Log4j alarm: this is what Kaspersky recommends 

Log4j Log4shell

Share post

A new, particularly critical vulnerability was discovered in the Apache Log4j library last week. This is used for millions of Java applications. Here are a few recommendations from the Kaspersky experts.  

Log4Shell - also known as LogJam and under the designation CVE-2021-44228 - is a so-called Remote Code Execution (RCE) class vulnerability. This allows attackers to execute arbitrary code and possibly gain full control over a system if it is exploited on a vulnerable server. The CVE was rated 10 out of 10 for severity.

Log4j in millions of Java applications

The Apache Logging Project (Apache Log4j) is an open source logging library used for millions of Java applications. Any product using a vulnerable version of this library (version 2.0-beta9 to 2.14.1) is at risk for this new vulnerability.

Log4j contains a lookup mechanism for searching for queries with a special syntax. By creating a custom prefix for this string, attackers could transmit information to a server under their control, leading to arbitrary code execution or loss of confidential information.

That's what the Kaspersky experts say

Evgeny Lopatin, security expert at Kaspersky, comments on the situation as follows:

“This vulnerability is not only particularly dangerous because attackers can gain complete control over the system, but also because it is particularly easy to exploit - even an inexperienced hacker can benefit from it. We already see that cyber criminals are actively looking for software that they can exploit with this vulnerability. The good news, however, is that a strong security solution can help protect users. "

Kaspersky products detect and block attacks via this vulnerability under the following ID:

UMIDS: Intrusion.Generic.CVE-2021-44228.
PDM: Exploit.Win32.Generic

Kaspersky recommendation to protect the vulnerability

  • Immediately install the latest version of library 2.15.0, this is available on the product page [3]. If the library is used in a third-party product, it should be checked when the software provider will make an update available; this should also be installed immediately.
  • Follow the Apache Log4j project guidelines at https://logging.apache.org/log4j/2.x/security.html.
  • Companies should use a security solution that offers exploit prevention, vulnerability and patch management components, such as Kaspersky Endpoint Security for Business. The Automatic Exploit Prevention component monitors suspicious application actions and blocks malicious files from running.
    Use solutions or services such as Kaspersky Endpoint Detection and Response or Kaspersky Managed Detection and Response Service, which can detect and stop attacks in the early stages.
More at Kaspersky.com

 


About Kaspersky

Kaspersky is an international cybersecurity company founded in 1997. Kaspersky's in-depth threat intelligence and security expertise serve as the basis for innovative security solutions and services to protect companies, critical infrastructures, governments and private users worldwide. The company's comprehensive security portfolio includes leading endpoint protection as well as a range of specialized security solutions and services to defend against complex and evolving cyber threats. Kaspersky technologies protect over 400 million users and 250.000 corporate customers. More information about Kaspersky can be found at www.kaspersky.com/


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more