What We Do
How we do it
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
Mar 15, 2023
CVE-2023-23397 - Microsoft Outlook Elevation of Privilege Zero-Day Vulnerability
THE THREAT On March 14th, as part of Microsoft’s monthly Patch Tuesday release, the company disclosed a critical, actively exploited vulnerability impacting Microsoft Office and Outlook. The…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Mar 20, 2023
Exertis and eSentire Partner to Deliver 24/7 Multi-Signal MDR, Digital Forensics & IR Services and Exposure Management to Organisations Across the UK, Ireland, and Europe
Basingstoke, UK– 20 March, 2023. Leading technology distributor, Exertis, announced today that it has bolstered its cybersecurity services, adding eSentire, the Authority in Managed Detection and Response (MDR), to its Enterprise portfolio of offerings. eSentire’s award-winning, 24/7 multi-signal MDR, Digital Forensics & Incident Response (IR), and Exposure Management services will be available…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Jan 12, 2022

What You Need to Know About Log4j

3 minutes read
Speak With A Security Expert Now

Apache Log4j is a Java logging framework, highly prevalent in commercial and open-source software. Log4j is ubiquitous in commercial and open-source software and the vulnerability is relatively easy to exploit making it a significant challenge to defend.

The Log4j vulnerability is now associated with two Common Vulnerabilities and Exposures (CVE): CVE-2021-44228 & CVE-2021-45046. CVE-2021-45046 has been elevated from low severity (3.7) to critical (9.0).

eSentire’s Threat Response Unit (TRU) has observed scanning for the vulnerability, Cobalt Strike activity and crypto mining payloads. TRU has also observed the targeted of webservers. There have also been reports in the wild of the Log4j exploitation resulting in ransomware deployments. We recommend organizations scan their networks regularly, on an ad hoc basis, outside of standard cadences, to identify vulnerable assets and prioritize their patching.

Full Log4j Timeline

On December 9th, security researchers released details and a Proof-of-Concept (PoC) exploit code for CVE-2021-44228 (CVSS: 10), impacting the Apache Log4j Java-based logging library. If exploited successfully, a threat actor would have Remote Code Execution abilities, which would allow a remote and unauthenticated threat actor to take control of systems with vulnerable versions of Apache Log4j.

By December 10th, eSentire’s TRU team had observed exploitation attempts. We developed and deployed rules for our MDR for Network, Endpoint and Log services to identify exploitation activity. We began global threat hunts for exploit patterns and indicators of compromise.

On December 17th, Apache updated their advisory stating that “the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations.” CVE-2021-45046 was initially considered to be a Denial of Service (DoS) vulnerability. New research suggests that exploitation may allow a remote threat actor to achieve Remote Code Execution and steal sensitive data from vulnerable systems under certain conditions.

On December 28th, Apache released additional updates to their advisory related to CVE-2021-44832 indicating that an “attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code.” There remains some debate in the community as to whether this additional fix warrants a CVE. However, it is recommended that organizations ensure applications running Log4j are updated to the most recent release (2.17.1).

Recommendations from our Threat Response Unit (TRU)

How eSentire secures our customer environments 24/7

Additional Resources from eSentire:

To learn how eSentire’s Managed Vulnerability Service can help secure your environment against vulnerabilities like Log4j, connect with a security specialist today.

View Most Recent Blogs

eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.