Apache.Log4j.SocketServer.Insecure.Deserialization
Description
This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Apache Software Foundation Log4j.
The vulnerability is due to deserialization of untrusted data while having a vulnerable version of the JRE library. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted serialized object. Successful exploitation can result in arbitrary code execution with privileges of the user running the application.
Affected Products
Apache Software Foundation Log4j 1.2 to 1.2.17
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |