to top button
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

Disasterous Potential: What You Need to Know About the Log4j vulnerability

January 13, 2023
5 min read
min read
Share this post
Disasterous Potential:  What You Need to Know About the Log4j vulnerability

What is Log4j?

Log4j is an open-source log management and analysis tool created by the Apache Software Foundation. It is primarily used in Java applications to collect, manage, and record users activities. Since it's release, Log4j has been downloaded millions of times and is one of the most widely known tools used in many popular applications and software systems.

The Log4j vulnerability

The Log4j critical vulnerability had been discovered last week and could have devastating effects to the entire internet.  

It's important to understand how this vulnerability works. An attacker would be able to execute unauthorized remote commands on a computer running Log4j without the user/organizations knowledge/approval by sending a specially crafted request to the server.  These requests can lay dormant for years without knowledge and execute dangerous ransomware/malware. According to David Kennedy, CEO of cybersecurity firm TrustedSec, "This will take years to address, while attackers will be attempting to exploit it on a daily basis."

The list of potential victims of this exploit covers nearly a third of web servers in the world. Microsoft, Google, Amazon, Apple, IBM, Cisco, Twitter, Oracle as well as gaming giant Minecraft are just a FEW of the titans to utilize this software. This flaw is being considered the biggest cybersecurity risks in decades. As a result of the worldwide usage of Log4j, this leaves critical resources like power, energy, food, water, communications, e-commerce vulnerable to exploitation.

How to Protect Yourself from This Vulnerability

Most of us, are likely utilizing Log4j in some way shape or form. You should do your due diligence and take steps to protect your organization from this exploit.

  1. If you are unsure or concerned then its imperative to reach out to your cybersecurity specialists
  2. Assess if your organization is utilizing Log4j in any way internally and take the appropriate measures to patch and locate any potential weaknesses.
  3. If your organization is utilizing a 3rd party software that utilizes Log4j, follow up with the vendor to ensure that they are taking the appropriate action to remediate.
  4. Keep close watch and remain on the lookout for device, software and app updates.

Additionally, all organizations should have a robust security plan in place that includes understanding potential vulnerabilities like this one and implementing appropriate safeguards against them.

Share this post
Building Relationships, Humanizing Technology.