{"id":132961,"date":"2021-12-23T21:24:13","date_gmt":"2021-12-24T05:24:13","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/12\/cisa-fbi-and-nsa-publish-joint-advisory-and-scanner-for-log4j-vulnerabilities"},"modified":"2021-12-23T21:24:13","modified_gmt":"2021-12-24T05:24:13","slug":"cisa-fbi-and-nsa-publish-joint-advisory-and-scanner-for-log4j-vulnerabilities","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/12\/cisa-fbi-and-nsa-publish-joint-advisory-and-scanner-for-log4j-vulnerabilities","title":{"rendered":"CISA, FBI and NSA Publish Joint Advisory and Scanner for Log4j Vulnerabilities"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/cisa-fbi-and-nsa-publish-joint-advisory-and-scanner-for-log4j-vulnerabilities.jpg\"><\/a><\/p>\n<p>Cybersecurity agencies from Australia, Canada, New Zealand, the U.S., and the U.K. on Wednesday released a joint advisory in response to widespread exploitation of multiple vulnerabilities in Apache\u2019s Log4j software library by nefarious adversaries.<\/p>\n<p>\u201cThese vulnerabilities, especially Log4Shell, are severe,\u201d the intelligence agencies said in the <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2021\/12\/22\/mitigating-log4shell-and-other-log4j-related-vulnerabilities\" rel=\"noopener\" target=\"_blank\">new<\/a> <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-356a\" rel=\"noopener\" target=\"_blank\">guidance<\/a>. \u201cSophisticated cyber threat actors are actively scanning networks to potentially exploit <a href=\"https:\/\/thehackernews.com\/2021\/12\/extremely-critical-log4j-vulnerability.html\" rel=\"noopener\" target=\"_blank\">Log4Shell<\/a>, <a href=\"https:\/\/thehackernews.com\/2021\/12\/second-log4j-vulnerability-cve-2021.html\" rel=\"noopener\" target=\"_blank\">CVE-2021\u201345046<\/a>, and <a href=\"https:\/\/thehackernews.com\/2021\/12\/apache-issues-3rd-patch-to-fix-new-high.html\" rel=\"noopener\" target=\"_blank\">CVE-2021\u201345105<\/a> in vulnerable systems. These vulnerabilities are likely to be exploited over an extended period.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity agencies from Australia, Canada, New Zealand, the U.S., and the U.K. on Wednesday released a joint advisory in response to widespread exploitation of multiple vulnerabilities in Apache\u2019s Log4j software library by nefarious adversaries. \u201cThese vulnerabilities, especially Log4Shell, are severe,\u201d the intelligence agencies said in the new guidance. \u201cSophisticated cyber threat actors are actively scanning [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1694],"tags":[],"class_list":["post-132961","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-electronics"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/132961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=132961"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/132961\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=132961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=132961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=132961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}