Log4j response: Visibility is key

Feb. 14, 2022
Open-source logging vulnerability renews software supply chain concerns

Following on the December 2020 revelation of the Solar Winds software supply chain hack by Russian operatives, 2021 was not to be outdone, with December 2021 marking the discovery of Java developers' “own goal” on the global IT/OT infrastructure.

About a decade ago, contributors to release 2 of the Apache Foundation’s open source Log4j software thought it would be a neat idea for the message/event logging software to be able to send a log that would also execute code, explains Eric Byres, CTO at aDolus (www.aDolus.com).

“Effectively, the Log4Shell vulnerability in the Log4j library provides a way to bundle a command into a message that looks like an event log, send it to your potential victim’s log collector, then initiate a takeover,” Byres explains. The Log4j vulnerability is of particular concern because its use is extremely widespread, the exploit is trivial, plus it’s used in very high level, mission-critical servers. “It’s Solar Winds without the Russians,” Byres adds.

Read more on ControlGlobal.com.

Sponsored Recommendations

Stop system failures before they start—learn how to protect your encoders.
Explore the impact of edge computing on industrial robotics, enabling real-time processing, reducing latency, and enhancing security in smart warehouses.
Watch the video to find out how simulation for automation lets you validate and optimize production machines so you can build better battery machines faster.
Watch the video to see how Multiphysics simulations helps Jegenberg overcome challenges in lithium ion battery production.