Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > CISA published an emergency directive for Log4j

CISA published an emergency directive for Log4j

CISA published an emergency state to help Federal Civilian Executive Branch agencies to protect themselves against the Log4j vulnerability exploits.


Erdem Yasar Erdem Yasar
December 18, 2021
3 min read
CISA published an emergency directive for Log4j

Cybersecurity and Infrastructure Security Agency published Emergency Directive 22-02, named Mitigate Apache Log4j Vulnerability. CISA stated that the vulnerability poses an unacceptable risk to federal agencies and requires emergency action. CISA also already added the CVE-2021-44228 vulnerability to its catalog of known exploited vulnerabilities, as defined by BOD 22-01.

Required actions

CISA recommends the same actions against the entirety of agencies’ infrastructure. CISA will issue supplemental direction applicable to broader agency-owned information technologies and operational technologies as the situation evolves. The actions apply to agency applications in any information system, including an information system used or operated by another entity on behalf of an agency, that collects, processes, stores, transmits, disseminates, or otherwise maintains agency information.

By 5 pm EST on December 23, 2021:

  1. Enumerate all solution stacks accepting data input from the internet.
  2. Evaluate all software assets in identified solution stacks against the CISA-managed GitHub repository to determine whether Log4j is present in those assets and if so, whether those assets are affected by the vulnerability.
    1. If the software product is not listed in the repository, request addition by submitting a “pull” request using the link on the GitHub page.
  3. For all software assets that agencies identify as affected by CVE-2021-44228:
  4. Update assets for which patches have been provided. Remediation timelines prescribed in BOD 22-01 “may be adjusted in the case of grave risk to the Federal Enterprise.” Given the criticality of CVE-2021-44228, agencies must immediately patch any vulnerable internet-facing devices for which patches are available, under an emergency change window.
  5.  OR
  6. Mitigate the risk of vulnerability exploitation using one of mitigating measures provided.
  7.  OR
  8. Remove affected software assets from agency networks.
  9. For all solution stacks containing software that agencies identified as affected: assume compromise, identify common post-exploit sources and activity, and persistently investigate and monitor for signs of malicious activity and anomalous traffic patterns (e.g., JDNI LDAP/RMI outbound traffic, DMZ systems initiating outbound connections).

 By 5 pm EST on December 28, 2021:

  1. Report all affected software applications identified in (3) above using the provided template, including:
    1. Vendor name
    2. Application name and version
    3. Action taken (e.g. updated, mitigated, removed from agency network)
  2. Confirm that your agency’s Internet-accessible IP addresses on file with CISA are up to date via email.

Related Stories

  • Two new vulnerabilities are found on Log4j, only one of them is fixed yet
  • Google joining the war against Log4j exploits
  • Hackers exploit Log4j to inject Monero miners, shifting from LDAP to RMI
  • A third, new Apache Log4j vulnerability is discovered
  • How to scan your server to detect Log4j (Log4Shell) vulnerability
  • The Log4j flaw is patched but it is still vulnerable
  • CISA published Log4j vulnerability guidance
  • Zero-day Apache Log4j RCE vulnerability (Log4Shell) is being exploited

    See more Cybersecurity News

    A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


    Tags: CISA
    Erdem Yasar

    Erdem Yasar

    Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    I agree to the Terms & Conditions and Privacy Policy.

    Next Post
    Unisys announced CompuGain acquisition

    Unisys announced CompuGain acquisition

    Related News

    7 best practices and tools to use for Linux security

    7 best practices and tools to use for Linux security

    March 24, 2023 5:00 pm
    CISA aims to identify vulnerabilities that attract ransomware

    CISA aims to identify vulnerabilities that attract ransomware

    March 22, 2023 2:10 pm
    7 best cybersecurity schools

    7 best cybersecurity schools

    March 21, 2023 9:00 pm
    Akamai researchers warn about the new HinataBot botnet

    Akamai researchers warn about the new HinataBot botnet

    March 20, 2023 6:10 pm
    Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
    Select list(s):

    Check your inbox or spam folder to confirm your subscription.

    By subscribing, you agree to our
    Copyright Policy and Privacy Policy

    Get the free newsletter

    Subscribe to receive the latest IT business updates straight to your inbox.

    Select list(s):

    Check your inbox or spam folder to confirm your subscription.

    Recent News

    • [Event] Grab your DeveloperWeek Europe 2023 ticket free
    • How to get Linux ready for gaming
    • Trisquel GNU/Linux 11.0 review
    • What is continuous testing in DevOps?
    • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now

    Cloud7 News
    Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

    EXPLORE

    • Web Hosting
    • Cloud Computing
    • Data Center
    • Cybersecurity
    • Linux
    • Network/Internet
    • Software
    • Hardware
    • Artificial Intelligence
    • How-Tos
    • Troubleshooting

    RESOURCES

    • Events
    • Interviews
    • Jobs
    • Opinion
    • Whitepapers
    • Podcasts
    • Web Hosting Directory

    Get the Cloud7 Newsletter

    Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

    • About Us
    • Privacy & Policy
    • Copyright Policy
    • Contact

    © 2023, Cloud7 News. All rights reserved.

    No Result
    View All Result
    • Cloud Computing
    • Web Hosting
    • Data Center
    • Linux
    • Cybersecurity
    • More
      • Software
      • Network/Internet
      • Hardware
      • Artificial Intelligence
      • Windows
      • Policy/Legislation
      • Blockchain
      • Troubleshooting
      • How-Tos
      • Articles
    • Events
    • Interviews
    • Jobs
    • Opinion
    • Whitepapers
    • Podcasts
    • Web Hosting Directory

    © 2023, Cloud7 News. All rights reserved.

    Welcome Back!

    Sign In with Facebook
    Sign In with Google
    Sign In with Linked In
    OR

    Login to your account below

    Forgotten Password? Sign Up

    Create New Account!

    Sign Up with Facebook
    Sign Up with Google
    Sign Up with Linked In
    OR

    Fill the forms below to register

    *By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.