GOOGLE is warning users to enable Cloud Console because hackers can exploit the Apache vulnerability.
Apache Log4j Utility 2 is an open source Apache framework used for logging requests.
A vulnerability was reported on December 9 that could allow systems running Apache Log4j version 2.14.1 or below to be compromised.
Follow researchers at Check Point.
Cybersecurity researchers at Sophos says it detected hundreds of thousands of remote code execution attempts using the Log4j vulnerability.
This is a common tactic by hackers to exploit newly disclosed vulnerabilities to have the best chance of taking advantage of them before they are fixed.
Google stated that it will continue to “actively monitor this event and will provide updates to this blog post”.
“Like many other companies, we are closely monitoring this vulnerability. Our security teams are investigating any potential impact on Google products and services and are focused on protecting our users and customers,” a Google spokesperson said. know.
“Google Cloud is monitoring real-time updates here and will update this security advice as we assess the impact.
“We have successfully validated and pushed a new pre-configured WAF rule in Armor in the clouds to production will help customers detect and block CVE-2021-44228 exploit attempts on their networks. “
“I cannot overstate the severity of this threat. On the face of it, this is aimed at cryptocurrency miners but we believe this just creates a kind of background noise that serious actors will try to exploit,” said Lotem Finkelstein, director of intelligence on threat at Check Point said.
Google recommends that customers upgrade to v2.15.0 version of Log4j as soon as possible. If the upgrade cannot be done quickly, customers can mitigate the problem by setting the “No Lookups (log4j2.formatMsgNoLookups)” property to true.
In addition to updates, Google Cloud Security products can help detect and resolve temporary exploit issues until a patch is available.
It is also recommended that users have a vulnerability scanner to identify issues reported by the National Vulnerability Database.
For more protection until patch is applied, Cloud Armor can also help mitigate threats. Cloud Armor can be enabled through the Cloud Control Panel followed by Network Security or through the API.
We pay for your stories!
Do you have a story for the American team The Sun?
https://www.thesun.co.uk/tech/17032667/google-warns-users-about-apache-vulnerability/ Google Cloud Urgent Warning about Apache Vulnerability