In response to the multiple vulnerabilities in Apache’s Log4j software, the Cyber Security Infrastructure and Infrastructure Security Agency (CISA), the FBI, and the National Security Agency (NSA) were joined by their cybersecurity authority counterparts from Australia, Canada, New Zealand, and the United Kingdom and released a joint cybersecurity advisory (CSA) on
Mitigating Log4Shell and Other Log4j-Related Vulnerabilities.
This joint CSA provides various technical resources detailing voluntary steps that vendors and organizations with information technology, operational technology, and cloud assets should take to in response.
For vendors and organizations with IT and/or cloud assets, this joint CSA expands on the previously published CISA guidance with recommended, detailed steps to respond to these vulnerabilities, which are:
Identify assets affected by Log4Shell and other Log4j-related vulnerabilities;
Upgrade Log4j assets and affected products to the latest version as soon as patches are available and remaining alert to vendor software updates; and
Initiate hunt and incident response procedures to detect possible Log4Shell exploitation.
Given the widespread exploitation of this vulnerability, organizations are encouraged to assume their assets that use Log4j may have been compromised and initiate hunt procedures. If a compromise is detected, organizations are encouraged to report it to CISA and/or the FBI.
*Note: due to the urgency to share this information, CISA has not yet validated this content.