Cybersecurity In-Depth: Digging into data about the latest attacks, threats, and trends using charts and tables.
How Risky Is the Log4J Vulnerability?
Security teams around the world are on high alert dealing with the Log4j vulnerability, but how risky is it, really?
There is no doubt that the recently publicized vulnerability in Log4j is a serious one and security teams should be spending time assessing the organization's exposure. The vulnerability, CVE-2021-44228, was rated a 10.0 -- the highest possible score -- under the Common Vulnerability Scoring System (CVSS), which is used to assess the severity of a vulnerability so that security defenders can decide how to prioritize their response activities, taking into account the impact of the vulnerability and exploitability. But it doesn't really talk about risk.
For that, we can look at the Kenna Risk Score, which takes into account what is happening in real time, in the wild, for each vulnerability. The score provides an estimate of the likelihood of exploitation and makes it possible to order the probability the vulnerability would be exploited. The score gives defenders a starting point when trying to decide how risky the vulnerability is.
The Kenna Risk Score for CVE-2021-44228 is currently 87 of out 100, "an exceptionally rare score reflecting the severity and potential impact of this vulnerability," says Ed Bellis, CTO and co-founder at Kenna Security, now a part of Cisco. Kenna has scores for more than 165,000 CVEs, and only 0.4% of those vulnerabilities have earned a Kenna Risk Score of 87 or higher.
"Log4j is riskier than 99.6% of all known vulnerabilities," Bellis says.
The team has also been tracking likely successful exploitations from a combination of vulnerability scans and malware reversal using ReversingLabs and AlienVault Labs. While the volume of attempts is much higher, a lot of it is just "gray noise" because the scanning is being performed by both good and bad actors, Bellis says. Overall, the volume and velocity of potentially successful exploitations is low but increasing roughly fourfold every day, he says.
Saturday 12/11: 46 exploitations
Sunday 12/12: 169 exploitations
Monday12/13: 767 exploitations
Tuesday 12/14: 2,679 exploitations
Wednesday 12/15: 12,195 exploitations
Thursday 12/16: 28,313 exploitations
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024