Check Point called it a true cyber pandemic. Looking at the stats shared by Check Point, it looks like the story of Log4Shell is not going to end any time soon. To support this, Cloudflare, a CDN provider, disclosed attacks on the newly found CVE-2021-45046 vulnerability on Wednesday. Now, companies are not left with any choice except upgrading to 2.16.0. We highly recommend upgrading log4j to v2.16.0 without any delays. Those who are using the third-party applications, please ask the respective vendors to provide the update as soon as possible. We are now in such a critical situation that you don’t have the time to wait until vendors roll out updates. You should take some precautionary measures to protect your network from the Log4Shell vulnerability. Let’s see how to protect your network from Log4Shell attacks.
After the discloser of the new CVE-2021-45046 vulnerability, which lets attackers perform denial of service attacks on the victim machine, researchers from praetorian revealed a new flaw in Log4j 2.15.0 that allows attackers to exfiltrate sensitive data from the victim machine. The technical details are not disclosed to the public. The research group said it has shared the technical details with Apache Foundation. Following that, the team released a small video clip that shows the new data exfiltration vulnerability in Log4j 2.16.0.
Considering the latest development on the Log4Shell vulnerability. We urge you to upgrade your Log4j to the latest available version. If you have this vulnerability on the third-party apps, immediately contact the respective vendors and ask them to release updates or follow their guidelines.
Now the situation is not good to wait for their updates. It is good to implement some preventive measures to protect your application and network before attackers break your shells. Let’s see how to protect your network from Log4Shell attacks.
Block the Log4Shell IOCs on your firewalls, Proxies, EndPoints, and any security monitoring solutions and keep track of them if any connection is established/observed with them in the Infrastructure.
Isolate the suspected system from the network and keep monitoring the activities.
Configure your Vulnerability scan tools like NexPose, Nessus, or QualysGuard and run automated Vulnerability scans.
Disable JNDI on all the servers running Log4j. If unable to disable Log4j, then block all the JNDI requests to untrusted servers.
By implementing these few tips, you can protect your network from Log4Shell attacks. This is not the ultimate solution. You should upgrade Log4j to the latest version in your build or implement all the recommendations shared by your vendor.
We hope this post would help you learn How to Protect Your Network from Log4Shell Attacks. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.