Log4j 2.16.0 Fixes Critical Vulnerabilities: What You must know

Apache Log4j 2.16.0 is now available

Apache Log4j 2.16.0 Is Now Available – Critical Update Required

A new follow-on vulnerability in Log4j has been discovered and fixed in version 2.16.0, addressing CVE-2021-44228 and CVE-2021-45046. If you’re still using version 2.15.0 or earlier, your applications may remain vulnerable in certain non-default configurations.

This is is a follow on from my previous post: Log4J Zero-Day Exploit: Explained with Fixes.

Here’s why this update is critical and what you need to do.

TL;DR

If you’re short on time, here’s the gist:

  • Upgrade your Log4j library to version 2.16.0 immediately.
  • The newer version completely removes the risky message lookup feature, which was the critical enabler of these exploits.
  • Visit the Apache Security Page for the latest updates

Why Version 2.15.0 Isn’t Enough

While version 2.15.0 addressed initial vulnerabilities, it left certain configurations exposed. Specifically, using the Thread Context value in the log message Pattern Layout could still allow exploitation. Version 2.16.0 eliminates this risk by fully removing the message lookup functionality.

Misleading Fixes to Avoid

Not all solutions floating around the community are effective. Avoid relying on the following:

  • Updating just the Java version.
  • Filtering vulnerabilities using Web Application Firewalls (WAF).
  • Modifying the log statement format to %m{nolookup}.

These approaches won’t fully mitigate the vulnerabilities, so upgrading to version 2.16.0 is your safest bet.

How to Stay Updated

The Log4j exploit has drawn global attention, leading to a flood of information—some of which may be inaccurate. For reliable updates, stick to trusted sources:

What’s Next?

This is an evolving situation, and further updates may arise. Bookmark the Apache Security Page and regularly check for announcements to stay ahead of potential risks.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *