As you might already know, Log4j is an open-source login framework that helps developers log data in Java Applications. It is a part of Apache Logging Services, maintained by Apache Software Foundation, and is widely used in enterprise software programs.
Log4j is a flexible and reliable logging library for java and is used to debug software applications during their development cycle. It can run on some of the extensively used platforms like Windows, macOS, and Linux.
Log4j is made up of three basic components – appenders, loggers, and layouts. These components work together to offer systematic logging.
According to News Nation USA, Log4Shell was revealed after Chen Zhaojun of Alibaba’s cloud security team sent an email alerting the Apache Software Foundation on November 24th about the vulnerability.
The Common Vulnerability Scoring System (CVSS) rating is a standard for accessing the severity of the security vulnerability of a system. And the CVSS score given to Log4j Vulnerability is 10.0, the highest rating possible.
Bloomberg reported that since the disclosure of the flaw, some anger has been directed towards the developers of Apache. Bloomberg also reported that according to Daniel Stenberg, the creator of open-source software called Curl, the warning signs of Log4j vulnerabilities were presented at the Black Hat Cybersecurity Conference in 2016 and said “Why wasn’t it fixed then? I really don’t know,”.
According to CBS News Jen Easterly, head of the Cybersecurity and Infrastructure Security Agency called Log4j “the most serious flaw” that she has seen in her decades-long career.
This vulnerability leaves your system unsecured from intrusion and allows privileged access to malicious actors. In easier words, Log4j Vulnerability lets malicious attackers easily install malware, steal data, or even worse, with the help of malicious code.
Cybersecurity firm CheckPoint has called it “A True Cyber Pandemic” because of its quickly spreading and devastating attacks. Check Point recorded over 800,000 attacks in 72 hours after the initial outbreak, and its research witnessed over 60 new variations of the original exploit in less than 24 hours.
According to CheckPoint, Log4j Vulnerability acts precisely like a cyber pandemic — highly contagious, spreads rapidly, and has multiple variants, which force more ways to attack.
As cyber criminals are attempting to exploit this vulnerability, most organizations are susceptible to it and face many challenges.
In almost every internet application or service that we use in our daily lives, the library of Log4j is embedded. From E-Commerce giant Amazon to Microsoft, Minecraft, Twitter, and many more, the usage of the Log4j library can be found in all. This vulnerability affects many cloud services as well as enterprise products from some of the biggest vendors in the world including Cisco and Red Hat.
The first challenge is to learn which services use a constituent of Log4j, and out of those services their organization uses which services, and lastly, if these services are susceptible to malicious attacks or not.
