ARTICLE
22 December 2021

Log4Shell Vulnerability Poses Massive Cybersecurity Threat

LR
Lewis Roca

Contributor

Lewis Roca logo
Lewis Roca serves clients around the world in complex litigation, intellectual property, business transactions, labor and employment, regulatory counseling, and government relations.  With legal excellence and exceptional client service, we pride ourselves on our ability to win for our clients while serving their highest goals and needs.   
A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk.
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk. Over the past week, government agencies, cybersecurity firms, and other members of the cybersecurity community have been scrambling to address the vulnerability, but reports indicate that numerous attacks have already been launched, and the impacts could be felt for some time.

Log4j is a free, open-source logging utility that has been built into innumerable applications and is used by almost every cloud service and enterprise network. The Log4j vulnerability, also known as Log4Shell, is relatively easy to exploit and allows threat actors to execute malicious code and seize control of affected systems. Reports indicate that the vulnerability has already been used to install cryptocurrency mining tools on hacked systems, to deploy ransomware, to exfiltrate data, and to insert "back doors" that may allow future access even after Log4Shell itself has been patched.

As a result, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) and several of its Joint Cyber Defense Collaborative (JCDC) partners, including Cisco, IBM, and Microsoft, have issued (and are frequently updating their) guidance regarding this vulnerability. CISA has also ordered all federal civilian agencies to patch the vulnerability by no later than December 24, 2021, and various federal contractors, critical-infrastructure entities, and related vendors within the supply chain might need to establish similar compliance efforts in the near future.

Even in the absence of any mandatory patching requirements, we urge you to discuss Log4Shell as soon as possible with your information-technology and cybersecurity personnel and to follow CISA's guidance. In addition, please feel free to contact a member of our Data Protection and Cybersecurity Team if you would like to discuss this issue or if you have any other questions pertaining to data privacy or security.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More