In Response to the Log4j Vulnerability: Radiflow’s Products are Safe

   Dec 13, 2021 | Radiflow team

General

The newly-reported Log4j vulnerability affects the widely used library Log4j which was created by Apache, the most widely used web server. The Log4j vulnerability allows remote code execution by simply typing a specific string into a textbox. It works on every program using the Log4j library. The severity for this vulnerability was marked as critical.

View the CVE for the log4j the vulnerability.

 

Radiflow Products

After internal analysis we are able to verify that Radiflow products are not affected by this vulnerability.

 

Detection and Mitigation

  • The latest SNORT Package is available for iSID customers, containing signatures for detection of the vulnerability’s exploit attempts in monitored networks.
  • iSID customers are requested to contact Radiflow support service.
  • GreyNoise has been publishing a list of IP addresses that have been seen scanning the internet to exploit this vulnerability and is keeping an updated list.¬†These IP addresses should be added to the blocked lists of respective network detection products.¬†Apache has provided a patch (Log4j 2.15.0) to mitigate the vulnerability.

Additional Resources:

Additional Resources

Skip to content