{"id":3094,"date":"2021-12-15T14:54:39","date_gmt":"2021-12-15T14:54:39","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3094"},"modified":"2021-12-15T15:05:03","modified_gmt":"2021-12-15T15:05:03","slug":"making-sense-of-the-log4j-vulnerability","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/","title":{"rendered":"Making Sense of The Log4j Vulnerability"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability. On December 9<sup>th<\/sup>, 2021, the Log4j vulnerability was publicly disclosed following a month of remediation work by the affected vendor. This new vulnerability is in the Apache Log4j library, hence the name. The official name of the vulnerability is <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a> and has received a <a href=\"https:\/\/securityaffairs.co\/wordpress\/125480\/hacking\/log4j-java-library-zeroday.html?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=log4j-java-library-zeroday\" target=\"_blank\" rel=\"noopener\">CVSSv3 score of 10\/10<\/a> because of its ease of exploitation.<\/p>\n<p>What is the Log4j vulnerability? Who does it affect and why is it being called <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/dec\/10\/software-flaw-most-critical-vulnerability-log-4-shell\" target=\"_blank\" rel=\"noopener\">the most significant vulnerability in the last decade<\/a>?<\/p>\n<h2>What is the Log4j vulnerability?<\/h2>\n<p>Log4j is an add-on Apache library. Log4j is very popular among application developers because it is considered one of the easiest and most robust libraries for performing logging &#8211; which end-user did what, when, how, where from, etc.<\/p>\n<p>The vulnerability\u2014affecting versions 2.0-beta9 to 2.14.1 of the library\u2014exists in the action the Java Naming and Directory Interface (JNDI) takes to resolve variables. According to the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">vulnerability description<\/a>, affected versions of Log4j contain JNDI features\u2014such as message lookup substitution\u2014that &#8220;do not protect against adversary-controlled LDAP [Lightweight Directory Access Protocol] and other JNDI related endpoints.&#8221;<\/p>\n<p>The cloud security team at Alibaba discovered the vulnerability in November 2021 and told Apache. They worked together to ensure a fix was available before the public release of the vulnerability details.<\/p>\n<p>FC <a href=\"https:\/\/www.cygenta.co.uk\/post\/log4shell-in-simple-terms\" target=\"_blank\" rel=\"noopener\">explains in a blog for Cygenta<\/a>: \u201cWhat the Alibaba team discovered is a flaw in the way that Log4j works. The purpose of a logger is to record things; generally, the logger just takes what happens and writes it down. However, what Log4j does is that it uses variables to fill in some data, say the time or date which can be injected into the log command. This use of a variable is something all programming uses, but it must be done carefully especially if it takes in data from an end-user (a possible attacker!).\u201d<\/p>\n<p>CISA noted in their <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\" rel=\"noopener\">advisory bulletin<\/a> that \u201cAn adversary can exploit this vulnerability by submitting a specially crafted request to a vulnerable system that causes that system to execute arbitrary code. The request allows the adversary to take full control over the system. The adversary can then steal information, launch ransomware, or conduct other malicious activity.\u201d<\/p>\n<p>FC provides a <a href=\"https:\/\/www.cygenta.co.uk\/post\/log4shell-in-simple-terms\" target=\"_blank\" rel=\"noopener\">more technical view<\/a> of the potential attack exploiting the vulnerability:<\/p>\n<ul>\n<li>The attacker injects JNDI lookup into a field that is likely to be logged e.g. User-Agent.<\/li>\n<li>The string is passed to Log4j for logging<\/li>\n<li>Log4j sees the string and queries a malicious LDAP server under attacker control<\/li>\n<li>The LDAP server responds with malicious code<\/li>\n<li>Log4j runs the malicious code<\/li>\n<\/ul>\n<h2>Why is this a scary vulnerability?<\/h2>\n<p>The Log4j vulnerability is so scary resulting in the internet panicking because the affected library is so prevalent. Log4j has become the most popular logging framework in the Java ecosystem and gets used by millions of applications.<\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/analysis\/application-security\/steam-apple-icloud-and-minecraft-vulnerable-to-largest-java-vulnerability-seen-in-years\" target=\"_blank\" rel=\"noopener\">Steam, Apple iCloud, and Minecraft<\/a> are among the applications affected by the vulnerability. Open-source projects like ElasticSearch, Elastic Logstash, Redis, and the NSA\u2019s Ghidra <a href=\"https:\/\/securityaffairs.co\/wordpress\/125480\/hacking\/log4j-java-library-zeroday.html?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=log4j-java-library-zeroday\" target=\"_blank\" rel=\"noopener\">also use the library<\/a>. And the list goes on. CISA has published on its <a href=\"https:\/\/github.com\/cisagov\/log4j-affected-db\" target=\"_blank\" rel=\"noopener\">GitHub repository a list of the affected vendors<\/a>. According to <a href=\"https:\/\/grahamcluley.com\/log4shell\/\" target=\"_blank\" rel=\"noopener\">Graham Cluley<\/a>, \u201cIn fact, over 250 vendors have already issued security advisories and bulletins about how Log4Shell impacts their products.\u201d<\/p>\n<p><em>\u201cAn attacker can use this vulnerability to construct a special data request packet, which eventually triggers remote code execution. Due to the wide range of impact of this vulnerability, users are advised to investigate related vulnerabilities on time.\u201d reads the <\/em><a href=\"https:\/\/www.cyberkendra.com\/2021\/12\/worst-log4j-rce-zeroday-dropped-on.html\" target=\"_blank\" rel=\"noopener\">blog<\/a><em> published by the Alibaba Cloud security team. \u201cAfter analysis and confirmation by the White Hat Security Research Institute, there are currently many popular systems on the market that are affected. Almost every tech giant is the victim of this Log4j Remote Code Execution vulnerability.\u201d<\/em><\/p>\n<p>Within hours of the disclosure,<a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-attackers-are-making-thousands-of-attempts-to-exploit-this-severe-vulnerability\/\" target=\"_blank\" rel=\"noopener\"> cyber attackers were already making hundreds of thousands of attempts<\/a> to exploit the critical Log4j vulnerability to spread malware and access networks. \u201cGiven the scale of affected devices and exploitability of the bug, it\u2019s highly likely to attract considerable attention from both cybercriminals and nation-state-associated actors,\u201d said Chris Morgan, senior cyber threat intelligence analyst at Digital Shadows. \u201cOrganizations are advised to update to version 2.15.0 and place additional vigilance on logs associated with susceptible applications.\u201d<\/p>\n<h2>Will this vulnerability impact Critical National Infrastructure?<\/h2>\n<p>Cybersecurity researchers have warned that it could have significant implications for operational technology (OT) networks that control industrial systems \u2013 <a href=\"https:\/\/www.zdnet.com\/article\/log4j-update-experts-say-log4shell-exploits-will-persist-for-months-if-not-years\/\" target=\"_blank\" rel=\"noopener\">and for a long time<\/a>.<\/p>\n<p>&#8220;Given that Log4j has been a ubiquitous logging solution for Enterprise Java development for decades, Log4j has the potential to become a vulnerability that will persist within Industrial Control Systems (ICS) environments for years to come,&#8221; <a href=\"https:\/\/www.dragos.com\/blog\/industry-news\/implications-of-log4j-vulnerability-for-ot-networks\/\" target=\"_blank\" rel=\"noopener\">said a blog post<\/a> by cybersecurity researchers at Dragos.<\/p>\n<p>To help their industrial customers, <a href=\"https:\/\/www.nozominetworks.com\/blog\/critical-log4shell-apache-log4j-zero-day-attack-analysis\/\" target=\"_blank\" rel=\"noopener\">Nozomi Networks<\/a> has provided an analysis of the vulnerability and has \u201cset up a honeypot to monitor the situation and became aware of all potential global scans and exploitation attempts.\u201d<\/p>\n<p>&#8220;Dragos recommends all industrial environments update all affected applications where possible based on vendor guidance immediately and employ monitoring that may catch exploitation and post-exploitation behaviors,&#8221; <a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-could-be-a-problem-for-industrial-networks-for-years-to-come\/\" target=\"_blank\" rel=\"noopener\">advises<\/a> Sergio Caltagirone, vice president of threat intelligence at Dragos.<\/p>\n<p>Researchers suggest that <a href=\"https:\/\/github.com\/apache\/logging-log4j2\/pull\/608\" target=\"_blank\" rel=\"noopener\">applying the Log4j patch<\/a> can help prevent attackers from taking advantage of the vulnerability \u2013 although the ubiquitous nature of Log4j means that in some cases, network operators might not even be aware that it&#8217;s something in their environment which they have to think about.<\/p>\n<h2>What should organizations do?<\/h2>\n<p>CISA has provided a <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\" rel=\"noopener\">comprehensive list of actions<\/a> that all organizations must take to mitigate the vulnerability.<\/p>\n<ol>\n<li><strong>Review Apache\u2019s <\/strong><a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\" target=\"_blank\" rel=\"noopener\"><strong>Log4j Security Vulnerabilities page<\/strong><\/a> for additional information and, if appropriate, apply the provided workaround<\/li>\n<li><strong>Apply available patches immediately<\/strong>. Prioritize patching, starting with mission-critical systems, internet-facing systems, and networked servers. Then prioritize patching other affected information technology and operational technology assets.<\/li>\n<li><strong>Conduct a security review<\/strong> to determine if there is a security concern or compromise. The log files for any services using affected Log4j versions will contain user-controlled strings.<\/li>\n<\/ol>\n<p>Log4j vulnerability is just another example of a case where you need to have a robust, ready-for-action team that can handle any <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">unpredictable threats on your premises<\/a>. If you&#8217;re looking to <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\" target=\"_blank\" rel=\"noopener\">assess or reinforce your security posture<\/a>, don&#8217;t hesitate to <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">contact<\/a> ITEGRITI.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability.<\/p>\n","protected":false},"author":10,"featured_media":3096,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Making Sense of The Log4j Vulnerability - kw022024<\/title>\n<meta name=\"description\" content=\"Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making Sense of The Log4j Vulnerability\" \/>\n<meta property=\"og:description\" content=\"Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-15T14:54:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-15T15:05:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Making Sense of The Log4j Vulnerability\",\"datePublished\":\"2021-12-15T14:54:39+00:00\",\"dateModified\":\"2021-12-15T15:05:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/\"},\"wordCount\":1345,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/\",\"name\":\"Making Sense of The Log4j Vulnerability - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg\",\"datePublished\":\"2021-12-15T14:54:39+00:00\",\"dateModified\":\"2021-12-15T15:05:03+00:00\",\"description\":\"Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Making Sense of The Log4j Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Making Sense of The Log4j Vulnerability - kw022024","description":"Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Making Sense of The Log4j Vulnerability","og_description":"Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-12-15T14:54:39+00:00","article_modified_time":"2021-12-15T15:05:03+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Making Sense of The Log4j Vulnerability","datePublished":"2021-12-15T14:54:39+00:00","dateModified":"2021-12-15T15:05:03+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/"},"wordCount":1345,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg","articleSection":["Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/","name":"Making Sense of The Log4j Vulnerability - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg","datePublished":"2021-12-15T14:54:39+00:00","dateModified":"2021-12-15T15:05:03+00:00","description":"Vulnerabilities are being discovered every single day. While most of the vulnerabilities are not so serious, there are some that deserve our full attention. Such is the case with the Log4j vulnerability.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/12\/itegriti_log4j_vulnerability.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/making-sense-of-the-log4j-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Making Sense of The Log4j Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3094"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3094"}],"version-history":[{"count":2,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3094\/revisions"}],"predecessor-version":[{"id":3097,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3094\/revisions\/3097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3096"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}