Identify Log4Shell Exposure In Seconds 

USE CASE

Identify Log4Shell 
Exposure In Seconds 

Discovered on December 9, 2021 by Minecraft players, the Apache Log4Shell vulnerability enables bad actors using text-based chats to gain ACE access to your system, plant malware, and download anything internet accessible from the compromised host. Security experts predict that this vulnerability will “haunt the internet for years” because it’s incredibly difficult to ensure that all infecteddevices are remediated.

To truly protect your organization from Log4Shell, you need to know with mathematical certainty every device that could have communicated with an infected host. Which is to say, you need
to know how your exposure has changed over time. For most agencies, it’s an arduous and time-consuming task to determine which devices are currently within the blast radius, and it would be impossible to construct an inventory of potential exposure over time. 
The Forward Enterprise blast radius feature was engineered to provide detailed, actionable data on the exposure created by an infected host so that time isn’t wasted searching for information and the risk of overlooking at-risk devices is virtually eliminated.

Forward Enterprise users can create an accurate report of current exposure in seconds. Combining the power of network snapshots
with our blast radius feature provides an accurate audit of all potential past and present exposure that ops teams can use to construct a forensic investigation and remediate the vulnerability.

Because all members of the team are working from an intuitive single source of truth, their time is spent effectively remediating exposure instead of performing time-consuming manual path searches. 
Identifying and isolating impacted devices is a 3-step process:

STEP 1

Select the Blast Radius feature under the security tab, and input the hostname of the compromised device and any destination IP addresses that may be of interest. Then click on the blast radius button. 

STEP 2

View a comprehensive table and all possible flows from the host to the destination subnets, including protocol and L4 destination port.  In a single click, you can download a report that documents the blast radius. 

STEP 3

Track the blast radius exposure over time using snapshots.
Download the Log4Shell Use Case >>

KEEP YOUR NETWORK SECURE 

Related content

Do you know what you don’t know?

Read the latest post by Forward's VP of Product, Chiara Regale about the Log4Shell exposure
READ THE BLOG

Blast Radius Use Case

Dive deeper into the Blast Radius Identification feature and learn how Forward customers are using it
READ THE USE CASE

Security Verification

 Explore how Forward gives users visibility and actionable information that protects mission-critical networks 
VISIT SECURITY PAGE
Ready for a demo? See Forward Enterprise for yourself >>
clockcrossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram