• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa, fbi and nsa publish joint advisory and scanner for

CISA, FBI and NSA Publish Joint Advisory and Scanner for Log4j Vulnerabilities

You are here: Home / General Cyber Security News / CISA, FBI and NSA Publish Joint Advisory and Scanner for Log4j Vulnerabilities
December 23, 2021

Cybersecurity companies from Australia, Canada, New Zealand, the U.S., and the U.K. on Wednesday introduced a joint advisory in reaction to common exploitation of many vulnerabilities in Apache’s Log4j software package library by nefarious adversaries.

“These vulnerabilities, specifically Log4Shell, are serious,” the intelligence companies claimed in the new guidance. “Subtle cyber risk actors are actively scanning networks to most likely exploit Log4Shell, CVE-2021-45046, and CVE-2021-45105 in susceptible methods. These vulnerabilities are likely to be exploited more than an extended period.”

Automatic GitHub Backups

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


An attacker can exploit Log4Shell (CVE-2021-44228) by publishing a specifically crafted ask for to a vulnerable system that will cause that system to execute arbitrary code. CVE-2021-45046, on the other hand, permits for distant code execution in sure non-default configurations, when CVE-2021-45105 could be leveraged by a distant attacker to cause a denial-of-support (DoS) problem.

Since the vulnerabilities became community understanding this month, unpatched servers have occur below siege from ransomware groups to country-state hackers, who have utilized the attack vector as a conduit to achieve access to networks to deploy Cobalt Strike beacons, cryptominers, and botnet malware.

The U.S. Federal Bureau of Investigation’s (FBI) assessment of the attacks has also raised the possibility that risk actors are incorporating the flaws into “present cyber criminal techniques that are searching to adopt increasingly refined obfuscation techniques.” In light-weight of the severity of the vulnerabilities and very likely elevated exploitation, companies are getting urged to determine, mitigate, and update impacted assets as before long as probable.

Prevent Data Breaches

To that stop, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also unveiled a scanner utility to identify devices vulnerable to the Log4Shell vulnerability, mirroring a identical device produced by the CERT Coordination Centre (CERT/CC).

The most current step taken by the governments comes as the Apache Application Foundation (ASF) introduced updates for Apache HTTP Server 2.4.51 to handle two flaws — CVE-2021-44790 (CVSS rating: 9.8) and CVE-2021-44224 (CVSS score: 8.2) — the former of which could be weaponized by a remote attacker to execute arbitrary code and take control of an influenced technique.

Uncovered this posting attention-grabbing? Observe THN on Fb, Twitter  and LinkedIn to go through additional unique material we article.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «iot safe — an innovative way to secure iot IoT SAFE — An Innovative Way to Secure IoT
Next Post: Alibaba Suffers Government Crackdown Over Log4j Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message
  • Ransomware Attacks Increasing at “Alarming” Rate
  • Senate Report: US Government Lacks Comprehensive Data on Ransomware
  • Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys
  • Fronton IOT Botnet Packs Disinformation Punch
  • SIM-based Authentication Aims to Transform Device Binding Security to End Phishing
  • New Chaos Ransomware Builder Variant “Yashma” Discovered in the Wild
  • Open source packages with millions of installs hacked to harvest AWS credentials
  • DOE ‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌funds‌ ‌development of Qunnect’s Quantum Repeater
  • Cabinet Office Reports 800 Missing Electronic Devices in Three Years

Copyright © TheCyberSecurity.News, All Rights Reserved.