Security News & Updates

Posts about:

log4shell

Log4Shell Vulnerability Update 01/07/2022

Subscribe here for instant security updates

On December 9th, a remote code vulnerability was revealed in Apache’s Log4j, a commonly used logging system used by website developers and leveraged in a wide range of hardware and software products. Apache has released updates to mitigate the Log4j vulnerability. Additional information about the vulnerability can be found at the following link:

Log4j – Apache Log4j Security Vulnerabilities

Go West IT has completed our internal investigation of potential exposure resulting from the Log4j/Log4Shell vulnerabilities. Go West IT has not identified any material exposure to the Log4j vulnerability within our internal systems, critical vendors, software, or platforms used to deliver services to Go West IT customers. 100% of Go West IT critical vendors have indicated they either do not have exposure to the Log4j vulnerability or that exposure to the vulnerability has been patched or removed and thereby mitigated.

Go West IT has not found any evidence that Log4j vulnerability has been exploited in our systems and has not been notified by any of our critical vendors that they have found evidence of any Log4j exploitation.

Assessment of this vulnerability is ongoing and Go West IT will notify customers if a Log4j vulnerability or exploitation is discovered in any of our systems or is reported by any of our critical vendors.

Detection & Mitigation Work in Go West IT Customer Environments
For customers that subscribe to one of our three managed service offerings (Go Managed | Essential, Go Managed | Proactive, and Go Managed | Comprehensive), Go West IT has utilized our remote monitoring and management agent (RMM) to aid in detecting vulnerable systems and software. Go West IT has also leveraged an RMM component to detect potential exploitation of the vulnerability, and to inoculate Windows Server operating systems against Log4j attacks. Investigation and mitigation efforts are being documented in support requests. Mitigation efforts in customer environments have been focused first on critical infrastructure components including servers and firewalls with particular focus on systems that have a public IP (Internet Protocol) address assigned or that are accessible via the public Internet (e.g., servers hosting websites and firewalls).

The Go Secured | Detect & Respond service is detecting the presence of Log4j on desktop platforms (Mac & PC) and support requests are being opened for each of these detections. The most common mitigation action for potential Log4j vulnerabilities on workstations is to update or uninstall the software that utilizes Log4j. Workstations that are not directly accessible from the public Internet are at a much lower risk of exploitation but still warrant investigation.

Go West IT is in the process of using the RMM component to inoculate Windows desktop operating systems against Log4j exploitation. This is accomplished by making a registry change on desktop operating systems. Go West IT is also assessing the value of scanning desktop operating systems for evidence of compromise using the RMM component. Compromise scanning requires the installation of additional pre-requisite software and will only provide a point in time indication of compromise. Customers interested in real time detection of potential compromise should consider utilizing the Go Secured | Detect & Respond service.

Customers that leverage Go West IT on a time & materials basis must contact Go West IT to request assistance in identifying and remediating Log4j vulnerabilities. No proactive investigation is being done for time & materials customers that have not specifically asked for assistance.

Investigation efforts to identify vulnerable systems in customer environments is being done “in-scope” for all managed service customers. Mitigation labor to update or remove vulnerable software is in-scope for customers using our Go Managed | Proactive and Go Managed | Comprehensive services. Customers using the Go Managed | Essential service will be contacted for approval of out-of-scope labor to address discovered Log4j vulnerabilities. Multiple patch versions have already been released (Log4j 2.15, 2.16, and 2.17) and it is important to know that ongoing patching may be required.

All customers may engage Go West IT to conduct network vulnerability scans to detect the presence of vulnerable Log4j software on systems that are not running the RMM agent such as network attached storage devices, IoT devices, NVR systems, video conferencing equipment, and other network peripherals.

Customers with questions or concerns about the Log4j vulnerability in their environments should open a support request.

Customers with questions or concerns about Go West IT’s response to and handling of the Log4j vulnerability may call our office and ask to speak with the President of Go West IT.

Read More

Log4Shell Vulnerability Update 12/13/2021

Subscribe here for instant security updates

On December 9th, a remote code vulnerability was revealed in Apache’s Log4J, a commonly used logging system used by website developers. The vulnerability is anticipated to have broad impact to public facing web servers and there is significant evidence that threat actors are already exploiting this vulnerability in the real world. The vulnerability, dubbed Log4shell, received significant publicity over this past weekend.

Go West IT has been investigating the potential impact of Log4shell on our environment, across our vendors, and in our customer environments. An initial review of Go West IT systems and Go West IT vendors has not revealed any vulnerabilities in applications used internally at Go West IT or to provide our support services. We will continue to monitor vendor communications regarding this vulnerability and advise if any known incidents or risks are found with this evolving situation.

Go West IT is devising strategies to look for the existence of Log4J across customer environments and we will open support request to address vulnerabilities as they are discovered. Work to remediate the vulnerability is “In-Scope” for customers using Go Managed | Proactive and Go Managed | Comprehensive services. Go West IT will contact customers that are not using these managed services to talk about the labor cost associated with remediation.

If you have specific questions or concerns about your environment as it relates to the Log4j vulnerability, please open a support request by emailing support@gowestit.com or calling our service desk at 303-795-2200, Option 1. If you have questions about, Go West IT’s environment or response to this vulnerability, please contact info@gowestit.com

Subscribe here for instant security updates
Read More