Log4j Zero Day Vulnerability: CISA Mitigation, Patch Guidance - Hexafusion Blog | Hexafusion

Hexafusion Blog

Log4j Zero Day Vulnerability: CISA Mitigation, Patch Guidance


The U.S. CISA (Cybersecurity and Infrastructure Security Agency) hosted a national call with critical infrastructure stakeholders on December 13, 2021. Among the topics covered: How to organize a mass effort to patch the Apache Log4j vulnerability, and mitigate potentially cyberattacks that exploit the Log4Shell issue.

In a prepared statement about the vulnerability, CISA Director Jen Easterly said on December 11, 2021:

“To be clear, this vulnerability poses a severe risk. We will only minimize potential impacts through collaborative efforts between government and the private sector. We urge all organizations to join us in this essential effort and take action.”

Still, the worldwide Log4j software cleanup could take months, SC Media reported, because thousands of third-party software products run the code.

Amid that backdrop, the CISA has created a webpage (called Apache Log4j Vulnerability Guidance) and will actively maintain a community-sourced GitHub repository of publicly available information and vendor-supplied advisories regarding the Log4j vulnerability, the organization said. Both web destinations will be updated regularly as more information becomes against, the CISA indicated.

Log4j Vulnerability Mitigation: 4 Steps for MSPs and MSSPs

Ahead of the December 13 critical infrastructure call, the CISA offered this Log4j vulnerability mitigation guidance:

Review the latest CISA current activity alert and upgrade to log4j version 2.15.0, or apply their appropriate vendor recommended mitigations immediately. Enumerate any external facing devices that have log4j installed. Make sure that your security operations center is actioning every single alert on the devices that fall into the category above. Install a web application firewall (WAF) with rules that automatically update so that your SOC is able to concentrate on fewer alerts.

Log4j Vulnerability: Cybersecurity and MSP Software Company Statements

Meanwhile, cybersecurity companies offered this Log4j vulnerability guidance. And MSP software companies such as ConnectWise, Datto, Kaseya, N-able, NinjaOne and Pax8 have issued Log4j statements about whether their platforms are safe from the vulnerability.

Original author: Joe Panettieri
Combat Misinformation by Getting Back to Security ...
Kronos Ransomware Cyberattack Details: Log4j Relat...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 24 January 2022

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://hexafusion.com/

Customer Login

News & Updates

Contact us

Learn more about what Hexafusion can do for your business.

250 - 997 Seymour Street
Vancouver, British Columbia V6B 3M1