PROBLEM

McAfee Endpoint Security Identifies JAVA.exe as a potential threat source in Portal for ArcGIS or ArcGIS Data Store

Last Published: July 15, 2022

Description

During normal use of ArcGIS Enterprise components Portal for ArcGIS and ArcGIS Data Store, administrators may notice informational warnings generated by McAfee Endpoint Security. 

Those warnings will appear similar to this:


Event Generated Time: 1/1/22 12:08:51 AM BST

Threat Source User Name: machine.domain.com\userName
Threat Source Process Name: java.exe

Source File Path: C:\Program Files\ArcGIS\DataStore\framework\runtime\jre\bin

Source Description: "C:\Program Files\ArcGIS\DataStore\framework\runtime\jre\bin\java" -classpath "C:\Program Files\ArcGIS\DataStore\framework\lib\arcgis-nodeagent.jar;C:\Program Files\ArcGIS\DataStore\framework\lib\arcgis-common.jar;C:\Program Files\ArcGIS\DataStore\framework\lib\postgresql.jar;C:\Program Files\ArcGIS\framework\lib\commons-compress.jar;C:\Program Files\ArcGIS\DataStore\framework\lib\arcgis-data-store.jar" com.esri.arcgis.datastore.util.DbCli put-transaction-log "C:/Program Files/ArcGIS/Data/arcgisdatastore/

Target Description: cmd.exe /c .\bin\pg_isready -h localhost -p 9876 -d [databasename] -U [user]

Description: machine.domain.com\userName ran C:\Program Files\ArcGIS\DataStore\framework\runtime\jre\bin\java.exe, which accessed the process cmd.exe, violating the rule "JNDI Log4J Exploit". Access was allowed because the rule wasn't configured to block.
 

Cause

In response vulnerabilities that surfaced in late 2021 related to Log4J, McAfee updated its product coverage to include a new Expert Rule named "JNDI Log4J Exploit". 

McAfee's approach is documented here: Log4J and The Memory That Knew Too Much

This rule is triggered when McAfee Endpoint Security detects potentially malicious activity that exhibit behaviors similar to what may be seen when the Log4J vulnerability CVE-2021-44228 is exploited.

See also:
McAfee Enterprise coverage for Apache Log4j CVE-2021-44228 Remote Code Execution

Administrators and users may notice these warnings even if Esri's Log4J patches have been applied.

Solution or Workaround

The behavior flagged is expected and the warning is informational.

Portal for ArcGIS and ArcGIS Datastore call PG_ISREADY and whoami on Windows by opening the Windows Command interpreter (CMD.exe) via a Java process. Both PG_ISREADY and whoami are command line tools.

  • The JRE opens the windows CMD interpreter to run the whoami command to ensure that that the ArcGIS Process owner can read/write to the Portal’s indexes.
  • The Portal checks to confirm that the process owner has access to its directories (for example: db/temp/content/index).
  • This logic is used to help support High Availability configurations.
  • PG_ISREADY is a command line tool provided by PostgreSQL, which is used internally in Portal for ArcGIS and in ArcGIS Data Store.
  • PG_ISREADY is called to periodically check the internal PostgreSQL database status to be sure it is running properly.

Article ID:000028041

Software:
  • ArcGIS Data Store
  • Portal for ArcGIS
  • ArcGIS Enterprise Builder

Get help from ArcGIS experts

Contact technical support

Download the Esri Support App

Go to download options

Related Information

Discover more on this topic