What you need to know:
A major security flaw has been discovered in a piece of software called Log4j, which is used by millions of web servers. The bug leaves them vulnerable to attack, and teams around the world are scrambling to patch affected systems before hackers can exploit them.
The Apache Software Foundation has released a security advisory to address a remote code execution vulnerability (CVE-2021-44228) affecting Log4j versions 2.0-beta9 to 2.14.1. A remote attacker could exploit this vulnerability to take control of an affected system. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services.
CISA encourages users and administrators to review the Apache Log4j 2.15.0 Announcement and upgrade to Log4j 2.15.0 or apply the recommended mitigations immediately.
Multiple vendor products affected. Please refer to the details for a list of affected products per vendor.
Actions to be taken:
What makes CVE-2021-44228 especially dangerous is the ease of exploitation; even an inexperienced hacker can successfully execute an attack using this vulnerability. According to the researchers, attackers only need to force the application to write just one string to the log, and after that they are able to upload their own code into the application due to the message lookup substitution function.
For managed customers:
1) We can help apply vendor patch if it is available.
2) We can check if customers have the updated IPS rules to block the exploit attempts (provided they have products that have IPS feature licensed and active).
3) We can run a threat-hunting query to see active exploit attempts.
For non-managed customers:
We’ve compiled links for vendor communications related to this vulnerability. We can also raise a case with vendors to confirm whether specific products customers are using are affected.
Here are the official advisories per vendor: