Protecting Your Organization From Log4j Vulnerability
Marco Technologies
Transforming technology across your entire business ecosystem.
The race is on as security teams around the world work diligently to fix a critical security flaw named Log4Shell, which?has put organizations across every industry at risk of exploitation.
The critical vulnerability in Apache Log4 software is found practically everywhere, from online games to enterprise software to cloud data centers. The challenge facing security teams is figuring out how to fix the problem with a patch before hackers achieve remote access and wreak havoc.
This vulnerability is attention-grabbing because it is one of the most significant vulnerabilities in at least the past seven years, and it is actively being exploited.
As a result, time is of the essence because Log?Log4Shell?is a zero-day vulnerability, meaning affected organizations had zero days to mitigate or patch systems, thus allowing attackers to run code remotely on vulnerable servers that were running Log4j.
Who’s Affected
Log4Shell affects Apache Log4j – a logging tool implemented in many Java-based applications. This software is widely used in a variety of consumer and enterprise services, websites and applications, including operational technology products.
According to a?GitHub list?being updated regularly, the Log4Shell vulnerability has impacted many key organizations, including Apple, Amazon, Google, IBM, Tesla and Twitter. Cisco released a?security advisory?saying these vulnerabilities have affected Cisco products, as well.
How it Works
An attacker can exploit this vulnerability to take control of an affected system by instructing the system to download and execute a malicious payload.?Therefore, it is recommended to assess the use and impact of Log4j and patch as soon as possible. Hackers have been exploiting the vulnerability since early December.
Immediate Steps to Take
Given the severity of the vulnerabilities and the likelihood of an increase in exploitation by sophisticated cyber attackers,?the?Cybersecurity & Infrastructure Security Agency?urges vendors and users to take the following actions?to protect against Log4j exploitation:
领英推荐
In addition to the immediate actions detailed above, affected organizations should review?CISA's GitHub repository?for a list of affected vendors and apply software updates as soon as they are available. Affected organizations that have upgraded to Log4j 2.15.0 will need to upgrade to Log4j2.16.0 to be protected against CVE-2021-44228 and CVE-2021-45046.
Vulnerabilities are a constant occurrence in today’s world. Organizations with ongoing vulnerability scanning solutions tend to be in better positions because they can conduct comprehensive scans of their environments to identify vulnerable systems. Then, the remediation can begin. Without scanning tools, organizations often rely on each software manufacturer to notify them.?
Impact on Microsoft Clients
As a result of this vulnerability, Microsoft is not currently aware of any impact – outside of the initial disclosure involving?Minecraft: Java Edition?– to the security of its enterprise services and has not?experienced any degradation in availability of those services. However,?Microsoft continues to analyze vulnerabilities related to Apache Log4j.
In addition to monitoring the threat landscape for attacks and developing customer protections, Microsoft’s security teams have been analyzing Marco’s products and services to understand where Apache Log4j may be used and are taking expedited steps to mitigate any instances. If they identify any impact to customer data, they will notify the affected party.?
Resources
The fallout of the exploitation of this critical vulnerability?(CVE-2021-44228)?could be widespread, as it continues to be an evolving situation. For more information, references to advisories, solutions and tools, consult the following resources: