blog posts

Log4j Vulnerability: Everything You Need to Know

Log4j Vulnerability: Everything You Need to Know

If you follow tech news, you’ve probably heard about a major security flaw in Log4j. Log4j is a popular logging tool used by many companies. This vulnerability, called Log4Shell, lets hackers run malicious code on affected systems.

At Progressive Robot, we’ve been closely watching the situation. We want to assure our customers that our infrastructure is secure. If you use our shared web hosting, email, or cloud packages, you don’t need to take any action.

However, if you have a Dedicated Server or VPS, you have full control over your system. We recommend checking for any software that might be vulnerable.

If you’re unsure about the issue, here’s a simple breakdown of what’s happening, why it matters, and what you can do to protect your servers.

What is the Log4j Vulnerability?

What is the Log4j Vulnerability?

Last week, Apache reported a critical flaw in Log4j, a logging tool for Java. The vulnerability, known as Log4Shell (CVE-2021-44228), lets attackers run harmful code on servers. If successful, they can take control of the system.

One of the first attacks happened on Minecraft, a popular game. Hackers targeted one of its servers. Microsoft, the game’s owner, quickly fixed the issue. Other services like Steam and iCloud were also found to be at risk.

Who is Affected by the Log4j Vulnerability?

Log4j is used by millions of servers worldwide. If your system uses Log4j versions 2.0 to 2.15, it could be vulnerable.

Even if you haven’t installed Java directly, you might still be at risk. Log4j and Java are often included in common software like Logstash, Elasticsearch, and Storm. If you use any software that bundles Log4j, your system could be exposed.

How Can You Protect Your Servers from Log4Shell?

The good news is that fixes are already available. Apache has released Log4j version 2.16 to address the issue. Here’s what you can do:

  1. Update Java 8 to Log4j version 2.16.0.
  2. For Java 7, upgrade to Log4j version 2.12.2 when it’s available.
  3. If you can’t update immediately, remove the JndiLookup class from your system. Use this command:
    zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class

What Does This Mean for Progressive Robot Servers?

Our infrastructure is secure. If you use our shared hosting, email, or cloud services, no action is needed. We have very few systems using Log4j, and those have been patched or were never vulnerable.

If you have a Dedicated Server or VPS, you should check for the Log4j vulnerability. Since you control your server, we can’t do this for you. We strongly recommend updating Log4j to version 2.16 and Java 8 to version 2.16.0. For Java 7, upgrade to version 2.12.2 as soon as possible.

If you need help, our expert support team is here for you. Visit our support site for guides on managing your Dedicated Servers and VPS.

Need More Help?

For more details, a custom quote, or an exclusive discount on a Dedicated Server, contact us today.

Call us: + 44 ( 01244 ) 911212
Or reach out via email or chat.

Stay safe and keep your systems updated!

Leave a Reply

Your email address will not be published. Required fields are marked *