关于 CVE-2021-44228 Log4j2 漏洞的相关应对汇总说明(包含中英文客户公告)

微软产品团队和安全团队正在积极的调查本次事件,以下是截止到目前的最新信息:

  1. 在微软产品方面,目前尚未发现有产品受到本次漏洞的影响,包括(Azure Application Gateway, Azure Front Door, Azure WAF, Azure App Service (Windows and Linux), Azure App Service for Containers, Azure Functions),我们仍在持续调查中,如果有更新的信息会第一时间进行通知。
  2. 针对操作系统及IaaS VM安全层面,我们于昨晚发布了安全情报更新版本1.355.99.0 ,以抑制相关的漏洞攻击和恶意软件攻击行为。所有Windows系统内置的Microsoft Defender 反病毒组件、Microsoft Defender for Endpoint(Windows和Linux系统),以及与MDE集成的Microsoft Defender for Cloud中的Defender for Server 组件,均可以通过默认的自动更新获得本次更新。我们也持续的分析和调查本次事件相关的攻击行为,因此也在持续的更新我们的安全情报,在我写这封邮件时,最新的版本已经是1.355.128.0

  1. 在Azure网络安全方面,
    1. 同样的,我们为 Azure Firewall Premium IDPS (Intrusion Detection and Prevention System) 功能发布了最新的安全情报更新,如下图所示,可以通过 Azure Firewall Premium IDPS 功能直接在网络层面拦截相关攻击行为,该功能为自动更新,无需额外操作。IDPS 策略模式建议设置为Alert and deny。

    1. 针对 Azure WAF,我们第一时间提供了快速抑制攻击行为的相关自定义检测和阻止规则,目前产品组正在评估和更新相关托管规则(Managed Rule Set)。

•     Custom rule name:

DenyLog4j20day

•     Match Type:

String

•     Match variable:

RequestBody, RequestUri

•     Operation:

Is

•     Operator:

Regex

•     Transformations:

Lowercase

•     Match Values:

\$\s*{\s*jndi\s*:\s*(ldap|ldaps|rmi|iiop|iiopname|corbaname|dns|nis):

•     Then:

Log traffic only – for test first

  1. 在Azure安全监测与运营方面,
    1. 与其他恶意攻击行为一样,我们可以通过 Microsoft Defender for Cloud 来监测和警告相关恶意攻击行为,例如恶意的进程执行/文件下载/网络连接/C2连接等等。

因此后续建议包括:

  1. 请客户评估CVE-2021-44228 Log4j2 漏洞对自身所拥有的相关应用和系统的影响。更为详细的信息,可以参考:

CVE-2021-44228 Log4j2 漏洞

https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228

  1. 在操作系统和IaaS 方面,请客户确保在操作系统或者IaaS VM 层面,Microsoft Defender 反病毒组件或者Microsoft Defender for Endpoint 已启用自动更新;
  2. 在Azure网络安全方面,请客户部署并使用Azure Firewall Premium IDPS 功能,或在 Azure WAF 上部署相关检测或阻止策略(参考以上内容);
  3. 启用 Microsoft Defender for Cloud 的相关功能,以实现针对Azure环境和资源的安全监测与运营。

产品组相关公告可以参考:

Microsoft’s Response to CVE-2021-44228 Apache Log4j 2

https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/

Guidance for preventing, detecting, and hunting for CVE-2021-44228 Log4j 2 exploitation

https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/

English version:

Microsoft PG and Security team are actively engaged in this incident. Here is latest information for you:

  1. On Microsoft product security side, we are actively investigate on the effect of Log4j2 vulnerability to Microsoft product from 9 December, and no Microsoft product (Includes Azure Application Gateway, Azure Front Door, Azure WAF, Azure App Service (Windows and Linux), Azure App Service for Containers, Azure Functions) is affected so far, we are still in investigation due to complex product line in Microsoft and keep our customer updated.
  2. On OS and IaaS VM security side, We release security intelligence update version 1.355.99.0 on yesterday evening for Log4j2 related exploit and malicious activities, all built-in Microsoft Defender Anti-virus in Windows (and Server) OS, Microsoft Defender for Endpoint (For Windows and Linux OS), and Defender for Servers (For Windows and Linux OS) in Microsoft Defender for Cloud which integrated with MDE, will get this update if automatic update is enabled, and block Log4j2 vulnerability on OS level. After that release, we also continue to investigate related attack and release more security intelligence update – latest version is 1.355.128.0 when I writing this email.

  1. On Azure network security side,
    1. we also released security intelligence update for Azure Firewall premium IDPS (Intrusion Detection and Prevention System) feature. Here are the updates list, they are automatic updated and no other actions are need, just ensure IDPS mode is set to Alert or Alert and deny.

    1. For Azure WAF, we provided a custom rule for WAF to quick mitigate this vulnerability on WAF side. PG are also working for the Managed Rule Set.

•     Custom rule name:

DenyLog4j20day

•     Match Type:

String

•     Match variable:

RequestBody, RequestUri

•     Operation:

Is

•     Operator:

Regex

•     Transformations:

Lowercase

•     Match Values:

\$\s*{\s*jndi\s*:\s*(ldap|ldaps|rmi|iiop|iiopname|corbaname|dns|nis):

•     Then:

Log traffic only – for test first

  1. On Azure security detection and operation side,
    1. Like other malicious activities, Microsoft Defender for Cloud also will help on detecting related attack behavious like malicious process execution/file download/network connection/C2 connection etc.

Follow-up actions:

  1. Ensure automatic update is enabled for Microsoft Defender Anti-virus and Microsoft Defender for Endpoint.
  2. Ensure Azure Firewall Premium IDPS is enabled and set mode to Alert or Alert and Deny, create custom rule on WAF for quick detection or mitigation.
  3. Enable Microsoft Defender for Cloud for security detection and operation on Azure environment and resources.

Here are some announcements from Microsoft, and we will keep it update in future:

Microsoft’s Response to CVE-2021-44228 Apache Log4j 2

https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/

Guidance for preventing, detecting, and hunting for CVE-2021-44228 Log4j 2 exploitation

https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值