Log4J Vulnerability Mitigation - Symantec Endpoint Protection server

  Рет қаралды 628

Gene Bytes

Gene Bytes

Күн бұрын

#log4j2 #Symantec This video will demonstrate the step by step mitigation for Symantec endpoint manager against Log4j2 vulnerability.
Log4j2 vulnerability (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105) information and mitigation steps for on-premises manager.
Reference Link: knowledge.broa...
Endpoint Protection Manager mitigation
CVE-2021-44228 and CVE-2021-45046
SEPM 14.3 RU3 build 5427 (14.3.5427.3000) has been released to address these vulnerabilities and is available for download. We recommend all customers migrate their SEPM(s) to this build.
If upgrading immediately is not an option, the following steps can be implemented to mitigate CVE-2021-44228 and CVE-2021-45046 until an upgrade can be completed. Ref. logging.apache...
Go to [DriveLetter]:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\lib\ and locate the log4j-core-*.jar file.
Copy log4j-core-*.jar to a temp folder and keep a secondary backup in another location.
Right click on the file, choose properties then uncheck Read-only check box.
Add the extension .zip to log4j-core-*.jar by renaming it. This will allow it to be opened with Windows File Explorer, 7zip or WinRAR.
Open (do not extract) log4j-core-*.jar.zip with a zip utility, locate org/apache/logging/log4j/core/lookup/JndiLookup.class and delete it.
Close the zip utility and reopen again to make sure the JndiLookup class is removed.
Remove the .zip extension from the log4j-core-*.jar.zip.
Stop Symantec Endpoint Protection Manager and Symantec Endpoint Protection Manager API services.
Replace the original log4j-core-*.jar file in ...SEPM\tomcat\lib with the recently modified version.
Right click on the file, choose properties then check Read-only check box.
Start Symantec Endpoint Protection Manager and Symantec Endpoint Protection Manager API services.
No SEPM functionality is impacted by implementing these steps. You can revert the System variable as per the steps provided in the additional information below

Пікірлер: 1
@shmkcpvr
@shmkcpvr 2 жыл бұрын
well explained!
Officer Rabbit is so bad. He made Luffy deaf. #funny #supersiblings #comedy
00:18
Funny superhero siblings
Рет қаралды 18 МЛН
How To Hack IoT Cameras
20:26
Jason Ford {JSON:SEC}
Рет қаралды 190 М.
Google Data Center 360° Tour
8:29
Google Cloud Tech
Рет қаралды 5 МЛН
NixOS is Mindblowing
12:02
Chris Titus Tech
Рет қаралды 710 М.
Migrate Servers from any Infrastructure to any platform
15:14
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
27:59
Practical Networking
Рет қаралды 122 М.
TailsOS Guide For The Ultra Paranoid
35:32
Mental Outlaw
Рет қаралды 439 М.
Cloud Security Risks: Exploring the latest Threat Landscape Report
11:33
This web UI for Ansible is so damn useful!
20:07
Christian Lempa
Рет қаралды 486 М.
Cybersecurity Architecture: Roles and Tools
14:07
IBM Technology
Рет қаралды 110 М.
Deploy Fortinet on AWS Cloud | Step by Step | Forti OS 7.0
22:50