The Cybersecurity and Infrastructure Security Agency has created a webpage to provide the latest public information and vendor-supplied advisories on a critical remote code execution vulnerability affecting Apache Log4j software library versions 2.0-beta9 to 2.14.1. CISA urges organizations to review the webpage and immediately upgrade to Log4j version 2.15.0 or apply the appropriate vendor-recommended mitigations, because an unauthenticated remote actor could exploit this vulnerability to take control of an affected system. CISA and its Joint Cyber Defense Collaborative partners are tracking the vulnerability, and CISA will continue to update the webpage as additional information becomes available. Log4j is broadly used in a variety of consumer and enterprise services, websites, applications and operational technology products to log security and performance information. For more information on this or other cyber and risk issues, contact John Riggi, senior advisor for cybersecurity and risk, at jriggi@aha.org

Related News Articles

Headline
In a statement submitted to the Senate Health, Education, Labor and Pensions Committee for a hearing today on health care cybersecurity and patient privacy,…
Headline
Cyberattacks on hospitals are urgent threats to patient safety, care delivery and public trust. In this conversation, Ajay Gupta, board chair of Trinity Health…
Headline
The Food and Drug Administration yesterday released a safety notice announcing a software patch is available to address cybersecurity vulnerabilities in…
Headline
The Cybersecurity and Infrastructure Security Agency, FBI, Department of Defense Cyber Crime Center and the National Security Agency June 30 released a fact…
Headline
The Centers for Medicare & Medicaid Services today announced it has identified a fraud scheme targeting Medicare providers and suppliers. CMS said scammers…
Headline
The FBI, Cybersecurity and Infrastructure Security Agency and Australian Cyber Security Centre June 4 released an advisory on updated actions and tactics used…