IBM Security is following a recent disclosure regarding an Apache vulnerability in the Log4j Java library dubbed Log4Shell (or LogJam). X-Force Exchange has further details on the exploit. Millions of applications use the Java-based Log4j library to log activity, including several prominent web services. Apache has issued a patch with an update to the latest version of Log4j 2.15.0.
Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker-controlled LDAP and other Java Naming Directory Interface (JDNI) related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system.
At this time, IBM recommends organizations running Apache Log4j take the following actions:
- Check for vulnerable versions of Apache Log4j in your environment.
- Implement latest patch to production environments as soon as possible.
We will continue to update this blog as more details on detection and remediation become available.
Assistance is also available to assist 24/7 via IBM Security X-Force’s US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.
The post Update on Apache Log4j Zero-Day Vulnerability appeared first on Security Intelligence.