{"id":4002,"date":"2021-12-21T10:29:52","date_gmt":"2021-12-21T02:29:52","guid":{"rendered":"https:\/\/www.udshk.com\/?post_type=news&#038;p=4002"},"modified":"2021-12-24T11:22:47","modified_gmt":"2021-12-24T03:22:47","slug":"log4j-vulnerability-and-it-security-vendors-responses","status":"publish","type":"news","link":"https:\/\/www.udshk.com\/?news=log4j-vulnerability-and-it-security-vendors-responses","title":{"rendered":"Log4j Vulnerability and IT Security Vendors\u2019 Responses"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>What is the Log4j Vulnerability?<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/4F51AD5C-C447-49CB-B66E-63D15168CB71-1024x512.jpeg\" alt=\"\" class=\"wp-image-4180\" width=\"502\" height=\"251\" srcset=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/4F51AD5C-C447-49CB-B66E-63D15168CB71-1024x512.jpeg 1024w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/4F51AD5C-C447-49CB-B66E-63D15168CB71-300x150.jpeg 300w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/4F51AD5C-C447-49CB-B66E-63D15168CB71-768x384.jpeg 768w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/4F51AD5C-C447-49CB-B66E-63D15168CB71-600x300.jpeg 600w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/4F51AD5C-C447-49CB-B66E-63D15168CB71.jpeg 1200w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/figure><\/div>\n\n\n\n<p>A flaw in widely used internet software known as Log4j has left companies and government officials scrambling to respond to a glaring cybersecurity threat to global computer networks.<\/p>\n\n\n\n<p>The bug disclosed last week could enable potentially devastating cyberattacks that span economic sectors and international borders, according to security experts.<\/p>\n\n\n\n<p>U.S. officials say that hundreds of millions of devices are at risk, while researchers and major technology companies warn that hackers linked to foreign governments and criminal ransomware groups are already probing how to exploit the vulnerability within targets\u2019 computer systems.<\/p>\n\n\n\n<p>CISA (Cybersecurity and Infrastructure Security Agency) published an open-sourced log4j-scanner derived from scanners created by other members of the open-source community on 12\/22\/2021. This tool is intended to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities. This repository provides a scanning solution for the log4j Remote Code Execution vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046).<\/p>\n\n\n\n<p>CISA Log4j Scanner Download:<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/cisagov\/log4j-scanner\">https:\/\/github.com\/cisagov\/log4j-scanner<\/a><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>What is Log4j?<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/D73B9282-B3D7-4783-84AC-93BAC678977A-edited.png\" alt=\"\" class=\"wp-image-4183\" width=\"547\" srcset=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/D73B9282-B3D7-4783-84AC-93BAC678977A-edited.png 461w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/D73B9282-B3D7-4783-84AC-93BAC678977A-edited-300x169.png 300w\" sizes=\"(max-width: 461px) 100vw, 461px\" \/><\/figure><\/div>\n\n\n\n<p>Software developers use the Log4j framework to record user activity and the&nbsp;behavior&nbsp;of applications for subsequent review. Distributed free by the&nbsp;nonprofit&nbsp;Apache Software Foundation, Log4j has been downloaded millions of times and is among the most widely used tools to collect information across corporate computer networks, websites and applications. The software is maintained by&nbsp;Apache volunteers.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>How can hackers take advantage of Log4j\u2019s vulnerability?<\/strong><\/p>\n\n\n\n<p>The Log4j flaw, disclosed by Apache on , allows attackers to execute code remotely on a target computer, meaning that they can steal data, install malware or take control. Some cybercriminals have installed software that uses a hacked system to mine cryptocurrency, while others have developed malware that allows attackers to hijack computers for large-scale assaults on internet infrastructure.<\/p>\n\n\n\n<p>Security experts are particularly concerned that the vulnerability may give hackers enough of a foothold within a system to install ransomware, a type of computer virus that locks up data and systems until the attackers are paid by victims. Security company&nbsp;F-Secure&nbsp;Oyisaid its analysts have observed some ransomware variants being deployed via the flaw already, along with malware that is often deployed as a precursor to a ransomware strike.<\/p>\n\n\n\n<p style=\"font-size:12px\">The above information is retrieved from <em>the WALL STREET JOUNRNAL<\/em>. For further information, please go to<em> <\/em><a href=\"https:\/\/www.wsj.com\/articles\/what-is-the-log4j-vulnerability-11639446180\" data-type=\"URL\" data-id=\"https:\/\/www.wsj.com\/articles\/what-is-the-log4j-vulnerability-11639446180\">https:\/\/www.wsj.com\/articles\/what-is-the-log4j-vulnerability-11639446180<\/a><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-medium-font-size\"><strong>2 CVEs for the Log4j vulnerabilities disclosed by Apache<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th><\/th><th class=\"has-text-align-left\" data-align=\"left\">Security Vulnerability CVE-2021-44228<\/th><th class=\"has-text-align-left\" data-align=\"left\">Security Vulnerability CVE-2021-45046<\/th><\/tr><\/thead><tbody><tr><td><strong>Addressed in <\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">Log4j 2.12.2 and Log4j 2.16.0<\/td><td class=\"has-text-align-left\" data-align=\"left\">Log4j 2.12.2 for Java 7 and 2.16.0 for Java 8 and up<\/td><\/tr><tr><td><strong>Summary<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">Log4j\u2019s JNDI support has not restricted what names could be resolved. Some protocols are unsafe or can allow remote code execution.<\/td><td class=\"has-text-align-left\" data-align=\"left\">Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p style=\"font-size:12px\">The above information is retrieved from Apache official website. For further information, please go to<em> <\/em><a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\">https:\/\/logging.apache.org\/log4j\/2.x\/security.html<\/a><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>How IT Security Vendors handle the Log4j Vulnerabilities?<\/strong><\/p>\n\n\n\n<p>Many IT Security Vendors have traced attempted attacks that exploit the this vulnerabilities. Each has released the security patch or signatures and provide the recommendation on how to against this attack to protect their customer business.<\/p>\n\n\n\n<p><strong>Please click on the Vendors\u2019 logo for further information on their responses.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4013\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/Amazon_new.png\" alt=\"\" class=\"wp-image-2027\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4033\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/aruba_new.png\" alt=\"\" class=\"wp-image-2028\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4021\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/CheckPoint_new.png\" alt=\"\" class=\"wp-image-2030\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4022\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/Fortinet_new.png\" alt=\"\" class=\"wp-image-2042\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4023\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/Kaspersky_new.png\" alt=\"\" class=\"wp-image-2049\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4034\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/336E73A9-942F-4839-ACF6-0A43516F9477.png\" alt=\"\" class=\"wp-image-4008\" srcset=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/336E73A9-942F-4839-ACF6-0A43516F9477.png 500w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/336E73A9-942F-4839-ACF6-0A43516F9477-300x300.png 300w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/336E73A9-942F-4839-ACF6-0A43516F9477-150x150.png 150w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/336E73A9-942F-4839-ACF6-0A43516F9477-100x100.png 100w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4024\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/PA_new.png\" alt=\"\" class=\"wp-image-2053\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4025\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/Radware_new.png\" alt=\"\" class=\"wp-image-2057\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4026\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/SOPHOS_new.png\" alt=\"\" class=\"wp-image-2063\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4027\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/100BD829-02B0-48DD-9E30-9AC28C4A7A42.png\" alt=\"\" class=\"wp-image-4011\" srcset=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/100BD829-02B0-48DD-9E30-9AC28C4A7A42.png 500w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/100BD829-02B0-48DD-9E30-9AC28C4A7A42-300x300.png 300w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/100BD829-02B0-48DD-9E30-9AC28C4A7A42-150x150.png 150w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/100BD829-02B0-48DD-9E30-9AC28C4A7A42-100x100.png 100w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4028\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/Splunk_new.png\" alt=\"\" class=\"wp-image-2066\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4029\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/SOTI_new.png\" alt=\"\" class=\"wp-image-2064\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4032\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/Thales_new.png\" alt=\"\" class=\"wp-image-2069\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4031\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/TrendMicro_new.png\" alt=\"\" class=\"wp-image-2070\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.udshk.com\/?page_id=4030\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/9DABFB2A-89FC-4D7C-82AF-1751C415DB88.png\" alt=\"\" class=\"wp-image-4012\" srcset=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/9DABFB2A-89FC-4D7C-82AF-1751C415DB88.png 500w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/9DABFB2A-89FC-4D7C-82AF-1751C415DB88-300x300.png 300w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/9DABFB2A-89FC-4D7C-82AF-1751C415DB88-150x150.png 150w, https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/12\/9DABFB2A-89FC-4D7C-82AF-1751C415DB88-100x100.png 100w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p style=\"font-size:15px\">For further enquiries on Log4j, please contact our consultants (info@udshk.com). <\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the Log4j Vulnerability? A flaw in widely used internet software known as Log4j has left companies and government officials scrambling to respond to a glaring cybersecurity threat to global computer networks. The bug disclosed last week could enable potentially devastating cyberattacks that span economic sectors and international borders, according to security experts. U.S. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4164,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"news-category":[],"class_list":["post-4002","news","type-news","status-publish","has-post-thumbnail","hentry","entry","has-media","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/news\/4002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4002"}],"version-history":[{"count":0,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/news\/4002\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/media\/4164"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4002"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4002"},{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fnews-category&post=4002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}