Log4j - Critical Vulnerability Protection

The widespread logging library log4j has a critical vulnerability that allows attackers to execute arbitrary code on victim systems (remote code execution).

It is therefore strongly recommended to patch affected systems and applications, or to make it more difficult or prevent the exploitability of the vulnerability by changing the configuration or isolating affected systems.

Table of Contents

Affected systems, applications, manufacturers:

The library is a Java library. It should therefore be checked for all systems whether they have a Java installation as a prerequisite or whether they have Java installed. In the case of Java systems, it must be checked whether they are using the affected log4j library.

Under the link
https://github.com/NCSC-NL/log4shell/blob/main/software/README.md
A list of affected providers can be viewed.

The list of vendors affected by log4j

  • Apache (various products)
  • Cisco
  • graylog
  • Microsoft
  • Oracle
  • SAP
  • Solarwinds
  • TrendMicro

DANGER! This list is not complete and is only an excerpt from the source given above. Many other providers will probably be affected who have not yet commented on this.

Security Alert Log4j

How do I identify affected products and versions?

There is a program to scan locally on affected systems for affected applications: https://github.com/hillu/local-log4j-vuln-scanner 
Another scanner can do this remotely: https://github.com/fullhunt/log4j-scan

Our countermeasures to the log4j vulnerability

Update

log4j should be updated to the current version 2.15.0 as soon as possible. Because it is often not possible for users to update the library independently within applications in which it is used, it must be checked whether the suppliers and manufacturers of affected products provide a security update that must be applied.

Workaround

Where an update is not possible at short notice, two workarounds are currently recommended.

1. From log4j version 2.10:

Setting the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS to true

2. From log4j version 2.0-beta 0 and higher:

The JndiLookup class can be deleted from the classpath. (manufacturer's recommendation)
This is possible with the following command: 

				
					zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
				
			

3. Exchange of affected jar file:

It must first be checked whether it is possible to exchange the file. The manufacturer documentation for the affected products should be consulted for this purpose.

Do you have questions or need support?
If you have any questions or need support when checking your systems, we are at your disposal. Come to us!
Inquire now

Other sources