![]() The US Cybersecurity and Infrastructure Security Agency (CISA) has ordered all civilian Federal agencies to patch the critical Log4j vulnerability by December 24 and system defenders are still racing to patch the vulnerability in the run up to Christmas.Īt the time of writing (December 22nd 2021 22:00 UTC) we have seen 174,068 scan/exploit events from 2,344 unique IP addresses across 433 ports. Internet-wide mass scanning and exploitation of the vulnerabilities on exposed systems has continued, including by alleged nation state actors and ransomware operators. Software product/platform/service assessments and code reviews have discovered many impacted software packages, requiring large scale remediation activities world-wide. Multiple Log4j 2 patches have been released by the Apache Foundation to address the original CVE-2021-44228 vulnerability, as well as other subsequently discovered additional vulnerabilities CVE-2021-45046 (remote code execution – RCE) and CVE-2021-45105 (Denial of Service – DoS) too. CVE-2021-44228: Update ĭuring the week since our first Special Report, security vulnerabilities in Log4j have continued to make headlines in the mainstream media as well as in the cyber security industry. We encourage you to read our previous posts for background, initial analysis and remediation information. We also blogged initial observations from our honeypot sensor network relating to Log4j and attempted CVE-2021-44228 exploitation. ![]() That Special Report provided National CSIRTs and network owners with information about Internet facing systems detected on their networks that were potentially vulnerable to CVE-2021-44228. In response to the major ongoing global security incident relating to Apache Log4j 2 that began on December 9th, we published a one off Special Report on Vulnerable Log4j Servers on December 15th 2021. Although the events included in these Special Reports fall outside of our usual 24 hour daily reporting window, we believe that there would still be significant benefit to our constituents in receiving and hopefully acting on the retrospective data. We send out Special Reports whenever we are able to share one-time, high value datasets that we feel should be reported responsibly for maximum public benefit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |