gptkbp:instance_of
|
gptkb:software
|
gptkbp:bfsLayer
|
4
|
gptkbp:bfsParent
|
gptkb:Log4j_2.x
gptkb:Log4j
|
gptkbp:activities
|
network segmentation
incident response plans
application firewall rules
monitoring for exploitation
|
gptkbp:affects
|
Java applications
increased funding for cybersecurity
regulatory changes proposed
enhanced security practices
increased scrutiny on software supply chain
|
gptkbp:allows
|
remote code execution
|
gptkbp:category
|
remote code execution vulnerability
|
gptkbp:community_impact
|
high
|
gptkbp:difficulty
|
critical
|
gptkbp:discovered_by
|
gptkb:2021
gptkb:Company
|
gptkbp:economic_impact
|
gptkb:significant
|
gptkbp:enforces
|
best practices
awareness programs
recommended
incident response training
|
gptkbp:feedback
|
active
|
gptkbp:government_type
|
advisories issued
emergency measures taken
guidelines published
|
gptkbp:honorific_prefix
|
gptkb:CVE-2021-44228
|
https://www.w3.org/2000/01/rdf-schema#label
|
Log4 Shell exploit
|
gptkbp:impact
|
gptkb:historical_event
service disruption
system compromise
|
gptkbp:is_protected_by
|
upgrading Log4j
|
gptkbp:is_vulnerable_to
|
high
attackers
input validation error
|
gptkbp:latest_version
|
gptkb:Log4j_2.x
|
gptkbp:media_coverage
|
extensive
|
gptkbp:notable_album
|
December 9, 2021
|
gptkbp:public_awareness
|
high
|
gptkbp:related_to
|
gptkb:Log4j_library
|
gptkbp:released
|
gptkb:Log4j_2.15.0
gptkb:Log4j_2.16.0
gptkb:Log4j_2.17.0
|
gptkbp:reports_to
|
gptkb:football_club
gptkb:Chen_Zhaojun
|
gptkbp:research_focus
|
vulnerability analysis
exploit development
remediation strategies
|
gptkbp:responds_to
|
urgent
security patches released
|
gptkbp:security_features
|
CISA advisory
|
gptkbp:supports
|
gptkb:High_School
gptkb:Cloud_Computing_Service
web applications
|
gptkbp:utilizes
|
JNDI lookup
|