Log4j-Alarm: Tool for scanning vulnerabilities on endpoints and servers

Trend Micro News

Share post

The security provider Trend Micro has developed a free tool for scanning vulnerabilities that users can use to check whether their devices are at risk of a Log4j / Log4Shell attack. It covers all possible scenarios - including attacks on servers, desktops and endpoints.

In mid-December, a new risky vulnerability called Log4Shell (CVE-2021-44228) was discovered, which affects the very widespread Java logging package Apache Log4j. The Log4Shell vulnerability can be misused via specially created log messages in order to then remotely execute arbitrary code on the victim systems. The potential impact of this vulnerability is so great that it is rated 3 based on CVSS version 10,0.x and 2.0 based on CVSS version 9,3 - and it's easy to see why . While the previous attacks were aimed at the server level, there could be a second wave of attacks that also endangers endpoints.

Vulnerability enables almost anything

A malicious actor could use the vulnerability to launch attacks on consumer devices and even cars. For example, various researchers recently demonstrated how Apple iPhones and even Tesla cars can be compromised using simple exploit strings and then issuing commands and stealing sensitive data from the backend servers responsible for these devices.

Servers are still the most vulnerable targets for Log4Shell attacks, especially those on the Internet that use vulnerable versions of Log4j because they are the easiest to compromise. This is followed by internal servers that run vulnerable versions of Log4j and offer exposed services that can be compromised by access brokers. Finally, it is possible that malicious actors also attack desktops with vulnerable versions of Log4j via certain desktop applications.

Log4j: Quick and safe measures

Based on the available open source tools, we have developed a vulnerability scanning tool that covers all possible scenarios - including attacks on servers, desktops and endpoints. The tool can help users verify that they are actually running applications with a vulnerable version of Log4j.

Given that exploits are already in use for Log4Shell, patching vulnerable machines should be a top priority. Most software manufacturers have published guides to help their customers find a suitable solution. It is highly recommended that users apply the manufacturer's patches in their latest version as soon as they become available.

Go directly to the scan tool at Trendmicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more