

INSIGHTi
Systemic Vulnerabilities in Information
Technology—Log4Shell
December 13, 2021
On December, 9, 2021 a critical vulnerability in software used by mil ions of internet servers was
discovered. The cybersecurity community is concerned that the vulnerability wil be exploited as part of
campaigns to manipulate servers and steal data. This CRS Insight describes the vulnerability and
considerations for federal government response.
Log4Shell
Log4j is an open-source tool the Apache Foundation makes available for logging web server activity. To
do this, Log4J has to access many network services (e.g., network maps and directories). Malicious actors
discovered a way to use the Log4j tool to send the servers commands that in turn gives them control of
the servers. The cybersecurity community has named this vulnerability Log4Shel .
Log4Shel exploits have been observed throughout December. Some actors have used Log4Shel -hijacked
servers to mine for cryptocurrencies and expand botnets. Malicious actors are known to be scanning the
internet in search of additional vulnerable servers.
Apache Foundation software is very useful and freely available, so it is widely used. Hundreds of
software projects maintained by the foundation rely on volunteer developers and are supported by
donations and sponsorships.
Current Responses
The Apache Foundation has released an updated version of Log4j which remediates the vulnerability.
However, deploying this solution is not as straightforward as with other vulnerabilities (i.e., applying the
patch).
1. Deploying the solution is logistical y complex, as Log4j is not part of a single software
platform. Instead it is a part of many different web services. Users wil have to identify
al instances of its use and in some cases recompile software using the patched version.
Congressional Research Service
https://crsreports.congress.gov
IN11824
CRS INSIGHT
Prepared for Members and
Committees of Congress
Congressional Research Service
2
2. Vulnerable versions of the software go back nearly a decade, and some instances may be
used in software that is no longer maintained.
3. End users may not be aware that they are vulnerable because they are unaware that the
web services they rely on use this tool. Some may have difficulty enumerating which
servers and applications are vulnerable.
The private sector has taken several steps to minimize the exploitation of Log4Shel . Companies have
produced security alerts to inform their customers and their broader community. Companies have updated
their anti-malware programs to detect potential exploits of the vulnerability. Others have deployed rules to
detect the types of queries that would compromise servers. Some have published mitigation guidance.
The federal government has also moved to mitigate this vulnerability. The Cybersecurity and
Infrastructure Security Agency (CISA) published a statement on their efforts, including recommendations
for asset owners. It is unclear how many federal and nonfederal entities are vulnerable. CISA is using the
Joint Cyber Defense Collaborative (JCDC) to manage the incident. The creation of the JCDC executed a
recommendation from the Cyberspace Solarium Commission and was enacted last year. In addition to the
private sector, CISA is leveraging the Federal Bureau of Investigation and the National Security Agency
in this response.
For federal agencies, CISA added Log4Shel to its Known Exploited Vulnerabilities Catalog. Per
instructions in Binding Operational Directive 22-01, agencies have until December 24 to remediate the
vulnerability in their systems, regardless of whether they are operated by the agency or by a third-party
(e.g., a cloud service provider).
The White House has not disclosed whether it has activated a Cyber Unified Coordination Group or is
using the National Cyber Incident Response Plan in this response, as it did during the SolarWinds
response.
Options for Congress
This is not the first time the cybersecurity community has had to address this type of systemic
vulnerability in information and communications technology. In 2014, government and private sector
entities coordinated to resolve the Heartbleed bug. In that case too, the critical vulnerability existed in
widely used open-source software. Lessons from that response are being applied to Log4Shel ’s response,
but also highlight opportunities for policy changes.
Policymakers may choose to explore the creation of a specific capability to address systemic
vulnerabilities in the future. The JCDC can support public and private sector actions to address
Log4Shel . But the involvement of the JCDC does not activate new authorities, and remediation wil rely
on entities using their existing authorities and capabilities. Congress may choose to direct a federal
agency to build a capability to assist the open source community in identifying and remediating
vulnerabilities. Dedicated resources may help to al eviate some chal enges that open source projects face,
such as volunteer developers not being able to commit time to identifying and resolving security issues in
the same way that corporate and proprietary software developers can.
Additional y, policymakers may explore opportunities to strengthen public-private partnerships to address
malicious actors exploiting vulnerabilities. The federal government and private companies have
coordinated their actions to disrupt botnet operations in the past. However, the authority to do so is ad-hoc
and entities frequently rely on court orders to empower them to move against malicious infrastructure.
Some in Congress have proposed empowering agencies to take additional actions against malicious
infrastructure. Policymakers may choose to examine what additional authorities may be granted to federal
agencies seeking to identify the infrastructure malicious actors use, conditions under which agencies may
Congressional Research Service
3
take action against that infrastructure, what options agencies may pursue (e.g., confiscating servers), and
what protections private entities may have for assisting and partnering with agencies.
Policymakers may also seek to create greater transparency in the software supply chain. When users
acquire and deploy software, they may only be familiar with the end product and may be oblivious to the
underlying components used to build that product. Policymakers may choose to enact proposals on
software bil s of materials (SBOMs) which would require software developers to disclose which software
packages went into their final products. This transparency would speed up the discovery of potential y
vulnerable information technology (IT). The federal government has recently required SBOMs for agency
IT.
Author Information
Chris Jaikaran
Analyst in Cybersecurity Policy
Disclaimer
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff
to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of
Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of
information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role.
CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United
States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However,
as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the
permission of the copyright holder if you wish to copy or otherwise use copyrighted material.
IN11824 · VERSION 1 · NEW