Mother of all dumpster fires
"The vulnerability is one of the most serious that I've seen in my entire career, if not the most serious," according to the director of US cybersecurity and infrastructure agency, CISA. Jen Easterly (a 20-year cybersecurity veteran) was describing a truly horrible problem with log4j, a ubiquitous utility for logging error messages in applications. "We expect the vulnerability to be widely exploited by sophisticated actors and we have limited time to take necessary steps in order to reduce the likelihood of damage," she said in a call with US critical infrastructure owners and operators.
Security folk have been trying to find analogies to convey the severity of the problem. We liked this one; "Imagine there is a specific kind of bolt used in most of the cars and car parts in the world and they just said that bolt needs to be replaced." And, as a wit added, "Also if someone were to whisper a couple specific words at the car, it unlocks the car and lets them drive away. And if the criminal is smart enough, the car gives them directions to your house and can steal all your belongings." Given just how widely log4j is used, you might be mildly surprised to learn it's an open source module, maintained by a few unfunded volunteers but used pretty much everywhere.
What makes the issue so serious is that it's childishly simple to exploit, but fiendishly difficult to fix. Indeed, using the car analogy, the bolt may be embedded so deeply that manufacturers may have no idea they've used it. Criminals and nation states are already reported to be exploiting the problem, with efforts focussed on the US and the UK. Malwarebytes has a guide for small businesses that explains how best they can protect themselves. The Dutch National Cyber Security Center has an exhaustive list of software that is (or not) affected by the vulnerability. The extent of log4j's use might be best illustrated by the fact that it's even reached Mars, where it's part of the software running the 'Ingenuity' helicopter.