Apache Log4j2 Vulnerability

Internet Security Alert: Apache Log4j 2 Remote Code Execution Vulnerability

Summary

Recently, the Sangfor Security Team detected information about a Remote Code Execution Vulnerability in a Apache Log4j2 component, which was classified as high. The vulnerability is caused by Apache Log4j2 recursive analysis function. Attackers can use this vulnerability to construct malicious data for remote code execution attacks without authorization, and finally obtain the highest authority of the server.

This is a high level security alert. Sangfor team interviewed Jason Yuan, VP – Product & Marketing, Sangfor Technologies to discuss about Apache Log4j vulnerability and to get easy understanding. He also mentioned about Sangfor Emergency Incident Response and mitigation methods incase if you are affected.

Event Level

Level 3

Sangfor Solution

Please visit Vulnerability Wiki on Sangfor Security Center for solutions: https://sec.sangfor.com/security-vulnerability/detail?vuln_sfv=SF_2021_23893&lang=EN-US

Official Solution

Currently, the vendor had fixed this vulnerability in latest version. The official link is as follows:

https://github.com/apache/logging-log4j2/releases/tag/log4j-2.15.0-rc1

Affected Product Line

Products using Apache Log4j2 should be evaluated immediately.

 

Contact Us for Business Inquiry

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

Cyber Security

The AT&T Data Breach: Over 73 Million Customer Data Exposed

Date : 15 Apr 2024
Read Now
Cyber Security

What Are the Top 5 Benefits of SD-WAN?

Date : 29 Mar 2024
Read Now
Cyber Security

World Backup Day 2024: Save Digital Memories

Date : 29 Mar 2024
Read Now

See Other Product

Platform-X
Sangfor Access Secure
Sangfor SSL VPN
Nano Cloud
Best Darktrace Cyber Security Competitors and Alternatives in 2024
Sangfor Omni-Command