Log4j 2 Vulnerability: Identifying and Minimizing Production Risk
Dynatrace
DECEMBER 12, 2021
In summary, the Log4Shell exploit allows an attacker to instruct the vulnerable system to download, and subsequently execute, a malicious command. Sensitive Data Access – Do the vulnerable Java processes access critical databases or file systems in the environment? Public Internet Exposure. Sensitive Data Access.
Let's personalize your content