Importance of Attack Surfaces in Log4shell Context

 Introduction

Everyone in the IT Industry is alarmed by the discovery of a 0-day vulnerability in the famous Log4j, java logging framework. It's been assigned with a CVSS score of 10, which means any application using a vulnerable version of Log4j can be exploited by anyone. Such is the the severity of this vulnerability. It's imperative to fix this vulnerability and there are various threads out there on how to fix this issue and there are different third-party tools to find the usage of vulnerable log4j jars. This blog will not talk about this and is talking about the importance of keeping track of your IT Assets to stay resilient when attacks of such scale emerge in the future. 

Know Your Attack Surface

Attack Surface - Different Points in the IT landscape of an organization, through which an attacker can attack your IT Infrastructure. 

With the increase in the IT complexity and the presence in the IT Landscape, the Attack surface of any organization is growing day by day. It's is very important to keep track of this growing IT resources,  failing to do so will lead to Shadow IT Resources. The Shadow IT Resources are one of the easiest ways in which an attacker can gain access to your organizations. 

What are Shadow IT Resources?

With the increase in IT infrastructure of the organizations, some of the resources may get orphaned or may not be under the radar of the IT operations team. Those resources, which gets orphaned by the IT Teams but are inside the organization's IT infrastructure are called Shadow IT Resources. It is important to know all your IT resources and Attack Surfaces. 

 What's the relevance with Log4Shell

Log4shell is a common vulnerability and many IT components are vulnerable to this attack. The patching process and the fixed jar are released immediately, but it's the organization responsibility to identify and apply the necessary patch for on the vulnerable components. 

This where "Know Your Resources" is critical. It is not possible to patch a resource which is unknown to an organization. Shadow Resources can be discovered and attacked by Hackers. It's important to discover those Shadow Resources and terminate them properly. 

For example, a legacy application or a device which is using  the vulnerable version of log4j and is not known to the organization, can be identified and exploited by Hackers. The level of complexity in performing the exploit is also very low and hence attackers with very limited technical skill can also attack your organization and your business can go for a toss. 

Conclusion

Speed up your IT team to discover and keep an update list of the IT resources, Applications, components that are used by employees, third-party, your applications, etc. Regularly audit the resources and check for vulnerable components, unused IT resources, deprecated software, and remove them. This is critical to organizations of any size. The only way to weather the vulnerabilities like log4shell is to keep your IT resources in check and immediately patch them. Otherwise the business will go for a toss and attackers can ruin the reputation of your business. Stay secure.

Comments

Popular posts from this blog

Security Score Card using Nuclei Automation

Extracting Dynamic Values from Multiple Requests in a Nuclei Template

How I used Nuclei to Automate Basic Security Checks