The Cybersecurity and Infrastructure Security Agency has created a webpage to provide the latest public information and vendor-supplied advisories on a critical remote code execution vulnerability affecting Apache Log4j software library versions 2.0-beta9 to 2.14.1. CISA urges organizations to review the webpage and immediately upgrade to Log4j version 2.15.0 or apply the appropriate vendor-recommended mitigations, because an unauthenticated remote actor could exploit this vulnerability to take control of an affected system. CISA and its Joint Cyber Defense Collaborative partners are tracking the vulnerability, and CISA will continue to update the webpage as additional information becomes available. Log4j is broadly used in a variety of consumer and enterprise services, websites, applications and operational technology products to log security and performance information. For more information on this or other cyber and risk issues, contact John Riggi, senior advisor for cybersecurity and risk, at jriggi@aha.org

Related News Articles

Headline
The Department of Justice July 25 announced the indictment of North Korean national Rim Jong Hyok for allegedly conspiring to hack and extort U.S. hospitals…
Headline
The cybersecurity firm CrowdStrike July 24 posted online a preliminary post-incident report  following a non-malicious global technology outage which…
Headline
There has been a sharp uptick this year in ruthless tactics by cybercriminals, who are now directly threatening patients with the release of sensitive…
Headline
The AHA July 24 shared information and new offerings from some of its private sector partners that can help hospitals and health systems strengthen their…
Headline
AHA President and CEO Rick Pollack opened the 2024 AHA Leadership Summit in San Diego discussing the similarities of the U.S. Navy Seals to the hospital field…
Headline
A non-malicious global technology outage that began in the early morning of July 19 is continuing to affect many industries and is having varying effects on…