By now, most are aware of the Apache Log4j vulnerability that was announced in December of 2021. The exposure is widespread in Java applications, and I have been discovering that many companies are affected by it. Remediation is imperative to ensure that attackers do not exploit affected assets in their environment. It is an easy exploit, which adds to the urgency of remediation. The first step in remediation is finding a tool that will scan your assets for the Apache Log4j vulnerability. As of this writing, Qualys has forty-six confirmed Apache Log4j vulnerabilities in their KnowledgeBase consisting of QIDs that detect vulnerabilities or gather information in CGI and VMware web applications, Cisco network services or devices, web servers, and Ubuntu Linux. Furthermore, the Apache Log4j QIDs detect vulnerabilities that can be exploited after getting local access to a box or vulnerabilities that need authenticated credentials to be detected, and security policy checks that detect the presence of anti-virus or various other settings that could be pushed with a Windows group policy. If after performing a vulnerability scan, it is confirmed that the vulnerability is positively detected within your network, here are some quick steps to begin the remediation process:
Should you have any further questions regarding the Log4j vulnerability and remediation steps your organization should take, please do not hesitate to reach out to our team. Our cybersecurity experts are always available to serve as an unbiased sounding board to assist with whatever challenges or questions you might have. Contact us today to learn more!
These Related Stories
Comments (1)