{"id":13068,"date":"2021-12-15T08:44:25","date_gmt":"2021-12-15T13:44:25","guid":{"rendered":"https:\/\/tsisupport.com\/?p=13068"},"modified":"2021-12-16T08:41:03","modified_gmt":"2021-12-16T13:41:03","slug":"apaches-log4j-vulnerability-what-to-do","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=13068","title":{"rendered":"What To Do: Apache\u2019s Log4j Vulnerability"},"content":{"rendered":"<p>Apache\u2019s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We will also provide instructions on how to upgrade your Log4j installation. So don\u2019t wait \u2013 read on to learn more!<\/p>\n<p>Apache\u2019s Log4j, now named Log4Shell (CVE-2021-444228), allows remote code execution (RCE) on servers\/computers that gives a hacker the ability to import malware, which could compromise machines. Apache\u2019s Log4J is a logging tool used in many Java based applications that affects a broad range of services and applications.<\/p>\n<h4><b>TSI\u2019S RECOMMENDATIONS<\/b><\/h4>\n<p><b>#1 &#8211; Identify the Existence of Log4j Library in Your Environment\u00a0<\/b><\/p>\n<p>Review software leveraged in your environment and identify applications that are impacted by this vulnerability. A preliminary list of impacted software is available <a href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGBRML67K5Uc4gpoRfIGL0qQuyU3YOhYtwcyaQubVZILN0ncP85A5FbLdR9hVBH7R54sEzqHi8=\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><b>NOTE:<\/b> This is list is not comprehensive.<\/p>\n<p><b>#2 \u2013 Confirm your Application Vendors Apply the Latest Security Patch, if Necessary<\/b><\/p>\n<p>Apache has addressed the vulnerability in Log4j 2.15.0. Because the security patch is not automatically applied, it is best to contact software vendors leveraging the Log4j 2 package and confirm they applied the security patch as soon as possible.<\/p>\n<p><b>#3 &#8211; Implement Available Workarounds<\/b><\/p>\n<p>If upgrading to Log4j 2.15.0 is not immediately feasible, <a href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGBRML67HlRNP9B6IRBeikUJHibRMimKrJLCeRunBcHPDEHTtNnuSB70XlbeFCMV1MYLAT75DU=\" target=\"_blank\" rel=\"noopener\">Apache recommends<\/a> implementing the following workarounds to mitigate this vulnerability:<\/p>\n<ul>\n<li>In releases &gt;=2.10, this behavior can be mitigated by setting either the system property\u202flog4j2.formatMsgNoLookups\u202for the environment variable\u202fLOG4J_FORMAT_MSG_NO_LOOKUPS\u202fto\u202ftrue.<\/li>\n<li>For releases from 2.0-beta9 to 2.10.0, the mitigation is to remove the\u202fJndiLookup\u202fclass from the classpath:\u202fzip -q -d log4j-core-*.jar org\/apache\/logging\/log4j\/core\/lookup\/JndiLookup.class, will cause the JndiContextSelector to no longer function.<\/li>\n<li>Versions of Log4j since 2.7: specify %m{nolookups} in the PatternLayout configuration to prevent lookups in log event messages.<\/li>\n<\/ul>\n<p><b>#4 &#8211; Prevent Impacted Devices from Initiating Outbound Connections<\/b><\/p>\n<p>Any vulnerable infrastructure identified with CVE-2021-44228 should have its ability disabled to communicate externally until a security patch has been applied or mitigations have been implemented.<\/p>\n<p><strong>For a complete overview of this vulnerability, please refer to the link below:<\/strong><\/p>\n<p><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/12\/11\/microsofts-response-to-cve-2021-44228-apache-log4j2\/\" target=\"_blank\" rel=\"noopener\"><b>Microsoft Security Response Center: Apache Log4j (CVE-2021-44228)<\/b><\/a><\/p>\n<div class=\"fl-builder-content fl-builder-content-13074 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"13074\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-61b9f2368769f fl-row-default-height fl-row-align-center fl-row-bg-overlay sec-pad cta\" data-node=\"61b9f2368769f\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-61b9f23687696\" data-node=\"61b9f23687696\">\n\t\t\t<div class=\"fl-col fl-node-61b9f2368769b fl-col-bg-color\" data-node=\"61b9f2368769b\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-61b9f2368769c sec-title-big\" data-node=\"61b9f2368769c\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h3 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Get in Touch with TSI<\/span>\n\t<\/h3>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-61b9f2368769d\" data-node=\"61b9f2368769d\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>To find out more information about how Apache\u2019s Log4j Vulnerability may impact your organization or to get answers to any other important questions you may have, please give us a call at <a href=\"tel:508-543-6979\">508-543-6979<\/a> or send us a message here to get started.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-61b9f2368769e fl-animation fl-fade-down primary-btn red-btn\" data-node=\"61b9f2368769e\" data-animation-delay=\"0\" data-animation-duration=\"1\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-center\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">get in touch<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<style>.fl-node-61b9f2368769e.fl-animation:not(.fl-animated){opacity:0}<\/style><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Apache\u2019s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We&hellip;<\/p>\n","protected":false},"author":4,"featured_media":13108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What To Do: Apache\u2019s Log4j Vulnerability - TSI Support<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What To Do: Apache\u2019s Log4j Vulnerability - TSI Support\" \/>\n<meta property=\"og:description\" content=\"Apache\u2019s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=13068\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-15T13:44:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-16T13:41:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chris Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Souza\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=13068\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=13068\",\"name\":\"What To Do: Apache\u2019s Log4j Vulnerability - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=13068#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=13068#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg\",\"datePublished\":\"2021-12-15T13:44:25+00:00\",\"dateModified\":\"2021-12-16T13:41:03+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed\"},\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=13068#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=13068\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=13068#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=13068#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What To Do: Apache\u2019s Log4j Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed\",\"name\":\"Chris Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g\",\"caption\":\"Chris Souza\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=4\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What To Do: Apache\u2019s Log4j Vulnerability - TSI Support","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What To Do: Apache\u2019s Log4j Vulnerability - TSI Support","og_description":"Apache\u2019s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We&hellip;","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=13068","og_site_name":"TSI Support","article_published_time":"2021-12-15T13:44:25+00:00","article_modified_time":"2021-12-16T13:41:03+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg","type":"image\/jpeg"}],"author":"Chris Souza","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chris Souza","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=13068","url":"https:\/\/tsisupport.com\/tsistaging\/?p=13068","name":"What To Do: Apache\u2019s Log4j Vulnerability - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=13068#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=13068#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg","datePublished":"2021-12-15T13:44:25+00:00","dateModified":"2021-12-16T13:41:03+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed"},"breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=13068#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=13068"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=13068#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/12\/Apache-s-Log4j-v1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=13068#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"What To Do: Apache\u2019s Log4j Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed","name":"Chris Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g","caption":"Chris Souza"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=4"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/13068"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13068"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/13068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/13108"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}