Wednesday, April 29, 2026
HomeCloud ComputingLog4j Developer Response - Cisco Blogs

Log4j Developer Response – Cisco Blogs

[ad_1]

As builders, we’re all waking as much as discover a newly found zero-day vulnerability (CVE-2021-44228) within the Apache Log4j library. If exploited, the vulnerability permits attackers to realize full management of affected servers and your utility. Like many builders, you’re most likely scrambling to determine what techniques are affected and learn how to repair or patch this vulnerability.

And to make your job much more tough, Log4j is so extensively used that you could be not even notice the place in your techniques it’s getting used. Many suppose that this Log4j vulnerability solely impacts your Java code. Sadly, this isn’t true. Log4j is a key element of many business and open-source options together with Apache Solr, Apache Struts2, Apache Fink, Apache Druid, Apache Kafka, Elasticsearch, and lots of extra.

Your problem now’s to comprise the specter of exploitation as shortly as doable. There are a couple of key issues you are able to do as a developer.

First, categorize your actions into three important environments:

  1. Growth
  2. Take a look at
  3. Manufacturing

Growth is straightforward. Simply be sure that to find all utilization of Log4j 2.0-beta9 to 2.14.1 and improve to 2.15.0, which has the repair for this vulnerability. Replace the library in your mission and recompile. If updating the library requires any refactoring of your utility that may take too lengthy, you should buy a while by altering the runtime surroundings to stop exploits from working.

  • In releases >=2.10, the susceptible habits could be mitigated by setting both the system property log4j2.formatMsgNoLookups or the surroundings variable LOG4J_FORMAT_MSG_NO_LOOKUPS to true.
  • For releases from 2.0-beta9 to 2.10.0, the mitigation is to take away the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class.

Your check surroundings is sort of as easy. Simply add the additional step of pushing the up to date code to a check surroundings the place your common automated and handbook testing could be executed.

Manufacturing is the place it will get somewhat trickier. As I’m positive you’re already involved about, these code adjustments might have an effect on your techniques and enterprise. Some facets to contemplate:

  1. How will any downtime have an effect on your prospects and your corporation? What workarounds are you able to shortly provide to mitigate this downtime?
  2. What’s the impact of the repair? Do different techniques combine with this method? Does the affected system have an API that different techniques name? Will the patch probably trigger cascading defects? You want satisfactory time to completely check.
  3. What different techniques in your group might need this vulnerability? How will you monitor these down and check them?

Discovering, fixing, and testing all of the affected techniques might take days. Within the meantime, that you must shield your self now. Fortunately there are some readily-available options that may assist. These options assist discover the place the OSS vulnerability exists in your manufacturing surroundings in addition to mitigate the danger of the exploitation till the susceptible library could be upgraded. Choices for fast mitigation differ relying in your surroundings. One such answer is AppDynamics with Cisco Safe Software, which is built-in into AppDynamics Java APM brokers.

Cisco Safe Software protects your manufacturing surroundings by:

  1. Figuring out what libraries your code is definitely utilizing in runtime
  2. Detecting the vulnerabilities in these libraries
  3. Detecting assaults whereas monitoring runtime habits
  4. Defending techniques with coverage to dam runtime exploit habits

The primary, most essential motion to take is to seek out out the place this vulnerability is introducing threat into your manufacturing surroundings. Cisco Safe Software tracks all library utilization and the accompanying vulnerabilities.

Figure 1 - Detect vulnerability
Determine 1 – Detect vulnerability

This distant code execution vulnerability permits the attacker to run any code in your utility, which might end in any variety of malicious runtime behaviors. One of many scariest of these is shell command execution that would permit for full management of not solely your utility, however the underlying workload.

Cisco Safe Software will detect this shell command execution out of the field. It will also be configured to cease the command from executing in addition to ship occasions to your safety workforce for additional investigation.

Figure 2 - Detect and block attack
Determine 2 – Detect and block assault

Nevertheless, this gained’t take away all the danger, so guarantee you could have plans to repair this vulnerability as quickly as doable. Assessment the small print at Log4j’s safety disclosure.

Discover extra info on how AppDynamics with Cisco Safe Software gives full-stack utility safety that may assist shield you from this and different vulnerabilities.

References


We’d love to listen to what you suppose. Ask a query or go away a remark beneath.
And keep linked with Cisco DevNet on social!

Twitter @CiscoDevNet | Fb | LinkedIn

Go to the brand new Developer Video Channel

Share:



[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments