CISA's New Log4j Scanner Aims to Find Vulnerable Apps

The open-sourced scanner was derived from scanners built by members across the open source community, CISA reports.

Dark Reading Staff, Dark Reading

December 22, 2021

1 Min Read
Dark Reading logo in a gray background | Dark Reading

The Cybersecurity and Infrastructure Security Agency (CISA) has released an open source scanner that businesses can use to find Web services vulnerable to Log4j remote code execution vulnerabilities CVE-2021-44228 and CVE-2021-45046.

"Log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by log4j vulnerabilities," CISA officials wrote on GitHub.

The information and code in the repository were provided "as is," assembled with help from the open source community, and updated by CISA through a collaboration with the broader security community, they noted.

Officials noted there are likely more, still unknown ways to use the Log4j vulnerabilities and that CISA is monitoring multiple platforms to stay up to date as the situation evolves.

In a tweet posted Dec. 21, Secretary Alejandro Mayorkas reported the Log4j vulnerability will also be included in the scope of the new "Hack DHS" bug bounty program announced Dec. 15. The program will include additional incentives to find and patch Log4j-related flaws in DHS systems, Mayorkas wrote.

Check out the CISA scanner on GitHub.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights