What You Need to Know about Log4Shell (CVE-2021-44228)

Rohan Pinto

On December 9, 2021 a flaw was publicly disclosed in Apache’s Log4j 2, a logging utility used by Java applications. Named Log4Shell (CVE-2021-44228), the vulnerability can be used by attackers to take control of affected servers. According to reports, it is actively being targeted in the wild. 

To exploit Log4Shell, an attacker needs to get the system to log a strategically crafted string of code. From there arbitrary code can be loaded on the targeted server to install malware or launch other attacks.

Apache has already patched the Log4Shell exploit

How we responded

As soon as the vulnerability was disclosed, 1Kosmos assessed our service infrastructure to determine any exposure. We tested and validated the patch for any impact it might have on customer deployments and availability, before we implemented any remediation steps. On December 16, we pushed the remediation to all affected servers.

Is my environment vulnerable?

No, the 1Kosmos platform is no longer vulnerable to CVE-2021-44228. Based on current available data, there is no indication that the exploit has been successfully used against 1Kosmos services.

Recommendations

No action is needed at this time. All remediations have been implemented by 1Kosmos. 

Questions

If you need any further information about the Log4Shell vulnerability sign in to the support portal, or contact us: (201) 299-5631.

The 1Kosmos Team

Overcoming Resistance to Change on the Journey to Passwordless MFA
Read More

Expert Insights in Your Inbox

Subscribe to the blog
Meet the Author

Rohan Pinto

Co-founder of 1Kosmos

Rohan is the co-founder of 1Kosmos. He is a go-to security and identity management expert and the founder of several businesses that have made considerable advancements in blockchain and identity management.