Many of you have asked how Lansweeper can help in detecting possible log4j vulnerable applications or devices. These Reddit posts contain great info on how you can detect applications running the library, how you can detect possible attacks, custom scripts, and lots of articles covering every technical detail. Below are three great resources thanks to all the great people participating on Reddit. Since so many applications use the affected library, using a list isn't always the best method to find which devices/applications you have in your environment are affected. Finding Affected Devices and Applicationsįinding out which applications in your environment have been a problem for most organizations. We're glad to confirm that all local, cloud, and third-party services delivered with Lansweeper are unaffected. Our security teams have investigated the impact of the log4j vulnerability, CVE-2021-44228. Many customers have contacted us regarding log4j and the effect on Lansweeper. Tech Solvency CVE-2021-44228 cheat-sheet.
#WHAT IS LANSWEEPER SOFTWARE#
#WHAT IS LANSWEEPER UPDATE#
This means if an application you were using was vulnerable to the original log4j vulnerability, you will most likely have to update it again. On December 14, 2021, a second much less critical vulnerability was found. Big names like Amazon, Apple iCloud, Cisco, Cloudflare, ElasticSearch, Red Hat, Steam, Tesla, Twitter, and more useful applications that make use of the log4j library. Due to the popularity of the log4j library, many major publishers and manufacturers have been assessing their software to determine whether it has been impacted or not. Log4j is a java-based logging package used by developers to log errors. So far iCloud, Steam, and Minecraft have all been confirmed vulnerable.- Marcus Hutchins December 10, 2021 Millions of applications use Log4j for logging, and all the attacker needs to do is get the app to log a special string. This log4j (CVE-2021-44228) vulnerability is extremely bad.