4 Ways to Manage the Impact of Log4j in OT Environments
Learn the steps asset owners should take to mitigate the Log4j vulnerability in OT environments with OT-safe practices.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
Over the past week, the cyber security community has been chasing remediation measures for the Log4j vulnerability present in the libraries of many applications. This note is not intended to parse the details of this vulnerability and its potential impact on the huge array of systems impacted. There are many very good articles, including those by CISA and others that do a great job of that. For more information we recommend the following articles:
Our focus is how our customers and other industrial organizations similarly situated might address the challenges most effectively.
First, a quick note on the challenge of this particular vulnerability. Log4j exists within a library that other applications use for a variety of tasks. Most end-users – and in fact many software companies themselves – are unaware that the applications utilize or require this library, or at least the vulnerable version of it.
Second, the library cannot be updated without updating the application. Third, identifying where the library has significant challenges due to the depth and breadth one must search to find it.
There are many methods that have been offered to protect organizations from the threat posed by Log4j, the CISA guidance being a very good source.
However, to truly protect the endpoint, the organization must find these libraries and patch or update them in most cases by updating the application. Many vendors have issued alerts to their customers and publicly announced their applications are vulnerable, offering customers an initial list to search. But many vendors are uncertain if the vulnerability will impact their products, so the list is still very incomplete.
Efforts in IT to find this have included adding the publicly announced software vulnerabilities into the databases of common vulnerability assessment products, trying to monitor traffic to find active exploits or presence of the library, and through scanning devices to identify the presence of the library on that system.
The first approach is a great start but has significant gaps and potential errors depending on the level of automation desired. The second helps prioritize where to go deeper and could identify an active exploit but may occur after the horse has left the barn, so to speak.
The third approach via scanning creates significant stress and system impact:
In the environments in which Verve and its clients operate – critical infrastructure, industrial controls, etc. – these scanning technologies would cause significant operational challenges and there is no way an organization could run the common scanners on all devices given the length of time and system impact. Therefore, we have taken a different approach.
The approach leverages the 360-degree risk view that is part of the Verve platform. Using our agent and agentless capabilities as well as our real-time monitoring of network AND endpoint behavior, we narrow down the targets, reduce the system impact and sequentially work through this challenge.
The approach, in short, is as follows:
The industry needs lots of ideas to address this significant risk. This is our contribution to the effort. We look forward to continuing to work with others to push the boundaries on what is feasible, especially in sensitive OT environments.
Learn the steps asset owners should take to mitigate the Log4j vulnerability in OT environments with OT-safe practices.
Learn MoreLearn why OT systems management is a better solution than passive anomaly detection for managing OT security environments.
Learn MoreYour comprehensive guide to OT patch management: Challenges, strategies, and best practices for securing industrial systems.
Learn More