This site uses cookies to enhance your experience.  By continuing to visit this website, you consent to the use of these cookies. Click here to learn more about our privacy policy.

Sanfor Technologies Blog Background Image

Apache Log4j 2 Remote Code Execution Vulnerability

Apache Log4j2 Vulnerability

Internet Security Alert: Apache Log4j 2 Remote Code Execution Vulnerability


Recently, the Sangfor Security Team detected information about a Remote Code Execution Vulnerability in a Apache Log4j2 component, which was classified as high. The vulnerability is caused by Apache Log4j2 recursive analysis function. Attackers can use this vulnerability to construct malicious data for remote code execution attacks without authorization, and finally obtain the highest authority of the server.

This is a high level security alert. Sangfor team interviewed Jason Yuan, VP – Product & Marketing, Sangfor Technologies to discuss about Apache Log4j vulnerability and to get easy understanding. He also mentioned about Sangfor Emergency Incident Response and mitigation methods incase if you are affected.

Event Level

Level 3

Sangfor Solution

Please visit Vulnerability Wiki on Sangfor Security Center for solutions:

Official Solution

Currently, the vendor had fixed this vulnerability in latest version. The official link is as follows:

Affected Product Line

Products using Apache Log4j2 should be evaluated immediately.