{"id":4025,"date":"2021-12-21T12:54:11","date_gmt":"2021-12-21T04:54:11","guid":{"rendered":"https:\/\/www.udshk.com\/?page_id=4025"},"modified":"2021-12-24T11:37:16","modified_gmt":"2021-12-24T03:37:16","slug":"log4j-vulnerabilities-radware-resolutions","status":"publish","type":"page","link":"https:\/\/www.udshk.com\/?page_id=4025","title":{"rendered":"Log4J Vulnerabilities &#8211; Radware Resolutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4025\" class=\"elementor elementor-4025\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d606b0 elementor-section-height-min-height elementor-section-items-top elementor-section-boxed elementor-section-height-default\" data-id=\"5d606b0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b1e2f06\" data-id=\"b1e2f06\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fcf7e67 elementor-widget elementor-widget-image\" data-id=\"fcf7e67\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.udshk.com\/wp-content\/uploads\/2021\/08\/Radware_new.png\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2f21f8 elementor-widget elementor-widget-heading\" data-id=\"d2f21f8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Log4J Vulnerabilities - Radware Resolutions (Updated to 20 Dec 2021)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0abba13 elementor-widget elementor-widget-text-editor\" data-id=\"0abba13\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The information provided below is referred from <a href=\"https:\/\/support.radware.com\/app\/answers\/answer_view\/a_id\/1029752\/~\/cve-2021-44228%2C-a-critical-log4j-vulnerability\">https:\/\/support.radware.com\/app\/answers\/answer_view\/a_id\/1029752\/~\/cve-2021-44228%2C-a-critical-log4j-vulnerability<\/a>, <a href=\"https:\/\/support.radware.com\/app\/answers\/answer_view\/a_id\/1029778\/related\/1\">https:\/\/support.radware.com\/app\/answers\/answer_view\/a_id\/1029778\/related\/1<\/a>\u00a0and <a href=\"https:\/\/blog.radware.com\/security\/alert\/2021\/12\/log4shell-critical-log4j-vulnerability\/\">https:\/\/blog.radware.com\/security\/alert\/2021\/12\/log4shell-critical-log4j-vulnerability\/<\/a>.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53779d0 elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"53779d0\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-8751\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-8751\" aria-expanded=\"false\">CVE Number<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-8752\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8752\" aria-expanded=\"false\">Discovery Date<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-8753\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8753\" aria-expanded=\"false\">Threat Level<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-8754\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8754\" aria-expanded=\"false\">Response to Log4j<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-8755\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8755\" aria-expanded=\"false\">Radware Mitigation & Protection<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-8751\" aria-expanded=\"false\">CVE Number<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8751\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-8751\" tabindex=\"0\" hidden=\"false\"><ul>\n \t<li> <a style=\"pointer-events: none; cursor: default; text-decoration: none; color: black;\" href=\"\u201c#\u201d\"> 2021-44228<\/a><\/li>\n<\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8752\" aria-expanded=\"false\">Discovery Date<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8752\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-8752\" tabindex=\"0\" hidden=\"hidden\"><ul><li>No Information<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8753\" aria-expanded=\"false\">Threat Level<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8753\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-8753\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Critical<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8754\" aria-expanded=\"false\">Response to Log4j<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8754\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-8754\" tabindex=\"0\" hidden=\"hidden\"><p class=\"s2\"><span class=\"s32\">A critical vulnerability in Log4j package\u00a0identified by\u00a0CVE-2021-44228\u00a0with CVSS severity of 10, which is the highest score, has been publicly disclosed . The vulnerability may allow for remote code execution in impacted products. See also Apache note on this vulnerability<\/span><\/p><p class=\"s2\"><span class=\"s32\">Radware<\/span><span class=\"s32\"> is evaluating the impact of this vulnerability on its own product while at the same time providing protection in our cyber <\/span><span class=\"s32\">defense<\/span><span class=\"s32\"> product and services allowing to block malicious actors from exploiting this vulnerability.<\/span><span class=\"s44\"><br \/><\/span><span class=\"s32\">Radware\u2019s<\/span><span class=\"s32\"> ERT researchers are continuing to research this vulnerability and its impact, and will update the guidance provided to customers when new information is available.\u00a0 Please make sure to check this advisory for ongoing updates.<\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-8755\" aria-expanded=\"false\">Radware Mitigation & Protection<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-8755\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-8755\" tabindex=\"0\" hidden=\"hidden\"><p class=\"s5\"><span class=\"s29\">Radware<\/span><span class=\"s29\"> web application security solutions, <\/span><span class=\"s29\">AppWall<\/span><span class=\"s29\"> and Cloud WAF Services, detected and blocked Log4Shell exploit attacks through web application parameters and HTTP header fields, from day one, as Server Side Request Forgeries.<\/span><span class=\"s46\"><br \/><\/span><span class=\"s29\">Radware\u2019s<\/span><span class=\"s29\"> researchers are developing signatures to be used to block these attacks.\u00a0<\/span><\/p><p class=\"s5\"><span class=\"s29\">Radware<\/span><span class=\"s29\"> released a number of signatures to provide protection from this CVE as part of the latest Signature Update (13-Dec-21, 0009.0651.00).<\/span><\/p><ul><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-BODY-RCE (RWID 20276)<\/span><\/li><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-URL1-RCE (RWID 20278)<\/span><\/li><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-URL2-RCE (RWID 20280)<\/span><\/li><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-URL3-RCE (RWID 20282)<\/span><\/li><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-URL4-RCE (RWID 20284)<\/span><\/li><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-BODY1-RCE (RWID 20286)<\/span><\/li><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-BODY2-RCE (RWID 20288)<\/span><\/li><li class=\"s2\"><span class=\"s29\">HTTP-APACHE-LOG4j2-BODY3-RCE (RWID 20290)<\/span><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Log4J Vulnerabilities &#8211; Radware Resolutions (Updated to 20 Dec 2021) The information provided below is referred from https:\/\/support.radware.com\/app\/answers\/answer_view\/a_id\/1029752\/~\/cve-2021-44228%2C-a-critical-log4j-vulnerability, https:\/\/support.radware.com\/app\/answers\/answer_view\/a_id\/1029778\/related\/1\u00a0and https:\/\/blog.radware.com\/security\/alert\/2021\/12\/log4shell-critical-log4j-vulnerability\/. CVE Number Discovery Date Threat Level Response to Log4j Radware Mitigation &#038; Protection CVE Number 2021-44228 Discovery Date No Information Threat Level Critical Response to Log4j A critical vulnerability in Log4j package\u00a0identified by\u00a0CVE-2021-44228\u00a0with CVSS severity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4025","page","type-page","status-publish","hentry","entry","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/4025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4025"}],"version-history":[{"count":7,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/4025\/revisions"}],"predecessor-version":[{"id":4209,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/4025\/revisions\/4209"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}