{"id":10983,"date":"2021-12-13T18:40:03","date_gmt":"2021-12-13T16:40:03","guid":{"rendered":"https:\/\/cosh.de\/beitraege\/attention-federal-office-warns-about-massive-and-dangerous-it-security-vulnerability-log4j\/"},"modified":"2022-04-27T15:11:48","modified_gmt":"2022-04-27T13:11:48","slug":"attention-federal-office-warns-about-massive-and-dangerous-it-security-vulnerability-log4j","status":"publish","type":"post","link":"https:\/\/cosh.de\/en\/attention-federal-office-warns-about-massive-and-dangerous-it-security-vulnerability-log4j\/","title":{"rendered":"Attention: Federal Office warns about massive and dangerous IT security vulnerability &#8220;Log4j"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><h2 class=\"h1 fusion-responsive-typography-calculated\" style=\"--fontsize: 40; line-height: 1.2;\" data-fontsize=\"40\" data-lineheight=\"48px\">Attention: Federal Office warns about massive and dangerous IT security vulnerability &#8220;Log4j<\/h2><\/p>\n<\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><div><strong>Dear Sir or Madam,<\/strong><\/div>\n<div><\/div>\n<div>over the weekend, the BSI (German Federal Office for Information Security) published a letter about a very threatening vulnerability in an open source software called Log4j.<\/div>\n<div><\/div>\n<p><div><a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2021\/2021-549032-10F2.pdf?__blob=publicationFile&amp;v=3\" data-cke-saved-href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2021\/2021-549032-10F2.pdf?__blob=publicationFile&amp;v=3\"> https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2021\/2021-549032-10F2.pdf?__blob=publicationFile&amp;v=3<\/p>\n<p><\/a><\/div>\n<div><\/div>\n<div><strong>The vulnerability has a threat score:<\/strong> <strong style=\"color: #ff0048;\">10 out of 10<\/strong><\/div>\n<\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-text-transform:none;\"><div><\/div>\n<div><b><span style=\"color: rgb(59, 114, 182);\">Description:<\/span><span style=\"background-color: rgba(255, 255, 255, 0); color: rgb(59, 114, 182); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); letter-spacing: var(--body_typography-letter-spacing);\"> <\/span><\/b><\/div>\n<div>\n<p>log4j is a framework for logging application messages in Java. Within many open source and commercial software products, it has become a de facto standard over the years. log4j is considered a pioneer for other logging frameworks, even in other programming languages.<\/p>\n<p><b>What does this mean in plain language:<\/b><\/p>\n<p>Currently, hackers from all over the world are trying to scan systems accessible from the Internet to detect the vulnerability. Our customers and ourselves will also be affected by these scans.<\/p>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-6\" style=\"--awb-text-transform:none;\"><div><\/div>\n<div><b><span style=\"color: rgb(59, 114, 182);\">The bad news first:<\/span><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); letter-spacing: var(--body_typography-letter-spacing);\"> <\/span><\/b><\/div>\n<div>\n<p>The above technology is used by just about every major software vendor in some of their products: VMWare, Cisco, Unifi, SAP, and and and.<\/p>\n<p>If the vulnerability is found, it can be exploited to execute unrestricted code on the target system. This means you can do whatever you want with the system. e.g. copy the complete customer database, steal patents or spy out access data, e.g. for online banking.<\/p>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-8\" style=\"--awb-text-transform:none;\"><div><\/div>\n<div><b><span style=\"color: rgb(59, 114, 182);\">The good news:<\/span><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); letter-spacing: var(--body_typography-letter-spacing);\"> <\/span><\/b><\/div>\n<div>\n<p>CosH&#8217;s IT security team has been busy analyzing the vulnerability since Sunday.<\/p>\n<p>The most important thing is that you and your colleagues remain calm.<\/p>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-10\" style=\"--awb-text-transform:none;\"><div><\/div>\n<div>One of the biggest problems with the vulnerability is that the Log4J software (or framework) is used by just about every software vendor. This means that not only the base of IT we manage is affected, but probably many of the programs you use on a daily basis.<\/div>\n<div>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-11\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-12\" style=\"--awb-text-transform:none;\"><div><strong>Customers who have active Managed Firewall and Managed Endpoint Security or SD WAN service contracts with us are gone through customer by customer.<\/strong><\/div>\n<div> <\/div>\n<div><strong style=\"color: rgb(59, 114, 182);\">We proceed as follows:<\/strong><\/div>\n<div>\n<ol>\n<li> Analysis of security protocols from firewall and endpoint security<\/li>\n<li>In case of suspicion or finding of incidents we contact you proactively by phone<\/li>\n<li>We discuss the next steps by phone<\/li>\n<\/ol>\n<div>We discuss the next steps by phone<\/div>\n<div> <\/div>\n<div>\n<div><strong>Please refrain from contacting our technicians directly by phone on the subject, we need all resources for the security checks.<\/strong><\/div>\n<div> <\/div>\n<\/div>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-13\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-14\" style=\"--awb-text-transform:none;\"><div>\n<p>So you can check via your vendor if your software uses Log4J:<\/p>\n<\/p>\n<ol>\n<li>Open Google<\/li>\n<li>Enter the following CVE code + the name of your software e.g.<\/li>\n<li>CVE-2021-44228 SAP<\/li>\n<li>If the manufacturer already has information about the gap, you will find something about it on the website.<\/li>\n<li>Follow the information and order the installation of updates for your software<\/li>\n<li>If you do not find any information, try the same the following day<\/li>\n<li>If you have not found any information after 7 days, you should contact your system vendor by email and explicitly ask if the Log4J framework is used in your software.<\/li>\n<\/ol>\n<\/div>\n<div>\n<div>\n<\/div>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-15\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-16\" style=\"--awb-text-transform:none;\"><div><\/div>\n<div>\n<p>Here are some things you might want to check:<\/p>\n<p>ERP System, CRM System, Banking Software, Time Recording Software, Accounting Payroll Software, Document Management Software, Telephony Software, Video Chat Software<\/p>\n<\/div>\n<div>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-17\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:56px;--awb-padding-bottom:23px;--awb-background-color:#3b72b6;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-info-circle fas circle-yes\" style=\"--awb-circlebordersize:1px;--awb-font-size:90px;--awb-width:0px;--awb-height:0px;--awb-line-height:-2px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-18\" style=\"--awb-text-transform:none;--awb-text-color:#ffffff;\"><p><span style=\"color: #ffffff;\"><strong>On Wednesday the 15.12.2012 from 11:00-12:00<br \/>Clock we give online information meeting on the current situation.<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">When?<\/span><br \/><span style=\"background-color: rgba(255, 255, 255, 0); color: #ffffff; font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">15.12.2021<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Time:<\/span><br \/><span style=\"background-color: rgba(255, 255, 255, 0); color: #ffffff; font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">11:00 &#8211; 12:00<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Where?<\/span><br \/><span style=\"background-color: rgba(255, 255, 255, 0); color: #ffffff; font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Online<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Everyone is welcome to participate. Just click on the button below on Wednesday at 11:00:<\/span><\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#3971b5;--button_border_color:#3971b5;--button_accent_hover_color:#3971b5;--button_border_hover_color:#3971b5;--button_gradient_top_color:#ffffff;--button_gradient_bottom_color:#ffffff;--button_gradient_top_color_hover:#ffffff;--button_gradient_bottom_color_hover:#ffffff;\" target=\"_self\" href=\"https:\/\/cosh.de\/en\/contact\/#kontaktformular\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Request participation link<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:51px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-column-inner-bg-wrapper\" style=\"--awb-padding-top:28px;--awb-padding-right:28px;--awb-padding-bottom:28px;--awb-padding-left:28px;--awb-inner-bg-color:#2465b5;--awb-inner-bg-color-hover:#2465b5;--awb-inner-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"https:\/\/cosh.de\/en\/firewall-as-a-service\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-19\" style=\"--awb-content-alignment:center;--awb-text-transform:none;--awb-text-color:#ffffff;\"><p>More information about Managed Firewall<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-column-inner-bg-wrapper\" style=\"--awb-padding-top:28px;--awb-padding-right:28px;--awb-padding-bottom:28px;--awb-padding-left:28px;--awb-inner-bg-color:#2465b5;--awb-inner-bg-color-hover:#2465b5;--awb-inner-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"https:\/\/cosh.de\/en\/managed-endpoint-security\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-20\" style=\"--awb-content-alignment:center;--awb-text-transform:none;--awb-text-color:#ffffff;\"><p>More information about Endpoint Security<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-column-inner-bg-wrapper\" style=\"--awb-padding-top:28px;--awb-padding-right:28px;--awb-padding-bottom:28px;--awb-padding-left:28px;--awb-inner-bg-color:#2465b5;--awb-inner-bg-color-hover:#2465b5;--awb-inner-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><span class=\"fusion-column-inner-bg hover-type-none\"><a class=\"fusion-column-anchor\" href=\"https:\/\/cosh.de\/en\/hornetsecurity\/\"><span class=\"fusion-column-inner-bg-image\"><\/span><\/a><\/span><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-21\" style=\"--awb-content-alignment:center;--awb-text-transform:none;--awb-text-color:#ffffff;\"><p>More information about Hornet Security<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":8952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[398,399],"tags":[442,446,439,443,403,441,438,448,444,440,447,445],"class_list":["post-10983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-news","tag-cybersecurity-en","tag-exploit-en","tag-hacker-en","tag-hardware-en","tag-it-en","tag-log4j-en","tag-malware-en","tag-security-gap","tag-software-en","tag-virus-en","tag-weak-point","tag-zero-day-exploit-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attention: Federal Office warns about massive and dangerous IT security vulnerability &quot;Log4j - CosH Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cosh.de\/log4j-sicherheitswarnung\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attention: Federal Office warns about massive and dangerous IT security vulnerability &quot;Log4j - CosH Information Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cosh.de\/log4j-sicherheitswarnung\/\" \/>\n<meta property=\"og:site_name\" content=\"CosH Information Technology\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T16:40:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-27T13:11:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cosh.de\/wp-content\/uploads\/2021\/12\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eduard Horn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eduard Horn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/\"},\"author\":{\"name\":\"Eduard Horn\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/6e32ebc456f989dcd4a66259115b0570\"},\"headline\":\"Attention: Federal Office warns about massive and dangerous IT security vulnerability &#8220;Log4j\",\"datePublished\":\"2021-12-13T16:40:03+00:00\",\"dateModified\":\"2022-04-27T13:11:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/\"},\"wordCount\":3469,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg\",\"keywords\":[\"cybersecurity\",\"exploit\",\"Hacker\",\"hardware\",\"IT\",\"Log4J\",\"Malware\",\"security gap\",\"software\",\"Virus\",\"weak point\",\"zero day exploit\"],\"articleSection\":[\"Blog posts\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/\",\"url\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/\",\"name\":\"Attention: Federal Office warns about massive and dangerous IT security vulnerability \\\"Log4j - CosH Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg\",\"datePublished\":\"2021-12-13T16:40:03+00:00\",\"dateModified\":\"2022-04-27T13:11:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/6e32ebc456f989dcd4a66259115b0570\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg\",\"contentUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cosh.de\\\/log4j-sicherheitswarnung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cosh.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attention: Federal Office warns about massive and dangerous IT security vulnerability &#8222;Log4j\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\",\"url\":\"https:\\\/\\\/cosh.de\\\/\",\"name\":\"CosH Information Technology\",\"description\":\"IT-Dienstleister &amp; Service Provider N\u00fcrnberg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cosh.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/6e32ebc456f989dcd4a66259115b0570\",\"name\":\"Eduard Horn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/11b52a467dc04519233801448d4b76f9a57e25ca0624c52c208f20c8c3aca609?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/11b52a467dc04519233801448d4b76f9a57e25ca0624c52c208f20c8c3aca609?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/11b52a467dc04519233801448d4b76f9a57e25ca0624c52c208f20c8c3aca609?s=96&d=mm&r=g\",\"caption\":\"Eduard Horn\"},\"url\":\"https:\\\/\\\/cosh.de\\\/en\\\/author\\\/e-horn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attention: Federal Office warns about massive and dangerous IT security vulnerability \"Log4j - CosH Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/","og_locale":"en_US","og_type":"article","og_title":"Attention: Federal Office warns about massive and dangerous IT security vulnerability \"Log4j - CosH Information Technology","og_url":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/","og_site_name":"CosH Information Technology","article_published_time":"2021-12-13T16:40:03+00:00","article_modified_time":"2022-04-27T13:11:48+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/cosh.de\/wp-content\/uploads\/2021\/12\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg","type":"image\/jpeg"}],"author":"Eduard Horn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eduard Horn","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/#article","isPartOf":{"@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/"},"author":{"name":"Eduard Horn","@id":"https:\/\/cosh.de\/#\/schema\/person\/6e32ebc456f989dcd4a66259115b0570"},"headline":"Attention: Federal Office warns about massive and dangerous IT security vulnerability &#8220;Log4j","datePublished":"2021-12-13T16:40:03+00:00","dateModified":"2022-04-27T13:11:48+00:00","mainEntityOfPage":{"@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/"},"wordCount":3469,"commentCount":0,"image":{"@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2021\/12\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg","keywords":["cybersecurity","exploit","Hacker","hardware","IT","Log4J","Malware","security gap","software","Virus","weak point","zero day exploit"],"articleSection":["Blog posts","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cosh.de\/log4j-sicherheitswarnung\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/","url":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/","name":"Attention: Federal Office warns about massive and dangerous IT security vulnerability \"Log4j - CosH Information Technology","isPartOf":{"@id":"https:\/\/cosh.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/#primaryimage"},"image":{"@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2021\/12\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg","datePublished":"2021-12-13T16:40:03+00:00","dateModified":"2022-04-27T13:11:48+00:00","author":{"@id":"https:\/\/cosh.de\/#\/schema\/person\/6e32ebc456f989dcd4a66259115b0570"},"breadcrumb":{"@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cosh.de\/log4j-sicherheitswarnung\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/#primaryimage","url":"https:\/\/cosh.de\/wp-content\/uploads\/2021\/12\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg","contentUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2021\/12\/hacker-attack-computer-hardware-microchip-while-process-data-through-internet-network-3d-rendering-insecure-cyber-security-exploit-database-breach-concept-virus-malware-unlock-warning-screen.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/cosh.de\/log4j-sicherheitswarnung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cosh.de\/en\/"},{"@type":"ListItem","position":2,"name":"Attention: Federal Office warns about massive and dangerous IT security vulnerability &#8222;Log4j"}]},{"@type":"WebSite","@id":"https:\/\/cosh.de\/#website","url":"https:\/\/cosh.de\/","name":"CosH Information Technology","description":"IT-Dienstleister &amp; Service Provider N\u00fcrnberg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cosh.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cosh.de\/#\/schema\/person\/6e32ebc456f989dcd4a66259115b0570","name":"Eduard Horn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/11b52a467dc04519233801448d4b76f9a57e25ca0624c52c208f20c8c3aca609?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/11b52a467dc04519233801448d4b76f9a57e25ca0624c52c208f20c8c3aca609?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11b52a467dc04519233801448d4b76f9a57e25ca0624c52c208f20c8c3aca609?s=96&d=mm&r=g","caption":"Eduard Horn"},"url":"https:\/\/cosh.de\/en\/author\/e-horn\/"}]}},"_links":{"self":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/10983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/comments?post=10983"}],"version-history":[{"count":5,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/10983\/revisions"}],"predecessor-version":[{"id":10988,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/10983\/revisions\/10988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media\/8952"}],"wp:attachment":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media?parent=10983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/categories?post=10983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/tags?post=10983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}