<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136200#M24366</link>
    <description>&lt;P&gt;I just listed to SANS podcast on the exploit, they mentioned that client apps could also be vulnerable. Has Check Point confirmed that SmartConsole or CPUSE are not vulnerable?&lt;/P&gt;</description>
    <pubDate>Mon, 13 Dec 2021 18:17:40 GMT</pubDate>
    <dc:creator>David_C1</dc:creator>
    <dc:date>2021-12-13T18:17:40Z</dc:date>
    <item>
      <title>CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136003#M24314</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;
&lt;P&gt;I guess most of you have already seen the fresh CVE-2021-44228 - Log4j vulnerability - Log4Shell and thought about the impact it will have in the enterprise application landscape.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-44228&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/" target="_blank" rel="noopener"&gt;https://www.lunasec.io/docs/blog/log4j-zero-day/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Maybe we can use this thread to get a first statement from Check Point regarding their products (and later links to SKs) as well as discuss (probably IPS) mitigations.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 12:54:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136003#M24314</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-12-10T12:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136006#M24315</link>
      <description>&lt;P&gt;Checking&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 12:57:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136006#M24315</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-12-10T12:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136023#M24319</link>
      <description>&lt;P&gt;Is there any update on this ? I have already seen the exploit being used in the wild. When an attack does try to use the exploit inside a http header the ips blade of checkpoint does flag this as a "http headers remote code execution" protection so it might be a good idea to enable this.&lt;BR /&gt;There are a lot of reports of high profile companies that are vulnerable for this exploit&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/YfryTchsGD/Log4jAttackSurface" target="_blank" rel="noopener"&gt;https://github.com/YfryTchsGD/Log4jAttackSurface&lt;/A&gt;&lt;/P&gt;&lt;P&gt;i hope we will get good news from checkpoint asap.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 16:57:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136023#M24319</guid>
      <dc:creator>warheart6</dc:creator>
      <dc:date>2021-12-10T16:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136024#M24320</link>
      <description>&lt;P&gt;It does take time to investigate and come up with a comprehensive response. Please be patient, thanks&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 17:09:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136024#M24320</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-12-10T17:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136025#M24321</link>
      <description>&lt;P&gt;I would assume priority will be looking at patching requirements since log4j is used on Management/Gateways by Solr and postgresql&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 17:13:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136025#M24321</guid>
      <dc:creator>Alex_Lewis</dc:creator>
      <dc:date>2021-12-10T17:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136026#M24322</link>
      <description>&lt;P&gt;I doubt log4j is used on the gateway side (except for standalone deployments)..., but I could be wrong there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit:&amp;nbsp;&lt;SPAN&gt;sk176865 confirms this doubt... It's only used on the management side by management processes. And not vulnerable.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 11:37:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136026#M24322</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2021-12-11T11:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136028#M24323</link>
      <description>&lt;P&gt;I also doubt it is used on gateway, but the log4j jar files do exist there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 17:49:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136028#M24323</guid>
      <dc:creator>Alex_Lewis</dc:creator>
      <dc:date>2021-12-10T17:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136039#M24325</link>
      <description>&lt;P&gt;1. The IPS signature is available right NOW!&lt;/P&gt;
&lt;P&gt;2. sk176865 is the Check Point response to Apache Log4j Remote Code Execution (CVE-2021-44228) accessible here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:36:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136039#M24325</guid>
      <dc:creator>XavierBens</dc:creator>
      <dc:date>2021-12-10T21:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136040#M24326</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:44:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136040#M24326</guid>
      <dc:creator>Kevin_Tobin</dc:creator>
      <dc:date>2021-12-10T21:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136041#M24327</link>
      <description>&lt;P&gt;Thanks for getting the protection out so soon. Will this also work for HTTPS connections when there is no HTTPS inspection active on the firewall for this incoming traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:46:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136041#M24327</guid>
      <dc:creator>Ewald_Beekman</dc:creator>
      <dc:date>2021-12-10T21:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136042#M24328</link>
      <description>&lt;P&gt;Does the Apache mitigation (patch and command line option) apply to Checkpoint Software as well?&lt;/P&gt;&lt;P&gt;Is checkpoint sofware itself vounrable?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:50:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136042#M24328</guid>
      <dc:creator>haakonr</dc:creator>
      <dc:date>2021-12-10T21:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136046#M24329</link>
      <description>&lt;P&gt;For me, the most important part is still missing. Starting from R80.40, Endpoint Management seems to use log4j 2.12, which is vulnerable. Depending on your setup (or if you have an EPM as MaaS) that may be vulnerable. Starting with R81 SOLR also uses log4j 2. What's the impact on Check Point's own products?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 23:44:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136046#M24329</guid>
      <dc:creator>Axel_Engeland</dc:creator>
      <dc:date>2021-12-10T23:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136054#M24330</link>
      <description>&lt;P&gt;Before we update the SK with full details, we have to check a number of products/features to ensure they are not vulnerable.&lt;BR /&gt;At least management wise, we are not using log4j in a way that is vulnerable to this exploit.&lt;BR /&gt;That said, we'll upgrade log4j most likely as part of the JHF.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 07:13:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136054#M24330</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-11T07:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136056#M24332</link>
      <description>&lt;P&gt;This ain't going to be fun. Already at home I found 4 instances of log4j and I haven't even started analysing docker containers or appliances.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 08:23:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136056#M24332</guid>
      <dc:creator>Martin_Seeger</dc:creator>
      <dc:date>2021-12-11T08:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136063#M24333</link>
      <description>&lt;P&gt;As far as I see sk176865 is now fully updated and no vulnerabilities have been found. That's a relieve. Thanks for the hard work!&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 10:42:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136063#M24333</guid>
      <dc:creator>Axel_Engeland</dc:creator>
      <dc:date>2021-12-11T10:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136064#M24334</link>
      <description>&lt;P&gt;Hi, thanks for all the hard work. Can you confirm that the IPS protection will work even when the incoming traffic is HTTPS and there is no HTTPS traffic inspection active on the firewall? Or will it only help us with HTTP in that scenario?&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 10:51:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136064#M24334</guid>
      <dc:creator>Ewald_Beekman</dc:creator>
      <dc:date>2021-12-11T10:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136065#M24335</link>
      <description>&lt;P&gt;I think it doesn't work as I tested the example scripts that are on Github and the IPS didn't do anything (we don't have any HTTP hosts around). The question is if the protection applies on the incoming request itself or after the response of the vulnerable system. I couldn't validate that as we haven't found any system that seems to be vulnerable.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 11:07:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136065#M24335</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2021-12-11T11:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136068#M24336</link>
      <description>&lt;P&gt;From&amp;nbsp;&lt;SPAN&gt;sk176865:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;Check Point Products Status&lt;/H3&gt;
&lt;TABLE class="footnote" border="1" width="50%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR class="SubTitle" align="center" bgcolor="#f7f5f5"&gt;
&lt;TD width="55%"&gt;Product&lt;/TD&gt;
&lt;TD width="45%"&gt;Status&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Quantum Security Gateway&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Quantum Security Management&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;CloudGuard&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Infinity Portal&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Harmony Endpoint &amp;amp; Harmony Mobile&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;SMB&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;ThreatCloud&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 14 Dec 2021 09:43:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136068#M24336</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-12-14T09:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136075#M24339</link>
      <description>&lt;P&gt;I would also appreciate a response from Check Point to the question if the IPS signature will work when not using HTTPS traffic inspection.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 15:11:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136075#M24339</guid>
      <dc:creator>PatrickJ</dc:creator>
      <dc:date>2021-12-11T15:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136082#M24341</link>
      <description>&lt;P&gt;Assuming I'm understanding the attack technique correctly, if the initial exploit is delivered inside an HTTPS connection, that delivery takes place well after the HTTPS negotiation and both sides have started encryption; pretty sure there is going to be no way to detect that stage via IPS unless HTTPS Inspection is enabled.&lt;/P&gt;
&lt;P&gt;However when the vulnerable server is tricked into retrieving the Java class to be injected via JNDI using a ldap://1.2.3.4/ URL that will be in the clear, and perhaps can be detected by the IPS signature if it is configured to do so.&amp;nbsp; Gets more murky if ldaps://1.2.3.4/ is used in the exploit, but I don't think that will work since JNDI will probably not trust the certificate of the attacker's system and the ldaps connection will fail to deliver the injected content.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 22:51:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136082#M24341</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-12-11T22:51:48Z</dc:date>
    </item>
  </channel>
</rss>

