BlogCybersecurity
Security questionnaire overload? Know your options.
5 Minute Read
Read Security questionnaire overload? Know your options.Cybersecurity
By CORL Technologies | December 13, 2021
A far-spanning zero-day vulnerability was exposed over the weekend for the ubiquitous open-sourced logging utility called Log4j. Log4j is a java-based utility deployed in many application implementations including popular Apache web application platforms.
CORL is actively working with our customers and vendor population to understand the extent of the deployment of Log4j in the vendor community and the impact and risk exposure it may create for our customers.
This blog provides a short summary of the Log4j vulnerability, as well as recommendations for remediation and risk mitigation for organizations and their third-party vendors.
Log4j is a java-based logging framework developed by Apache and used by many enterprise applications, web applications, and cloud-hosted applications. More specifically, Log4j is a java library that logs and keeps a record of application events that can be used for debugging, troubleshooting, security, and other purposes.
The recently discovered vulnerability is rated critical by the US Cybersecurity & Infrastructure Agency (CISA) due to the wide deployment of the popular open-sourced library coupled with the relative ease of exploitation. A specially crafted code string sent to a vulnerable server can allow attackers to gain full control over the target device and application(s).
Attackers have begun to exploit vulnerable systems and applications using Log4j and more automated and widespread exploits are expected in the coming days. Some reports indicate that attackers may have started exploiting the vulnerability in botnets as early as December 1.
Affected systems and services include those that use the Java logging library, Apache Log4j between versions 2.0 and 2.14.1.
Attackers have been actively targeting the supply chain and vendors that support critical infrastructure including healthcare over the last several years. Other successful attacks against major IT providers including SolarWinds, Microsoft, Kaseya, and others have exposed the critical dependency that healthcare organizations have on third-party vendors.
The exploitation of the Log4j vulnerability could allow attackers to gain full administrative control of applications that contain patient information or host or manage critical business and clinical functions for healthcare entities. This could serve as a source of data breach and a platform to launch ransomware and other malicious attacks.
The successful exploitation of Log4j vulnerabilities could also introduce potential regulatory exposure for the breach of Protected Health Information (PHI), reputational damage for breached patient information, financial loss, and operational disruption caused to system downtime and compromise.
CORL recommends requesting the following information, at a minimum, from third-party vendors in relation to the Log4j vulnerability (CVE-2021-44228):
CORL is continuing to monitor the situation as it unfolds and will be publishing and updating guidance as more information becomes available.
In order to combat these growing supply chain risks, CORL has developed a proprietary data clearinghouse that provides with access to vendor risk assessment results of over 80,000 vendor assessments CORL has conducted. Each year, CORL conducts thousands more vendor risk assessments on behalf of our clients. Chances are very high that we have already assessed a substantial portion of your existing and new vendors from a security, risk, and compliance perspective.
CORL’s tech-enabled managed services and next-generation exchange of vendor risk data allows healthcare entities to:
Contact our team here at CORL to learn more about our managed services and next-generation exchange for healthcare vendor risk data that gets results with regulatory compliance and lowers supply chain risks.
CORL Technologies
CORL transforms TPRM chaos into clarity
CORL is a leading provider of vendor risk management solutions for the healthcare industry. CORL gets results by scaling organizational and vendor risk programs through our healthcare vendor risk clearinghouse solution, dashboard reporting that business owners can understand, and proven workflows that drive measurable risk reduction. CORL accelerates the speed of vendor risk assessments and holds vendors accountable for remediating risk exposures.
Related Posts
BlogCybersecurity
By CORL Technologies | August 9, 2024
5 Minute Read
Read Security questionnaire overload? Know your options.BlogTPRM
By CORL Technologies | June 19, 2024
5 Minute Read
Read Essential Guide for Vendors: Key Features to Look for in a Cyber Security Assessment Tool for Healthcare TPRMBlogCybersecurity
By CORL Technologies | February 12, 2024
3 Minute Read
Read Do You Understand Your Vendors’ SOC 2 Reports?Webinars
WEBINAR A High-Velocity Approach to TPRM When healthcare organizations think of TPRM, the last thing they think of is ‘fast.’ Instead, today’s approaches to TPRM are exceedingly resource-intensive, expensive, ineffective, and slow. The laggard pace of TPRM is a stark contrast to the rapid pace of innovation in healthcare, which is essential to powering new […]