Log4J Vulnerability: What, Why and How (2024)

What is Log4j?

Log4j is a software library built in Java that’s used by millions of computers worldwide running online services. It’s described as a zero-day (0 day) vulnerability and rated the highest severity under the Common Vulnerability Scoring System (CVSS; CVE-2021-44228). It was rated a 10 out of 10 on the CVSS, due to the potential impact that it can have if leveraged by attackers. This vulnerability allows attackers to remotely control and execute code on vulnerable machines.

While Log4j is maintained by Apache, it is utilized in many vendor applications and appliances as well as in custom-built systems. The following reference lists the known affected vendors as of December 12, 2021 but should not be considered definitive. Organizations should contact vendors directly for additional information.

Why is it Critical for Organizations to Take it Seriously?

This vulnerability, also known as Log4Shell, allows remote code execution in many applications through web requests and without authentication, which enables all the information technology (IT) and operational technology (OT) infrastructure.

Log4j vulnerability, which is both vendor-agnostic and affects both proprietary and open-source software, will leave several industries exposed to remote exploitation, including electric power, water, food and beverage, manufacturing, and transportation. Log4j is widely used in a variety of consumer and enterprise services, websites, and applications, as well as in OT products, to log security and performance information. The agency identified that an unauthenticated remote hacker could exploit this vulnerability to take control of an affected system.

Possible risks to OT:

  • Possible organizational impacts ranging from minimal, to a crippling attack and possible information theft, as well as a loss of service
  • Business operations disruption
  • The need to disclose where personal data was affected
  • Costs associated with incident response and recovery
  • Reputational damage

How Do You Protect Yourself?

Identify, Access, Prioritize, and Action: These are the 4 pillars which will help any OT industries to tackle this vulnerability in a well-approached manner. The severity of the Apache Log4j vulnerability is beginning to unravel in the industrial sector, as vendors begin to identify the presence of the cross-cutting vulnerability in their product lines.

  • Identify all the assets, including internet-facing and isolated assets that allows data inputs and use of Log4j java library anywhere in the communication stack.
  • Access the OT landscape of your organization and understand the risk vs. remediation approach. Update or isolate the affected asset based on this outcome.
  • Prioritize the critical vs. non-critical areas and work on mitigation strategies like monitoring for odd traffic patterns (e.g., JDNI LDAP/RMI outbound traffic, DMZ systems initiating outbound connections, etc.). Install or modify an existing Web Application Firewall (WAF) with rules to detect the presence of vulnerabilities.
  • Create an action team who will drive the incident response at all levels and keep the key stakeholders engaged with all the activities.

It is important to note that this vulnerability has impacts to both IT and OT which use Java in their codebase, and with the severity of this vulnerability, more sophisticated variations of Log4j exploits will emerge with a higher likelihood of directly impacting OT networks. Organizations will need to drive the approach from the bottom up, as once the networks and applications are identified the landscape can be pinpoint and the action plan can be drafted. Keep in mind that it is imperative to always stay up to date with advisories as it keeps updating.

Further reading:

Log4J Vulnerability: What, Why and How (1)

Achal Lekhi

Achal Lekhi is a diligent and detail-oriented operational technology security specialist professional with a strong academic background and hands-on experience in several complex roles in different sectors. Achal is a quick thinker, with an ability to wear multiple hats — strategic, technical and logical for a given requirement. He believes strongly that there is no problem in the world that does not have a solution! Currently, Achal works as an operational technology (OT) security consultant across several industries globally. He has an excellent blend of technology capability, OT/IT awareness, network and information security and risk and compliance with a detailed understanding and experience of implementing OT security and cybersecurity standards.

Log4J Vulnerability: What, Why and How (2024)
Top Articles
Visa Chargeback Time Limits: The 2024 Guide
Does the bluetooth interfere with the wifi connection?
Where To Go After Howling Pit Code Vein
Top 11 Best Bloxburg House Ideas in Roblox - NeuralGamer
Cintas Pay Bill
Ffxiv Palm Chippings
Le Blanc Los Cabos - Los Cabos – Le Blanc Spa Resort Adults-Only All Inclusive
12 Rue Gotlib 21St Arrondissem*nt
Tyrunt
Comenity Credit Card Guide 2024: Things To Know And Alternatives
Https //Advanceautoparts.4Myrebate.com
Sarpian Cat
Aktuelle Fahrzeuge von Autohaus Schlögl GmbH & Co. KG in Traunreut
Marion County Wv Tax Maps
R/Afkarena
Rhinotimes
Mary Kay Lipstick Conversion Chart PDF Form - FormsPal
Fool’s Paradise movie review (2023) | Roger Ebert
Ou Class Nav
Canvas Nthurston
Webcentral Cuny
SF bay area cars & trucks "chevrolet 50" - craigslist
FDA Approves Arcutis’ ZORYVE® (roflumilast) Topical Foam, 0.3% for the Treatment of Seborrheic Dermatitis in Individuals Aged 9 Years and Older - Arcutis Biotherapeutics
Catherine Christiane Cruz
Reptile Expo Fayetteville Nc
Sussyclassroom
Like Some Annoyed Drivers Wsj Crossword
Slim Thug’s Wealth and Wellness: A Journey Beyond Music
Kirsten Hatfield Crime Junkie
Amelia Chase Bank Murder
Jurassic World Exhibition Discount Code
Criglist Miami
Craigslist Cars And Trucks Mcallen
Melissa N. Comics
Pitco Foods San Leandro
Xemu Vs Cxbx
Rogers Centre is getting a $300M reno. Here's what the Blue Jays ballpark will look like | CBC News
Jefferson Parish Dump Wall Blvd
Arcadia Lesson Plan | Day 4: Crossword Puzzle | GradeSaver
Frcp 47
Anya Banerjee Feet
Tgirls Philly
Unit 11 Homework 3 Area Of Composite Figures
Hello – Cornerstone Chapel
Ouhsc Qualtrics
Stoughton Commuter Rail Schedule
Theater X Orange Heights Florida
Rocket Bot Royale Unblocked Games 66
Compete My Workforce
Supervisor-Managing Your Teams Risk – 3455 questions with correct answers
Latest Posts
Article information

Author: Nathanial Hackett

Last Updated:

Views: 6587

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Nathanial Hackett

Birthday: 1997-10-09

Address: Apt. 935 264 Abshire Canyon, South Nerissachester, NM 01800

Phone: +9752624861224

Job: Forward Technology Assistant

Hobby: Listening to music, Shopping, Vacation, Baton twirling, Flower arranging, Blacksmithing, Do it yourself

Introduction: My name is Nathanial Hackett, I am a lovely, curious, smiling, lively, thoughtful, courageous, lively person who loves writing and wants to share my knowledge and understanding with you.