14 December 2021

Providing On-Demand Testing for CVE-2021-44228 (log4j) with Synack Campaigns

Synack

Testing for CVE-2021044228, or log4j, with Synack

Since 8 am PT on Friday, December 10, researchers from the Synack Red Team (SRT) have been solving customer needs related to CVE-2021-44228—the CVE that details a critical log4j vulnerability with wide-reaching implications across industries.

 

Responding to the Critical Vulnerability with Synack Campaigns

By 8 am PT when its magnitude and implications had become clear to Synack operations, a new Synack Campaign was created to address CVE-2021-44228. The log4j Campaign immediately became available in-platform for customers to launch, long before most of the world read about the vulnerability in headlines and social feeds. 

Synack Campaigns connect an organization to Synack Red Team (SRT) researchers capable of accomplishing specific security tasks. In this case, organizations can select the CVE-2021-44228 Campaign within the Synack Platform and have a researcher check for the vulnerability on-demand. 

 

Testing with the Best Researchers on the Planet

Over 30 SRT members have been assembled to cultivate ideas and improve the entire community’s efficiency and effectiveness. Together, they are bringing a diverse spectrum of perspectives from different backgrounds, ranging from military and government to academia and tech. This collaboration of top researchers allows Synack to improve the quality of testing for all customers with better processes, tools, and payloads.

The SRT often shares best practices within the community, to help each other level up and make the entire internet safer. Compared to traditional testers or automated scanning tools, the Synack Red Team brings these sorts of advantages: human collaboration, diversity, and creativity. 

 

The Landscape of CVE-2021-44228 Across Industries

Since Friday morning, Synack has checked over half a million IP addresses across our customer base, confirming the status of thousands of CVE-2021-44228 checks and providing detailed reports containing proof of work and methodologies. With a combination of human intelligence and automated tools, Synack is addressing the vulnerability at an unprecedented scale and pace. 

Vulnerable instances span across countries and industries and exist both in the government and private sectors. The urgency of the vulnerability has not been overstated by news outlets and social media – Synack recommends that customers activate the CVE Campaign as soon as possible.

 

Checking for CVE 2021-44228 On-Demand—The Advantages of Synack Campaigns

Since the weekend that followed the CVE’s publication, Synack customers have utilized Synack Campaigns to activate hundreds of checks from researchers around the world. 

Synack Campaigns beat other models to the punch. Scanners do not yet have the vulnerability’s signature, traditional penetration testing engagements take significant time to spin up, and other bug bounty models do not provide the immediacy or certainty of a vulnerability as this one requires. The model provides on-demand services relevant to CVEs today and prepares organizations for the next 0day like CVE-2021-44228. Reach out to a Synack representative today to explore existing CVE Campaigns, as well as other offerings available in the Synack Catalog. 

The CVE-2021-44228 Campaign provided by Synack provides immediate results and reporting. The researcher will provide a clear yes/no answer on an asset’s vulnerability status, as well as details about their methodology, screenshots, and general proof of work.

 

Activate the Synack CVE-2021-44228 Campaign Today

Reach out to your Synack representative to activate the CVE-2021-44228 Campaign today. If you’re new to the Synack Platform, reach out to us here and learn how to get started with Synack Campaigns and crowdsourced penetration testing.

 

Update: Synack has been asked whether our systems are vulnerable to log4j. Synack does not use log4j and has determined that we are not vulnerable to exploitation. In response to increased attack traffic attempting to exploit the vulnerability, we have taken additional steps to block the malicious traffic accordingly.