

This made it very hard and time consuming for security teams to discover, track and patch all instances of the flaw on their networks, especially since they depended on fixes being released by a wide range of software vendors. However, security experts warned at the time that the issue will likely have a long-term impact since Log4j was used in millions of Java-based corporate applications and third-party products. The vulnerability was originally reported in late November as a zero-day and was patched in Log4j on December 6, triggering an industry-wide patch and mitigation response. The Log4Shell vulnerability, tracked as CVE-2021-44228, is a critical remote code execution flaw in a widely used Java logging library called Log4j. "During remote support, CISA confirmed the organization was compromised by malicious cyber actors who exploited Log4Shell in a VMware Horizon server that did not have patches or workarounds applied." The long tail of Log4Shell "From May through June 2022, CISA provided remote incident support at an organization where CISA observed suspected Log4Shell PowerShell downloads," the agency said in a report this week. The agency published indicators of compromise (IOCs) collected from incidents it investigated as recently as June, highlighting the long-lasting impact of this vulnerability that's over six months old. The US Cybersecurity and Infrastructure Security Agency (CISA) has been investigating attacks exploiting the Log4Shell vulnerability in third-party products like VMware Horizon and Unified Access Gateway (UAG).
