Device configurations are one of the most important elements of your organizatio...
Log4J / Log4Shell: How to Find It & Fix It
It’s been a while since FireEye first announced that they were victim of the now infamous SolarWinds Supply Chain Attack. It's gone down in history as one of the most sophisticated and far reaching cyber attacks.
Except it may be quickly surpassed by the Log4Shell vulnerability and the inevitable string of attacks that exploit it.
What is Log4J?
Log4J is an Apache open-source logging Java library. It is used in enterprise systems and web apps. It is so widely used that you can expect many of your applications, web apps and services are making use of it.
What is the Log4Shell exploit?
An attacker can simply send a malicious code string that gets logged by Log4j version 2.0 or higher. The exploit allows an attacker to take control of a server by loading arbitrary Java code. Apache Foundation announced this as a critical zero-day vulnerability CVE-2021-44228
What is the Remedy?
Apache Foundation has released a patch update which can be found here. If you’re the author of the app, you should use that link to secure your system. You should also be in touch with all your application vendors to determine if they are using Log4Shell and whether they are providing an update to their application.
Can GYTPOL help with Log4Shell?
For sure! Firstly, the GYTPOL application itself was not impacted as we don’t make use of this library.
Secondly, there has already been a few patch updates released by Apache. If you are not enthusiastic about applying numerous updates throughout your organization which is time consuming and has its own risks then GYTPOL’s remediation capability with zero impact will certainly help.
GYTPOL provides continuous visibility of all your PCs and Servers (including cloud workloads) and then remediating the issue, rapidly, automatically and without breaking anything else along the way.
GYTPOL already supports Log4Shell detect and remediation as follows:
- GYTPOL accurately discovers all instances of Log4J on all your PCs and Servers. Other scanning tools have shown to not be fully accurate. With GYTPOL, we find them all.
- GYTPOL can then proactively remediate by repairing the vulnerability without the need to patch the update from Apache, thereby eliminating the risk for all applications.
It's as simple as that. No muss, no fuss, no more risk!
About Author
Nitsan Ben Nun
Managing a cross-functional team, Nitsan specializes in delivering cutting-edge, innovative technology. Known for his results-oriented mindset, Nitsan excels at creative problem solving, process optimization, and leading by example.
Subscribe to
our Newsletter
We are ready to help you until and unless you find the right ladder to success.
Related Posts
Join over 25,000 in beating the failure of strategies by following our blog.
After a CVE is published, the race is on. Often a good amount of time passes bef...
4 minute read
The cyber threat landscape has been significantly heightened by the emergence of...
4 minute read
In the fast-paced world of technology, where innovation is a constant, it’s cruc...
Comments