• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Which Products Are Impacted By the Log4j Vulnerability?

CISA and other governments' agencies are maintaining updated lists of vendors with software impacted by the Log4j vulnerability.

December 15, 2021 Zachary Comeau Leave a Comment

Log4j, Older Vulnerabilities, CISA KEV
stock.adobe.com/Andreas Prott

Multiple governments have released a long list of IT vendors and their products that are impacted by the Log4j vulnerability, including the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Dutch National Cyber Security Centrum (NCSC)

The two agencies are maintaining running lists of vendors impacted by the vulnerability on their respective GitHub repositories, which includes the name of the vendor, the product impacted, information about security patches and links back to the vendor’s security advisory.

As of Wednesday afternoon, the CISA repository listed more than 500 products from the IT vendor community, and lists products that are affected, under investigation or not affected. Read more about CISA’s recommendations on this major issue here. 

The NCSC has a much more comprehensive list of about 1,900 products and their vulnerability status. However, not all vendors listed have vulnerable products.

Both lists also offer information about workarounds and temporary mitigations while the solutions are patched.

Appearing on these lists are vendors such as Cisco, VMWare, Amazon, IBM, Fortinet, Microsoft, Splunk, Sophos, Red Hat and some of the other largest enterprise technology providers in the world.

  • CISA repository: https://github.com/cisagov/log4j-affected-db
  • NCSC repository: https://github.com/NCSC-NL/log4shell/tree/main/software

Another Log4j security update

Apache quickly released Log4j version 2.15.0 in a security update to address the main vulnerability that was exposed last week, but the foundation this week released another update, 2.16.0, that addresses a remote denial-of-service vulnerability in certain non-default configurations.

Organizations are advised to apply the new update immediately.

Read Next: What You Need To Know About The Log4j Vulnerability

According to The Apache Foundation, 2.15.0 restricts JNDI LDAP lookups to localhost by default, but 2.16.0 disables access to JNDI by default, and lookups now need to be enabled explicitly.

The update also limits the protocols by default to only Java, LDAP and LDAPS and limits the LDAP protocols to only accessing Java primitive objects. Hosts other than the local host need to be explicitly allowed, the organization says in an advisory.

Widespread exploitation attempts

Because of the broad vulnerability across the entire IT ecosystem, coupled with the simplicity of this exploit, attackers have pounced at the opportunity to leverage this for a variety of purposes, including cryptojacking, ransomware and other attack methods.

According to cybersecurity provider Check Point, the company has seen an attempted exploit on 46% of global corporate networks, and the firms’ software has helped prevent over 1.8 million attempts to exploit the vulnerability.

What’s especially concerning however, is that known threat actors—perhaps nation-state actors and other sophisticated groups with access to access to resources and advanced tools—are responsible for nearly half of those attempts.

Attacks leveraging this vulnerability have also rapidly escalated, with attacks nearly doubling between Dec. 11 and Dec. 13, according to Check Point’s data.

While the global average of corporate networks being attacked via this vulnerability is about 46%, some countries have seen over 60% of corporate networks impacted.

What’s even more concerning is the type of organization being attacked. According to Check Point, at least 55% of internet service providers, managed service providers, value-added resellers and other third-party tech service providers have reported being attacked.

As is often the case, those kind of organizations represent valuable hacking targets because they likely hold the keys to the networks of thousands more organizations.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Log4j, Vulnerability

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.