Asset Management, Vulnerability Management
Healthcare sector struggles to address Log4j vulnerability without ‘breaking’ critical applications

A woman is given a Moderna COVID-19 vaccine by a medical technician in Bates Memorial Baptist Church in Louisville, Ky., on Feb. 12, 2021. (Photo by Jon Cherry/Getty Images)
Healthcare faces the same struggles as federal government and well-resourced sectors in Log4j remediation, but compounded by ongoing patch management issues and reliance on legacy platforms that may force difficult decisions tied to critical applications.In early December, researchers first disclosed a critical vulnerability found in the Apache Foundation’s Log4j logging tool. Since that time, researchers have uncovered further flaws and observed multiple malware variants and other threats directly targeting the vulnerability.Researchers have continued to deploy fixes, as threat actors continue to scan for ways to exploit the vulnerability. But according to Cybersecurity and Infrastructure Security Agency Director Jen Easterly and Executive Director Eric Goldstein, there’s just not enough visibility to assess the bug’s impact, despite unprecedented levels of collaboration between stakeholders.Log4j is “a Hydra of sorts, whether you’re in healthcare or not. You feel like you cut a head off of it and two more come back because you didn’t fully understand what you were dealing with in the first place,” Tony Cook, head of threat intelligence at GuidePoint Security told SC Media. In healthcare, however, vulnerability management is a systemic issue, making mitigation of the Log4j flaw a massive undertaking.Log4j is found in many of the basic applications used by a range of healthcare entities, Cook explained. The trouble is that “no one even knows how to upgrade without breaking different portions” of the device or application on which it resides.There’s also a lack of visibility to identify the source of exploits, and confusion about the true impact of addressing vulnerable elements once found.Cook likened it to layers of an onion. "You start to peel the layers back, asking ‘where does this go?’ ‘How does that affect this other portion?’” On one device, it’s possible for nearly the entire platform to run on some portion of Java because it was easy to write, 20 to 30 years ago. And so much of modern tech has been built on top of it.In order for healthcare organizations to get to an acceptable risk posture for Log4j, they must identify where it exists within the environment. But, as noted, visibility into Log4j instances is a challenges for all sectors. The added difficulty in healthcare is that many leaders lack a general understanding of what those sub-dependencies are in the environment, whether it’s a vendor-related portion, or an app running on their own web server. Cook said understanding those relationships will be critical for remediation.“It really takes that level of understanding their environment,” he continued. Search across the entire environment, find these class files, and then determine how to fix the issue without breaking it.For Cook’s team, they’ll engage with an entity and deploy their toolset that has the ability to go out and find the class files. But if you ask the team directly whether they use Log4j, and if it’s something they’re worried about in terms of business risk, a lot of chief information security officers and administrators just don’t know.Log4j is under active exploit, meaning the vulnerability can’t be part of the typical healthcare organization’s “accepted risk.” It must be rooted out, as attacker groups are scanning for the flaw, even if the entity isn’t, in an effort to gain a foothold onto the network.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds