A4 Brendyn Hitt

.docx

School

Bellevue University *

*We aren’t endorsed by this school

Course

CIS311

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

6

Uploaded by PrivateHummingbird3765

Report
CVE-2021-44228 Apache Log4j2 (Log4Shell) Brendyn T Hitt Bellevue University CIS311-T302 Network Security Professor Nyburg 9/24/23
CVE-2021-44228 Apache Log4j2 (Log4Shell) When software or hardware has defects or weaknesses that can be exploited to breach availability, confidentiality, or integrity, this is a vulnerability. This research paper will cover what vulnerabilities are, and will detail CVE-2021-44228, a vulnerability coming from Apache Corporation, that had the potential to exploit billions of devices. Log4j – Apache Log4j Security Vulnerabilities. (2022). Logging.apache.org. Log4j is a popular logging tool used by java enthusiasts, and this Day 0 exploit had major implications. Technical Mechanism and Features Log4Shell is a vulnerability that is injected into the Java Naming and Directory Interface (JNDI), and the purpose of this vulnerability is to give access for remote code execution (RCE). Log4j uses log messages, these indicate whenever a client registers or connects a new request. An attacker could take advantage of this to attain remote code execution (RCE) over a device and essentially have the ability to control a device. Apache Log4j Vulnerability Guidance | CISA. (2021). Cybersecurity and Infrastructure Security Agency CISA . By gaining access to modify log messages through a third-party application, an infected log could be injected into the Java Naming and Directory Interface that had the ability to infect a device and gain RCE. Goal of Exploit
The goal of Log4Shell was simply to gain remote code execution, and this allowed hackers to do many things with a client's device. Denial of service (DoS) is a very common goal of achieving access over other devices, a hacker could choose to crash the infected system by overloading and exhausting its system resources, or it could use these devices to overload a target with requests until it cannot accept regular network traffic or data. Sensitive data can also be retrieved with relative ease by accessing the data on a device that is infected, this could be any sort of data like banking details or a social security number, or current location. With remote code execution, a device could unknowingly become infected by a crypto mining malware that would burn your devices resources in excess causing potential failure of hardware. Ransomware is possibly the most dangerous result of this vulnerability as hackers could “lock” a user out of their device until they are paid. Risk/Damage Potential The potential of damage for this vulnerability was astronomical, up to three billion devices that used log4j were affected, and even the FDA released a statement, as the functionality of electronic medical devices had the potential to be impacted or compromised because of this. Health, C. for D. and R. (2023). Cybersecurity. FDA . Any device with an unsecure open- source code that is connected to the infected device also has the potential to be infected. The amount of personal and sensitive data that may have been compromised because of this is devastating. This exploit was discovered on
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: Elaine is enrolled in a self-paced course that allows three attempts to pass an examination on the…
Q: A custom guitar shop sells two types of guitars: electric and acoustic. The creation process of each…
Q: What is an example of a financial transaction? A firm purchases a fire insurance policy.   An…
Q: he highway mileage (mpg) for a sample of 8 different models of a car company can be found below.…
Q: if a trial balance or income state, etc... is post-closing, unadjusted, or adjusted?
Q: Cash $ 5,100 Accounts Receivable 600 Supplies 2,000 Equipment 14,000 Accounts Payable 6,000 Common…
Q: Macmillan Learning Atom Covalent bonds Lone pairs Valence electrons C Complete the table to indicate…
Q: Find the two square roots for each of the following complex numbers. Leave your answersin…
Q: A small boat sailed straight north out of a harbor in strong east wind (blowing from west to east).…
Q: The following data represent the pH of rain for a random sample of 12 rain dates. A normal…
Q: Determine the discriminant of each quadratic equation. Use the value of the discriminant to…
Q: This refreeing to mushrooms
Q: Humans have three types of cone cells in their eyes, which are responsible for color vision. Each…
Q: What happens if the size of the virtual memory is too small or too big?  Discuss the case when the…
Q: Epic Incorporated has 11,400 shares of $2 par value common stock outstanding. Epic declares a 19%…
Q: Consider the equation below. (If an answer does not exist, enter DNE.) f(x) = x3 − 12x2 − 27x + 6…
Q: erritory and Product Profitability Analysis Coast to Coast Surfboards Inc. manufactures and sells…
Q: Tree Seedlings has the following current-year purchases and sales for its only product.   Date…
Q: Do the odds of churning increase or decrease when the customer has a two-year contract as compared…
Q: The data below show the number of attorneys employed by the ten largest law firms in Pittsburgh. 22…
Q: In terms of physical security, what are the advantages and disadvantages of using firewalls?
Q: alculate the 40th percentile of the data shown, 1.1,5.5,9,14.3,20.6,24.3,25.6,27.1,27.6,28.7