Rewterz Threat Alert – Oski Data Stealer Malware – Active IOCs
December 10, 2021Rewterz Threat Alert – Emotet changes its Tactic to Deploy Cobalt Strike directly – Active IOCs
December 10, 2021Rewterz Threat Alert – Oski Data Stealer Malware – Active IOCs
December 10, 2021Rewterz Threat Alert – Emotet changes its Tactic to Deploy Cobalt Strike directly – Active IOCs
December 10, 2021Severity
Medium
Analysis Summary
Widely used in both enterprise apps and cloud services, Log4j is a popular (Java logging library) developed by Apache foundation. Proof of concept exploits are being shared online with mass scanning activities detected exposing home users and enterprises alike leading to remote code execution attacks.
CVE-2021-44228
Apache could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the Java logging library. By sending a specially-crafted string value, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Remote Code Execution
Affected Vendors
Apache
Affected Products
- Apache log4j versions between version 2.0 and 2.14.1 are vulnerable.
Remediation
Upgrade your log4j versions to log4j-2.15.0-rc1.
Further information can be found at LunaSec: https://www.lunasec.io/docs/blog/log4j-zero-day/