Apache.Log4j.Error.Log.Configuration.File.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Apache Log4j.
The vulnerability is due to insecure loading of external configuration in the application. A remote attacker with permission to modify the logging configuration file may be able to exploit this to execute arbitrary code within the context of the application, via a crafted configuration file.

description-logoOutbreak Alert

A 0-day exploit was discovered on a popular Java library Log4j2 that can result to a Remote Code Execution (RCE). This is a widely deployed library, and while systems protected by Fortinet Security Fabric are secured by the protections below, all systems need to upgrade ASAP as this is 10.0 severity. Due to the high visibility and attention, subsequent vulnerabilities have since emerged

View the full Outbreak Alert Report

affected-products-logoAffected Products

Apache Log4j before version 2.17.1

Impact logoImpact

System Compromise: Remote attacker can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor
https://logging.apache.org/log4j/2.x/security.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2022-01-25 19.247 Sig Added
2022-01-12 19.238 Sig Added
2022-01-05 19.234 Default_action:pass:drop
2021-12-29 19.231