Sunday, May 22, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > CISA published Log4j vulnerability guidance

CISA published Log4j vulnerability guidance

CISA published its Log4j vulnerability guidance to help organizations to protect themselves against possible attacks.

Erdem Yasar by Erdem Yasar
December 15, 2021
in Cybersecurity
3 min read
0 0
0
CISA published Log4j vulnerability guidance
0
SHARES
110
VIEWS
Share on FacebookShare on TwitterShare on EmailFollow on Google News

Cybersecurity and Infrastructure Security Agency and its partners published guidance about the exploitation of a critical vulnerability (CVE-2021-44228) in Apache’s Log4j software library, through the Joint Cyber Defense Collaborative. Versions between 2.0-beta9 to 2.14.1 of Apache’s Log4j, also known as Log4Shell or Logjam, are being exploited with remote code execution, and it is considered as the biggest cyber threat according to cyber security experts.

Identify, mitigate, and patch

CISA stated that Log4j is used in a variety of consumer and enterprise services, websites, and applications to log security and performance information. To avoid exploitation, the maintainers of these products and services should implement the Log4j version 2.15.0 security update or contact their vendors for security updates. 

CISA also stated that the vulnerability exists in the action the Java Naming and Directory Interface (JNDI) takes to resolve variables. The affected versions contain JNDI features that don’t protect against Lightweight Directory Access Protocol (LDAP) and other JNDI related endpoints. CISA urges vendors and users to take the following actions.

  • Vendors
    • Immediately identify, mitigate, and patch affected products using Log4j.
    • Inform your end users of products that contain this vulnerability and strongly urge them to prioritize software updates.
  • Affected Organizations
    • In addition to the immediate actions, to enumerate external-facing devices that have Log4j, ensure your SOC actions alerts on these devices, and install a WAF with rules that automatically update, review CISA’s upcoming GitHub repository for a list of affected vendor information and apply software updates as soon as they are available.

CISA also announced that it will maintain a community-sourced GitHub repository to provide a list of publicly available information and vendor-supplied advisories.

Related Stories

  • Two new vulnerabilities are found on Log4j, only one of them is fixed yet
  • CISA published an emergency directive for Log4j
  • Google joining the war against Log4j exploits
  • Hackers exploit Log4j to inject Monero miners, shifting from LDAP to RMI
  • A third, new Apache Log4j vulnerability is discovered
  • How to scan your server to detect Log4j (Log4Shell) vulnerability
  • The Log4j flaw is patched but it is still vulnerable
  • Zero-day Apache Log4j RCE vulnerability (Log4Shell) is being exploited

See more Cyber Security News


Tags: ApacheCISA
ShareTweetSendShare
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy
Previous Post

DataBank expanding Dallas data center capacity

Next Post

Pop!_OS 21.10 is released, download now

Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7 News. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7 News, Erdem was the managing editor of T3 Magazine.

Related News

Microsoft SQL Servers Are Targeted With Brute - Force Attacks

Microsoft SQL servers are targeted with brute-force attacks

May 20, 2022 3:45 pm
Google OAuth client library for Java had a high severity flaw

Google OAuth client library for Java had a high severity flaw

May 20, 2022 2:45 pm
The Linux Malware XOR DDoS Is On The Rise Again

The Linux malware XOR DDoS is on the rise again

May 20, 2022 1:50 pm
Conti ransomware group is shut down

Conti ransomware group is shut down

May 20, 2022 12:10 pm
Next Post
Pop!_OS 21.10 is released, download now

Pop!_OS 21.10 is released, download now

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

cPanel Security: 7 steps to secure cPanel

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

Best web hosting service providers

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Advertisement

Recent News

  • Weekly round-up: 16 – 20 May
  • Intentional user-unfriendly interfaces of popular services
  • Snap app of the week: Glate
  • Weekly tips & tricks: Linux #4
  • [Event] Live Webinar – WordPress: Don’t Underestimate the Power of Plugins

Our Latest Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic
Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic

by Atalay Kelestemur
November 25, 2021 3:23 am


Cloud7 News is a news source that publishes the latest news, industry news and exclusive interviews on web hosting, cloud computing, data center, cybersecurity and linux.

News Categories

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Blockchain

Our Free Modules

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.