical Log4Shell vulnerability. The issue was identified in the Apache Log4j hotpatch package versions prior to log4j-cve-2021-44228-hotpatch-1.1-16. The vulnerability was disclosed on April 19, 2022, and affects systems where the AWS Log4j hotpatch was installed, including Amazon Linux 1 and Amazon Linux 2 environments (AWS Security Bulletin).

Technical details

The vulnerability stems from improper privilege management in the hotpatch service. The service was designed to search for Java processes and patch them against Log4Shell on the fly, but it failed to properly containerize the execution of container binaries. When the hotpatch service invoked container binaries, it did so without properly applying container limitations, running them with all Linux capabilities and without proper isolation technologies like seccomp and cgroups. The vulnerability received a CVSS v3.1 base score of 8.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H (NVD).

Impact

The vulnerability could allow container escape and privilege escalation, enabling attackers to take control of the underlying host system. Any container in the affected environment could potentially exploit the hotpatch to escape its containment, regardless of whether they run Java applications or whether their underlying host runs Bottlerocket. The issue affected containers running with user namespaces or as non-root users, and unprivileged processes could exploit the patch to escalate privileges and gain root code execution (Unit42 Report).

Mitigation and workarounds

AWS released fixed versions for all affected components on April 19, 2022. The remediation includes updating to version 1.1-16 of the log4j-cve-2021-44228-hotpatch package for Amazon Linux and Amazon Linux 2. Users can upgrade by running 'yum update log4j-cve-2021-44228-hotpatch'. Alternatively, if environments are already patched against Log4Shell, users can disable the hot patch service by running 'sudo touch /etc/log4j-cve-2021-44228-hotpatch.kill' (AWS Security Bulletin).

Additional resources


SourceThis report was generated using AI

Related Amazon Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-39866HIGH7.8
  • Linux KernelLinux Kernel
  • linux-azure-6.8
NoYesSep 19, 2025
CVE-2025-39853HIGH7
  • Linux KernelLinux Kernel
  • kernel-uki-virt
NoYesSep 19, 2025
CVE-2025-39849MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-64k-devel-matched
NoYesSep 19, 2025
CVE-2025-39848MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux
NoYesSep 19, 2025
CVE-2025-39852N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-debug-core
NoYesSep 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management