
Log4J Vulnerabilities - CheckPoint Resolutions (Updated to 10 Dec 2021)
- Dec 10, 2021
- High
On December 9th, an acute remote code execution (RCE) vulnerability was reported in the Apache logging package Log4j 2 versions 2.14.1 and below (CVE-2021-44228).
Apache Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project. It used by a vast number of companies worldwide, enabling logging in a wide set of popular applications.
Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks.
- There is no any Check Point product to infect by this vulnerabilities.
Check Point Software released the IPS Signature to against the Apache Log4j Remote Code Execution (CVE-2021-44228) vulnerability. We urge all customers to make sure the protection is set on prevent, to avoid the exploitation of their assets.
To find out if your setup already contains the IPS update to mitigate this vulnerability:
- In the Gateways & Servers tab, switch the columns to Threat Prevention.
- A column with the title installed IPS version for each gateway is shown.
- If the version in the column is 634218276 or 635218276 or higher it includes the update.