• Twitter
  • RSS
  • Linkedin
  • Support Login
  • Call +44 345 094 3070
BCS Logo Full Colour
  • About Us
    • Company Overview
    • Accreditations
    • Events
  • Services
    • Cynergy Cyber Security Services
    • Cyber Education
    • CISO Services
    • Cyber Security Posture Review
    • Firewall Management
    • Governance Services
    • Governance Services Advanced
    • Penetration Testing
    • Vulnerability Management
  • Solutions
    • Authentication
    • AWS
    • DDoS
    • Endpoint Security
    • Network Perimeter Security
    • Privileged Access Management
    • Threat Intelligence
  • News
  • Blog
  • Resource
    • Datasheets
    • Videos
  • Contact
  • About Us
    • Company Overview
    • Accreditations
    • Events
  • Services
    • Cynergy Cyber Security Services
    • CISO Services
    • Cyber Security Posture Review
    • Firewall Management
    • Governance Services
    • Governance Services Advanced
    • Penetration Testing
    • Vulnerability Management
  • Solutions
    • Authentication
    • AWS
    • DDoS
    • Endpoint Security
    • Network Perimeter Security
    • Privileged Access Management
    • Threat Intelligence
  • News
  • Blog
  • Resource
    • Datasheets
    • Videos
  • Contact
  • Support Login
  • Call +44 345 094 3070

Apache Log4j Vulnerability

Dec 15, 2021 | Blogs

 

In their blog below, our Cynergy team share their insight on the new vulnerability that has left security teams worldwide wondering if they are affected and what do they need to do to protect their organisations.

 Widespread reports of Log4Shell, a new critical security flaw in Apache Log4j software, came to light last week. The zero-day vulnerability enables attackers to remotely execute code on servers running Log4j, an open source Java logging library used by developers worldwide and embedded into everything from online games and enterprise applications to cloud services.

 High-profile global enterprises including Microsoft, Apple, Google, and Amazon are said to have been affected and over the last few days there have been hundreds of thousands of attempts by threat actors to exploit the vulnerability. Due to the widespread use of Log4j this number is expected to keep on growing significantly over the coming weeks, despite Apache releasing an emergency security patch, as well as mitigation steps for those unable to update immediately. In addition, third party mitigations have also been made available.

The vulnerability has been given a Common Vulnerability Scoring System rating of 10, giving it a critical rating. The National Institute of Standards and Technology (NIST) calls this improper input validation, where essentially too much trust is placed in untrusted data. The Log4j vulnerability allows malicious threat actors to manipulate code, exploiting the open-source logging framework for Log4j, which results in LDAP, RMI, and other JNDI endpoints executing code from an untrusted source.

 

As a result, the National Cyber Security Centre (NCSC) has recommended the following priority actions:

  • Install the latest updates immediately wherever Log4j is known to be used
  • Discover unknown instances of Log4j within your organisation
  • Deploy protective network monitoring/blocking

The NCSC have also given insight to the challenges board members of medium to large organisations are facing along with some advice in their recent blog post. 

In addition, vendors of any affected software are advised by the NCSC to notify customers as soon as possible to ensure they can urgently apply mitigations and install updates. You can find a list of vendor advisories here

In the meantime, we have pulled together some important key points, advisories, and recommended mitigations that are detailed below.

Log4j Identification

Our Cynergy SafeScan service uses Qualys identifiers to identify the Log4j vulnerability from external and web application scans to determine if our customers are vulnerable. Customers should check with their vulnerability management tool vendor for updated checks.

Our service can use web application scanning to target external assets vulnerable to Log4j. Qualys explains – scanning with this option profile will achieve two things to expedite testing your web applications in the most efficient way possible.  First, we are only testing for one specific vulnerability, QID 150440.  Second, as this vulnerability is only tested at the base URI and several directories up and down as appropriate, there is no need to crawl and test every link in the application. These two changes will allow each web application to be scanned faster than full core detection scans while still providing you with the necessary visibility of any vulnerable versions of Log4j2.

Qualys is actively working on more QIDs for other asset identification methods. The situation around this vulnerability is evolving, and Qualys are constantly updating this article with new QIDs to improve the internal discovery.

Recommended Mitigations

Apache Log4j Security Advisory – The best defence is to upgrade. The vendor has released a fix for this vulnerability, and our customers are advised to update their Log4j to version 2.17.0 (Requires Java 8). Updating the version may not be possible; please refer to the mitigations mentioned here

Log4jApache Log4j Patches – download here 

WAF Rules – Update your vendor WAF rules to block the exploit attempts

IPS Rules – Check vendors for updated IPS rules

Although most organisations will have reacted quickly to apply patches and shore up their security in light of this critical vulnerability, there will be ongoing implications over the coming weeks as threat actors continue to attempt to exploit the flaw with malware for lateral movement, credential theft, and data exfiltration. The situation will be further compounded due to the extensive use of Log4j, which makes identifying all vulnerable systems and applications an exhaustive task.

If you have any queries or require further advice about dealing with the Log4Shell vulnerability, or need support with remediation please get in touch with us below or speak to us via our live chat at the bottom right of this page.

 
 
 

Latest Tweets

Latest News

  • Is Your Business Ready to Weather a Cyber Storm?
  • Defending Your Digital Domain from a Harsh Winter: Modern Web Security Essentials
  • Securing Your Business from a Hard Winter: A Guide to Data Protection
  • Security Awareness Training: Why It Is Vital for Businesses
  • How will the EU's Digital Operational Resilience Act (DORA) impact the UK Financial Services Sector?

Latest News

  • We’re aiming for £16M in revenue,” says Blue Cube Security director
  • Blue Cube Security Sponsors Historic Channel Islands Rugby Event: The 2025 Spring Insure Granite Trophy
  • Blue Cube Security Marks 25 Years with New Trend Micro Professional Services Hybrid Cloud Competency
  • Blue Cube Security Strengthens Fortinet Partnership with New Specialisations

Contact Details

Blue Cube Security Ltd

Ratana House,
Saint Hill Road,
East Grinstead,
West Sussex,
RH19 4JU,
UK

+44 345 094 3070

Blue Cube
ISO-27001-2022-white
ISO-9001-2015-badge-white-1
Cyber Essentials Logo white border 140
  • Terms and Conditions of Sale
  • Terms and Conditions of Purchases
  • Privacy Policy
  • Cookie Policy
  • Twitter
  • RSS
  • Linkedin

© 2025 Blue Cube Security Limited. Registered in England & Wales, company number 07118478.