1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-13 04:17:54 +00:00
log4j-affected-db/README.md

91 lines
4.9 KiB
Markdown
Raw Normal View History

# CISA Log4j (CVE-2021-44228) Vulnerability Guidance #
2021-12-20 14:23:16 +00:00
This repository provides
[CISA's guidance](https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance)
and an overview of related software regarding the Log4j vulnerability
2021-12-29 21:18:03 +00:00
(CVE-2021-44228). CISA urges users and administrators to upgrade to Log4j 2.17.1
(Java 8), 2.12.4 (Java 7) and 2.3.2 (Java 6), and review and monitor the
[Apache Log4j Security Vulnerabilities webpage](https://logging.apache.org/log4j/2.x/security.html)
for updates and mitigation guidance.
2021-12-17 11:18:00 +00:00
The information in this repository is provided "as is" for informational
purposes only and is being assembled and updated by CISA through
collaboration with the broader cybersecurity community. Inquire with the
manufacturer or their respective online resources for the most up-to-date
information regarding any specific product listed. CISA does not endorse
any commercial product or service, including any subjects of analysis.
Any reference to specific commercial products, processes, or services by
service mark, trademark, manufacturer, or otherwise, does not constitute
2021-12-17 11:16:44 +00:00
or imply their endorsement, recommendation, or favoring by CISA.
## Official CISA Guidance & Resources ##
- [CISA Apache Log4j Vulnerability Guidance](https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance)
2021-12-23 21:08:04 +00:00
- [CISA ED 22-02: Apache Log4j Recommended Mitigation Measures](https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures)
- [CISA ALERT (AA21-356A): Mitigating Log4Shell and Other Log4j-Related Vulnerabilities](https://www.cisa.gov/uscert/ncas/alerts/aa21-356a)
2021-12-20 14:11:39 +00:00
- [Emergency Directive 22-02 Mitigate Apache Log4j Vulnerability](https://www.cisa.gov/emergency-directive-22-02)
- [Statement from CISA Director Easterly on “Log4j” Vulnerability](https://www.cisa.gov/news/2021/12/11/statement-cisa-director-easterly-log4j-vulnerability).
## CISA Current Activity Alerts ##
2021-12-22 15:24:50 +00:00
- [Mitigating Log4Shell and Other Log4j-Related Vulnerabilities](https://www.cisa.gov/uscert/ncas/current-activity/2021/12/22/mitigating-log4shell-and-other-log4j-related-vulnerabilities)
2021-12-20 14:11:39 +00:00
- [CISA Issues ED 22-02 Directing Federal Agencies to Mitigate Apache Log4j Vulnerabilities](https://www.cisa.gov/uscert/ncas/current-activity/2021/12/17/cisa-issues-ed-22-02-directing-federal-agencies-mitigate-apache)
- [Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation](https://www.cisa.gov/uscert/ncas/current-activity/2021/12/10/apache-releases-log4j-version-2150-address-critical-rce)
- [CISA Creates Webpage for Apache Log4j Vulnerability CVE-2021-44228](https://www.cisa.gov/uscert/ncas/current-activity/2021/12/13/cisa-creates-webpage-apache-log4j-vulnerability-cve-2021-44228)
2021-12-13 15:27:47 +00:00
National Vulnerability Database (NVD) Information: [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228)
2021-12-29 21:18:03 +00:00
## CISA Mitigation Guidance ##
2021-12-15 19:10:32 +00:00
2021-12-23 21:24:27 +00:00
When updates are available, agencies must update software
using Log4j to the newest version, which is the most
effective and manageable long-term option. Where
updating is not possible, the following mitigating
measures can be considered as a temporary solution
2021-12-23 21:20:28 +00:00
and apply to the entire solution stack.
2021-12-23 21:24:27 +00:00
- **Disable Log4j library.** Disabling software using the
Log4j library is an effective measure, favoring
controlled downtime over adversary-caused issues.
This option could cause operational impacts and limit
2021-12-23 21:20:28 +00:00
visibility into other issues.
2021-12-23 21:24:27 +00:00
- **Disable JNDI lookups or disable remote codebases.**
This option, while effective, may involve
2021-12-23 21:13:02 +00:00
developer work and could impact functionality.
2021-12-23 21:24:27 +00:00
- **Disconnect affected stacks.** Solution stacks not
connected to agency networks pose a dramatically
lower risk from attack. Consider temporarily
2021-12-23 21:20:28 +00:00
disconnecting the stack from agency networks.
2021-12-23 21:24:27 +00:00
- **Isolate the system.** Create a “vulnerable network”
VLAN and segment the solution stack from the
2021-12-23 21:13:02 +00:00
rest of the enterprise network.
2021-12-23 21:24:27 +00:00
- **Deploy a properly configured Web Application
Firewall (WAF) in front of the solution stack.**
Deploying a WAF is an important, but incomplete,
solution. While threat actors will be able to
bypass this mitigation, the reduction in alerting
will allow an agency SOC to focus on a smaller
2021-12-23 21:13:02 +00:00
set of alerts.
2021-12-23 21:24:27 +00:00
- **Apply micropatch.** There are several micropatches
available. They are not a part of the official
2021-12-23 21:20:28 +00:00
update but may limit agency risk.
2021-12-23 21:24:27 +00:00
- Report incidents promptly to CISA and/or the FBI
2021-12-23 21:20:28 +00:00
[here](https://www.cisa.gov/uscert/report).
2021-12-23 21:22:22 +00:00
For more information regarding CISA recommended mitigation measures please visit
2021-12-23 21:13:02 +00:00
[here](https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures).
## Contributing ##
We welcome contributions! Please see [`CONTRIBUTING.md`](CONTRIBUTING.md) for
details.
### Creating a pull request ###
Instructions for creating a pull request using the GitHub Web UI can be found
in [`PULL-EXAMPLE.md`](PULL-EXAMPLE.md).
## Software List ##
2021-12-14 12:50:56 +00:00
2021-12-21 22:47:13 +00:00
To view the full list of vendors & software [click here](./SOFTWARE-LIST.md).