Posted on Leave a comment

Federal Agencies Have Released A Joint Advisory And Scanner For Log4j Vulnerabilities.

The intelligence agencies noted in the new advisory that “these vulnerabilities, particularly Log4Shell are Significant”. Cyber threat actors are actively monitoring networks for susceptible systems that might be exploited by Log4Shell, CVE-2021-45046, and CVE-2021-45105. These flaws will very certainly be exploited for a long time.”

In response to widespread exploitation of various vulnerabilities in Apache’s Log4j software library by malevolent adversaries, cybersecurity authorities from Australia, Canada, New Zealand, the United States, and the United Kingdom announced a combined advisory on Wednesday.

According to the FBI’s analysis,” The attacks have also raised the prospect that threat actors are combining the holes into “existing cyber crime schemes that are looking to adopt increasingly sophisticated obfuscation techniques. Organizations are being asked to identify, remediate, and upgrade vulnerable assets as soon as possible, given the severity of the vulnerabilities and the likelihood of escalating exploitation”.

By sending a specially crafted request to a vulnerable machine and causing it to execute arbitrary code, an attacker can exploit Log4Shell (CVE-2021-44228). CVE-2021-45046, on the other hand, allows for remote code execution in non-default configurations, while CVE-2021-45105 could be used to cause a denial-of-service (DoS) issue by a remote attacker.

The US CISA has developed a scanner use to identify systems vulnerable to the Log4Shell vulnerability, comparable to the CERT Coordination Center’s (CERT/CC) tool.

Commercial scanning tools, on the other hand, were ill-equipped to detect all formats of the Log4j library in an environment, according to an assessment published this week by Israeli cybersecurity firm Rezilion, because the instances are often deeply nested in other code, revealing the “blindspots” in such utilities and the limitations of static scanning.

The public exposure of Log4Shell, a number of technology companies have released patches for software that contains the bug. NVIDIA and HPE are the most recent businesses to issue updates, joining a long list of vendors who have issued security warnings outlining the products that are vulnerable by the vulnerability.

Finally Yotam Perkal, vulnerability research lead at Rezilion concluded that ,”The biggest challenge is discovering Log4Shell within packaged software in production environments. Java files (such as Log4j) might be nested a few layers deep into other files — which means a quick search for the file won’t uncover it.” “Furthermore, they may be packaged in a variety of forms, making it difficult to locate them within other Java packages.

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin

Leave a Reply