Skip to content

Vicarius & Log4Shell: What You Need to Know

Has Vicarius Been Affected by Log4Shell?

Along with the rest of the cybersecurity community, we have been continuously monitoring for any evidence of Log4Shell exploit attempts in our digital environment. So far, we have found no evidence that TOPIA or any of our systems have been affected by CVE-2021-44228 or CVE-2021-45046. It is also our current understanding that we are not vulnerable to either CVEs according to data gathered from extensive testing.

We will continue to monitor all of our systems and keep abreast of any new developments in the wild.

What is Log4Shell?

In brief, Log4Shell is the name given to a zero-day vulnerability in Apache’s Log4j, a ubiquitous and open source (check out the inherent risks of open-source software here) logging library that is embedded in virtually every Java based product or web service. It’s found in everything from web cams to Twitter to Apple iCloud. You’d be hard-pressed to find an application or piece of hardware that doesn’t use Log4j.

Log4Shell is pretty much any IT or cybersecurity professional’s worst nightmare. It’s difficult and time consuming to mitigate, it’s everywhere, and the potential damages are catastrophic: from data loss to the attacker gaining full server control. To make matters worse, these consequences are triggered by remote code execution (RCE) enabled by logging a string that enables a malicious actor to inject arbitrary code anywhere they see fit. All of these attributes have earned the Log4Shell vulnerability a CVSS score of 10, the most critical possible rating.

Check out this Naked Security article by Paul Ducklin for an in-depth examination of Log4Shell.

What’s the Impact?

The short answer: nobody knows. While the vulnerability was disclosed to the public on December 9th, there’s evidence that it has been actively exploited by botnets since at least December 1st according to Cloudflare CEO Matthew Prince.

To put the current and potential impact into perspective, Check Point Software has published alarming numbers and deemed Log4Shell a “cyber pandemic.” Just seventy-two hours after the official disclosure, there were over 800,000 detected attacks and 60 variations on the original exploit according to Check Point. It’s been estimated that over half of all national corporations have been affected in one way or another, and it’s unlikely that the full extent of the damages will be known any time soon. And given the slowly turning wheel that is vulnerability mitigation, it seems likely that this vulnerability is going to stick around. Anyone remember Equifax and Apache Struts?

How to Mitigate Log4Shell

A number of different methods have sprung up in the last few days. Some of which promise permanent mitigation and others that act only as stopgap measures. A number of different techniques can be found on the LunaSec blog post concerning Log4Shell. Apache has also released two new versions of Log4j that disable access to the Java Naming and Directory Interface and require non-local hosts to be explicitly allowed.

If you are a TOPIA user, you have the power to remotely and efficiently patch to the newest version of Log4j or run mitigation scripts on all assets that are under the TOPIA umbrella.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About vRx
vRx is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.