Thursday, 16 December 2021

Experts warn the vulnerability in Log4j can lead to the disclosure of sensitive data.

Experts say that the Log4j vulnerability, also known as the Log4Shell issue (CVE-2021-45046), could enable for the exfiltration of sensitive data in some scenarios. Simply put, the vulnerability might allow thieves to steal data or remove data from a device without permission.


tech-gyan

Given the "ubiquitous" prevalence of the Log4j logging library, the Log4j or Log4Shell vulnerability was highlighted last Friday and is considered a major weakness, possibly one of the worst. This is an open-source logging package that practically every major Java-based enterprise software and server in the industry uses. A logging library is used to keep track of all of an application's activities.


By introducing a string of code into the library, any hacker or cybercriminal can obtain control of and run 'arbitrary code,' as well as gain access to a computer system. Researchers at Alibaba were the first to notice the problem, and Microsoft's Minecraft soon followed with a statement stating that they, too, were affected. According to researchers, the issue affects a wide range of businesses and web services, including Apple's iCloud and Google Cloud products, among others. According to researchers, exploits for this weakness already exist and are being utilised in cryptocurrency mining frauds.


According to cybersecurity firm Praetorian, the vulnerability might lead to data theft, and they've informed the Apache Foundation, which manages the Log4j library, about the problem. All clients using Log4j versions 2.15.0 and lower should upgrade to 2.16.0 as soon as feasible, according to the company.


The cybersecurity firm has only provided a video depicting the data exfiltration, claiming that sharing technical information would "only complicate things."


Meanwhile, other companies claim that exploits based on Log4j are on the rise. "The entire Internet is being scanned at the moment — at least two botnets are searching for unpatched vulnerabilities, and we'll be seeing more in the coming days," Kevin Reed, CEO of Singapore-based cybersecurity firm Acronis CISO, stated. Prior to Friday, we identified exploitation attempts in the single digits; but, during the weekend, we witnessed a 300-fold increase worldwide. It's difficult to identify which of those are targeted exploitations — they're unlikely to be traced at the time."


Candid Wuest, Acronis VP of Cyber Protection Research, compared the vulnerability to EternalBlue, which was used by WannaCry ransomware, and said that "the Log4shell vulnerability in Log4j is definitely in the top-5 most severe vulnerabilities of the last decade, one that allows for remote code execution (RCE)," and that it will take longer to patch because it is "not just one vulnerable software that can be updated, but rather a library that's included in many applications, resulting


He also predicted that the attacks will result in an increase in fresh data breaches. "Affected software such as VMWare, WebEx, and PulseSecure VPN might cause downtime and interruption while mitigations are implemented. Because the vulnerability has been exploited for days, security teams must investigate whether they have been infiltrated and whether attackers have installed any backdoors," he added.

No comments:

Post a Comment