Log4j: Meet the new zero-day, same as the old zero-day

Post Summary
The Log4j vulnerability, discovered in December 2021, is a critical flaw in the Apache Log4j 2 Java logging library that allows attackers to execute arbitrary code on vulnerable systems.
Systems and services using Apache Log4j 2 versions between 2.0-beta9 and 2.14.1 are affected, including popular frameworks like Apache Struts2 and many third-party apps.
Organizations should: • Update to Log4j 2 version 2.17.0 or later. • Use a web application firewall (WAF) with auto-updating rules. • Monitor alerts and ensure a robust incident management process.
Vendors must assess their products, communicate remediation status to customers, and confirm updates or mitigations for any downstream or third-party products.
Censinet RiskOps tracks vendor and product statuses, prioritizes risks, and provides actionable insights for mitigating vulnerabilities across healthcare organizations.
What is the Log4j issue?
The Apache Log4j 2 utility is a commonly used service component for logging requests for audit and review purposes. Log4J, written in Java, supports many projects, including multiple cloud services and various open-source and commercial enterprise products.
On December 9, 2021, a vulnerability was reported that could allow a system running Apache Log4j version 2.15 or below to be compromised, allowing an attacker to execute arbitrary code on the vulnerable host. For example, an attacker could include the exploit string as a user agent in an HTTP request. If the web application logs the user string using Log4j, Log4j can be exploited to connect with the attacker’s server, downloading additional code that the service will execute. Here is a detailed image that lays out the threat and compensating controls:

The Cybersecurity and Infrastructure Security Agency (CISA) has indicated that all critical infrastructure operators patch or remediate this vulnerability immediately. Censinet is actively following the security vulnerabilities in the open-source Apache “Log4j 2″ utility (CVE-2021-44228 and CVE-2021-45046)
Who is Affected by this issue?
Systems and services that use the Java logging library, Apache Log4j 2 between versions 2.0-beta9 and 2.14.1, are all affected. Log4j 2 is built into popular frameworks, including Apache Struts2 and others. As this library is widely adopted, many third-party apps are likely vulnerable, revealing a vast attack surface.
The Apache Foundation has released Log4j 2 Version 2.17.0 to address the vulnerability. Users and administrators are prompted to review the Apache Log4j 2 2.17.0 Announcement , upgrade to Log4j 2 version 2.17.0 or greater, or apply the recommended mitigations immediately.
CISA further recommends asset owners take three additional, immediate steps regarding this vulnerability:
- Enumerate any external-facing devices that have Log4j 2 installed.
- Ensure that your security operations center (SOC) is actioning every alert on the devices that fall into the category above.
- Install a web application firewall (WAF) with rules that automatically update so that your SOC can concentrate on fewer alerts.
How should we address this now and well into the future?
This vulnerability is not a new phenomenon, as zero-day exploits have become the norm. The relatively easy-to-use open source community is prevalent across many third-party applications. As such, Log4j is included in many packages and distributions, meaning you’re going to have to work to make sure that it’s updated everywhere. The most immediate focus area should be any externally facing entry point, particularly where embedded and you’re reliant on a third-party or downstream source’s update.
For Vendors
Vendors must assess the vulnerability’s potential impact on any third-party or downstream products and services that they use or embed within their products and services. Healthcare providers are asking their third-party vendors if they are exposed to this vulnerability and assess the risk of using third-party products supplied to them, whether for clinical or business operations. You should continually communicate with your customers to inform them of the status of your mitigation and remediation efforts. Do this even if it’s just to let them know that you’re awaiting patching confirmation from your downstream vendors and will be executing your validation steps to confirm remediation. Equally, it is vital to communicate that an assessment has been done and no problems exist.
For Healthcare Delivery Organizations
If you have an asset inventory of your products and services:
- Reach out to those downstream vendors
- Identify who is responsible for remediating this vulnerability
- Ask them to provide the current status to address this vulnerability.
- Determine if they updated to the latest Log4j version
- Find out if the remediated version is the one you consume, whether in the cloud or on-premises
What’s the long-term response to these types of situations?
This response comes down to following your Incident Management process – analyze and research, contain, eradicate and escalate to internal parties and stakeholders. Distill feedback and learnings from the process into your incident management playbook for this type of widespread and complex vulnerability. Staying on top of these types of risks requires you to maintain an asset inventory and identify those 3rd party applications, services, and devices that have the potential to be affected – think cloud vendors, data exchange vendors, on-premises software, and hardware that logs events, etc. Build your list of potential vendor/product threat vectors and research if they’ve either made public statements or direct communications to their customers to indicate what steps they’re taking to mitigate and remediate the issue.
This process becomes the foundation for your risk management program, a dynamic process that’s not set it and forget it! Assess your vendors regularly to ascertain risk-based insights into the potential for exposure to these types of vulnerabilities. Does this vendor/product have network access? Who’s using it? Is sensitive data involved like PHI? Is this a mission-critical product or service embedded in your clinical workflows or business operations? Then prioritize which 3rd parties you should address first.
The Censinet Response
Censinet can track Log4j status directly in our Censinet RiskOps platform for every third-party vendor product assessment through our vendor data and access capture forms. With Censinet, you have an electronic inventory of all third-party vendors and products, which you can quickly use to identify a prioritized target list.
You can also indicate if a product has Log4j, is impacted by the vulnerability, and the status of any necessary actions using a curated list of mitigations and remediations from across our network. Additionally, you can track common mitigations such as Network Isolation so that you can return in the future to complete the remediation of systems you previously isolated.
All of this information is then available for reporting across the platform by simply identifying Log4j impacted vendors using filtering criteria such as “contains PHI” or “has access to our network.” You can then determine whether the vulnerability has been fully remediated or mitigated by additional controls that give you actionable information and insights.
Where do we go from here?
Cybersecurity professionals clearly need to work more closely with application developers to understand better what open source components may exist within an application. It’s time we leverage software bills of materials (SBOMs) that, as part of a set of DevSecOps best practices, facilitate rapid response to vulnerabilities such as Log4J. Otherwise, the sheer number of vulnerabilities discovered will simply overwhelm developers as they attempt to strike a balance between adding new application features and prioritizing vulnerability remediation all at once. Fortunately, there are platforms, such as Censinet RiskOps, to help the process and some open source tools to inspect your products.
Chris Logan
SVP & CSO, Censinet
Key Points:
What is the Log4j vulnerability?
- The Log4j vulnerability is a critical flaw discovered in December 2021 in the widely used Apache Log4j 2 Java logging library.
- It allows attackers to execute arbitrary code on vulnerable systems by exploiting how Log4j logs specific user inputs.
- This vulnerability is tracked as CVE-2021-44228 and CVE-2021-45046.
Who is affected by the Log4j vulnerability?
- Systems and services using Apache Log4j 2 versions between 2.0-beta9 and 2.14.1 are affected.
- The vulnerability impacts popular frameworks, such as Apache Struts2, and many third-party applications.
- Due to the widespread adoption of Log4j, this vulnerability exposes a large attack surface across industries, including healthcare.
What are the immediate steps to address the Log4j vulnerability?
Organizations should take the following steps immediately:
- Upgrade Log4j: Update to Log4j 2 version 2.17.0 or later to ensure the vulnerability is patched.
- Monitor Alerts: Ensure your Security Operations Center (SOC) closely monitors alerts related to the vulnerability.
- Use a Web Application Firewall (WAF): Deploy a WAF with auto-updating rules to filter malicious activity.
- Inventory External-Facing Devices: Identify and prioritize mitigation for devices that have Log4j installed.
What should healthcare vendors do about the Log4j vulnerability?
Healthcare vendors must:
- Assess Impact: Identify whether their products or embedded third-party components are vulnerable.
- Communicate with Customers: Proactively inform healthcare providers about remediation efforts or confirm that no vulnerabilities exist.
- Validate Updates: Ensure downstream third-party vendors have updated their products and verify remediation steps.
- Build Trust: Maintain transparency with customers throughout the process.
How should healthcare delivery organizations address the Log4j vulnerability?
Healthcare delivery organizations should:
- Engage Vendors: Contact downstream vendors to confirm their status and remediation efforts.
- Verify Updates: Ensure products and services have been updated to the latest Log4j version (2.17.0 or higher).
- Assess Critical Systems: Identify mission-critical systems and prioritize remediation for those that handle sensitive data, such as PHI or clinical workflows.
- Incident Management: Follow the organization's incident management process to analyze, contain, and eradicate the threat.
What is the long-term response to vulnerabilities like Log4j?
Organizations should focus on building a proactive, dynamic risk management program by:
- Maintaining an Asset Inventory: Identify all third-party apps, services, and devices that could be affected by vulnerabilities.
- Incident Playbooks: Develop and refine incident management playbooks to respond quickly to zero-day vulnerabilities.
- Regular Vendor Assessments: Continuously assess vendors to understand their risk profiles and ensure they align with cybersecurity best practices.
- Utilizing SBOMs (Software Bills of Materials): Use SBOMs to identify open-source components in applications and respond rapidly to security threats.
How does Censinet help organizations manage the Log4j vulnerability?
Censinet’s RiskOps platform simplifies the management of vulnerabilities like Log4j by:
- Tracking Vendor and Product Statuses: Provides an electronic inventory of third-party vendors and their products, helping organizations prioritize risks.
- Mitigation and Remediation Insights: Tracks whether a product is affected by Log4j and documents remediation actions, such as applying patches or isolating systems.
- Actionable Reporting: Filters vendors and products based on criteria like “contains PHI” or “has network access” to prioritize remediation efforts.
- Long-Term Risk Management: Helps organizations maintain visibility into vendor risks and ensures continuous compliance with cybersecurity best practices.
What role does collaboration play in addressing vulnerabilities like Log4j?
- Collaboration between cybersecurity professionals and application developers is crucial to identifying and managing vulnerabilities.
- Leveraging tools like SBOMs and integrating DevSecOps best practices facilitates faster responses to vulnerabilities like Log4j.
- Platforms like Censinet RiskOps streamline communication and risk management across vendors, providers, and developers.