Why are your IT people so miserable? Log4j2itis

The biggest security problem of your life is happening right under your nose. 
Even if you don't know about it, your IT admins do.

By Steven J. Vaughan-Nichols  Computerworld  29 DECEMBER 2021 
https://www.computerworld.com/article/3645709/why-are-your-it-people-so-miserable-log4j2itis.html


Instead of holiday toasts, do you hear screams and moans from your server room? 
Are your IT people sobbing inconsolably even when Amazon Web Services (AWS) is 
running? Do you walk over sleeping system administrators and developers when 
you get to the office?

If that's happening to you, let me explain what’s happening.

Your IT people — a lot of IT people — are suffering from Log4j2itis.

You may have seen some general news about it over the last couple of weeks, as 
even general news sources are picking up that it's bad news. As Jen Easterly, 
director of the the US Cybersecurity and Infrastructure Security Agency (CISA), 
said: "The Log4j vulnerability is the most serious vulnerability I have seen in 
my decades-long career."

I've been at it longer than she has and in my never very humble Twitter 
opinion, "#Log4Shell may, with no exaggeration, be the worst IT #security 
problem of our generation."

That sounds really scary, because it is really scary. But what is it exactly? 
For the side of the story that requires you to have words like "security," 
"system administrator," or "developer" in your title, I’ve got the ugly details 
in my New Stack post: "Log4Shell: We Are in So Much Trouble."

If you're an ordinary mortal, here's what's going on and why it's such a major 
pain to deal with.

Apache Log4j2 is an extremely popular open-source Java logging library. If your 
Java program logs, well, pretty much anything, from the user's name to the 
number of times it calls some other program for help, odds are it uses Log4J2 
to do the job.

That was fine. That was dandy. Everyone was happy. But, then a few weeks ago 
security investigators found that if you could make it log a line of malicious 
code, bad things would happen. How bad?  It has a "perfect" Common 
Vulnerability Scoring System (CVSS) score of 10 out of 10. It's as bad a 
security vulnerability as there can ever be.

What’s unique about observability is that it can facilitate its own flywheel. 
Unlike reporting systems that roll up insights at the end of a weekly or 
monthly reporting period, observability...

If any of your programs contain a vulnerable version of Logj42, they can be 
blasted with a remote code execution flaw attack. If successful, an attacker 
can do anything from playing Doom on your servers (seriously) to infecting 
every box on your network with the Mirai botnet to stiffing you with 
ransomware. Oh, and government-sponsored hackers are now using the Log4j 
vulnerability as well. Just ask the Belgian Defense Ministry, which was still 
recovering from an attack just last week.

What might those programs be? Good question. Thousands of widely used 
commercial programs are attackable. These include Apple iCloud; numerous Cisco 
programs; Minecraft client and server; Steam; Twitter; and many VMware programs.

And, if your crew or independent software vendors (ISV) wrote your programs 
with such software components as Apache Druid, Dubbo, Flink, Flume, Hadoop, 
Kafka, Solr, Spark, and Struts, they could be open to attack, too. This is a 
security hole that just keeps giving and giving.

The good news is there's a fix, three fixes actually, for Log4j2 
vulnerabilities. The short version is if you update every copy of this troubled 
software library to log4j 2.17.0, all will be well.

Aye, there's the rub. You must update every last one of them. And here's the 
really not-so-good part. Log4j is hidden away in millions of programs. Without 
a software bill of materials (SBOM) for every application, you can't be sure 
you’ll find them all. And SBOM is a new concept. No one was making them last 
year, never mind seven years ago when Logj42 was first released.

So you must look for them. And, because Java programs hide their code in 
Russian-nesting doll structures such as Java archive files (JAR), finding the 
one program that needs patching can be a real pain. There are tools, such as 
the CISA CVE-2021-44228_scanner, that make life easier for your security and 
development team, but it's still a lot of work.

Imagine someone asked you to find every reference you ever made in documents to 
your CEO since 2014… without easy-to-use text search tools. It would be a 
nightmare, right? Now, imagine that if you don't find it your company’s IT 
infrastructure will collapse into a god-awful mess.

So, be kind to your IT staffers. Instead of drinking a New Year's Eve glass of 
champagne, they're likely to still be tracking down and cleaning up this mess. 
This is not going to end quickly and there will be many more related attacks to 
fend off before it's all done.

Happy new year?

--
_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to