Log4j CVE-2021-44228

Iā€™m now at product and content version 6.6.120 and the remote check still isnā€™t showing ANY positive results. If the developers think itā€™s supposed to work, how can we troubleshoot why it isnā€™t.

Hi Holly, Iā€™ve actually been testing this for the first time. The idea is to do targeted scans on systems that may be vulnerable. Where are the results populated at? Iā€™m doing something as simple of searching for r7test.txt in the file system and I canā€™t seem to tell if it worked or not.

I donā€™t see the Windows File System Search checkbox on the General tab of the Scan Template. Do I need to update to get this option?
Or should it be ā€œEnable Windows services during a scanā€ ?

Scan for Log4j CVE-2021-44228 (Log4Shell) | InsightVM Documentation (rapid7.com)

snippet:

To detect Log4Shell on Windows, enable Windows File Search.

To detect the Apache Log4j CVE-2021-44228 (Log4Shell) vulnerability on Windows devices, you must enable the Windows File System Search to allow scan engines to search all local file systems for specific files on Windows assets.

Searching file systems increases scan time and resource utilization

Searching entire file systems across all of your Windows assets is an intensive process that increases scan times and resource utilization.

  1. On the General tab, select the Windows File System Search checkbox.
  2. Review the warning text to determine whether you want to enable this option.
  3. To enable this feature, click OK.
  4. To cancel enabling, click Cancel.

Ok found out I need scan engine version 6.6.121

You need to update your console to version
6.6.121 and then update your scan engines. Once your console is updated, youā€™ll see this option.

1 Like

You may have seen this in InsightVM with the latest release (and I know it was mentioned just above ^^) but we have an update: :mega:

With product version 6.6.121, we have made updates to add an authenticated check for CVE-2021-44228 on Windows devices. This update provides the option to enable Windows File System Search to allow scan engines to search your local filesystems for specific files on Windows assets. Scan engines and consoles should be updated to version 6.6.121 for this, which will require a restart. Windows File System Search must be enabled in the scan template for this check, and WMI needs to be enabled in your environment.

Since Windows filesystem searches can be resource intensive, thereā€™s the potential that these scans will take longer than usual. If you have any concerns about scan time or impact on your devices, you can always stop the scan and disable Windows File System Search.

Iā€™ll continue sharing more info as we have it. Appreciate everyoneā€™s patience as weā€™ve been working on getting this out!

1 Like

Can confirm the windows authenticated scan identified our test system we stood up as vulnerable.

5 Likes

was your scans authenticated? Iā€™m not finding the un-auth vuln check working. Auth check finds, un-auth does not. 13456 not being blocked, ran wireshark on scan engine.

For Linux systems does it only work with the Insight Agent?

I have results from the Insight Agent. But when I scan the same systems with the scan engine it doesnā€™t find anything. And after integrating the results the information found via the Insight Agent is removed.

The Windows authenticated check appears to work but if thereā€™s an agent installed and it does a sync, the vulnerable is removed in the console.

1 Like

I noticed the same issue.

:mega: We have updated the Insight Agent data collection on Windows to support a new vulnerability check for CVE-2021-44228 (Log4Shell)! This functionality is available with version 3.1.2.38 of the Insight Agent.

If your organization relies on Insight Agents for vulnerability management, consider setting the Throttle level to High (this is the default) to ensure your agents get the update as quickly as possible. For more information, see Agent Management Settings in the Insight Agent documentation.

2 Likes

Hi Gina, with the update and the insight agent, will it do a file system level check for the affected log4j files or do we still need to run a scan with windows file search?

Do we need to give the file path to search for file searching option in template.

File searching
I am also not able to find the option, Attaching the screenshot. @gina_seiber can you help us on this?..

Please enable the windows file searching option which is in general tab of the template.

Can the agent based file search scan be modified to find older version of log4j to include version 1.2 in reference to CVE-2021-4104?

1 Like

Make sure youā€™re updated and look for the option in the General tab. The File Searching tab is legacy. From what support told me.

Rapid7 is not scanning for any Log4J assets that are vulnerableā€¦implemented all the steps as suggested by the Rapid7 blog. Can anyone help? I am now relying on SCCM as it is giving me a good list of all Log4J components on Windows assets but what about Network and Unix devices? @rapid7_sales @rapid7vm_rapid7vm @rapid7_admin @gina_seiber

Does the Windows authenticated check and/or agent search drives other than C:?