* [Blog](https://www.paloaltonetworks.com/blog) * [Security Operations](https://www.paloaltonetworks.com/blog/security-operations/) * 使用 Cortex Xpanse 管理攻击面上的 ... # 使用 Cortex Xpanse 管理攻击面上的 Apache Log4j [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fcortex-xpanse-finding-apache-log4j%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E4%BD%BF%E7%94%A8+Cortex+Xpanse+%E7%AE%A1%E7%90%86%E6%94%BB%E5%87%BB%E9%9D%A2%E4%B8%8A%E7%9A%84+Apache+Log4j&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fcortex-xpanse-finding-apache-log4j%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fcortex-xpanse-finding-apache-log4j%2F%3Flang%3Dzh-hans&title=%E4%BD%BF%E7%94%A8+Cortex+Xpanse+%E7%AE%A1%E7%90%86%E6%94%BB%E5%87%BB%E9%9D%A2%E4%B8%8A%E7%9A%84+Apache+Log4j&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/security-operations/cortex-xpanse-finding-apache-log4j/?lang=zh-hans&ts=markdown) \[\](mailto:?subject=使用 Cortex Xpanse 管理攻击面上的 Apache Log4j) Link copied By [Richa Avasthi](https://www.paloaltonetworks.com/blog/author/richa-avasthi/?lang=zh-hans&ts=markdown "Posts by Richa Avasthi"), [Greg Heon](https://www.paloaltonetworks.com/blog/author/greg-heon/?lang=zh-hans&ts=markdown "Posts by Greg Heon") and [Kevan Dunsmore](https://www.paloaltonetworks.com/blog/author/kevan-dunsmore/?lang=zh-hans&ts=markdown "Posts by Kevan Dunsmore") Dec 29, 2021 1 minutes This post is also available in: [English (英语)](https://www.paloaltonetworks.com/blog/security-operations/cortex-xpanse-finding-apache-log4j/ "切换到 英语(English)") [日本語 (日语)](https://www.paloaltonetworks.com/blog/security-operations/cortex-xpanse-finding-apache-log4j/?lang=ja "切换到 日语(日本語)") # Cortex Xpanse 如何在攻击面中发现易受攻击的应用程序 |-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | ### ***注意:*** *这种情况正在迅速发展,因此,我们将用掌握的最新信息定期更新 Cortex®Xpanse™。如果您有任何疑问,请联系您的客户成功接洽经理。* *本文最初发布于太平洋时间 2021 年 12 月 9 日下午 7:55。* *太平洋时间 2021 年 12 月 15 日下午 1:50 第 1 次更新,反映一个额外 CVE 和额外受影响的软件/设备。* *太平洋时间 2021 年 12 月 15 日下午 4:55 第 2 次更新,反映更多受影响的软件。* *太平洋时间 2021 年 12 月 17 日 11:17 第 3 次更新,描述功能并更新有关 VMware vCenter 的信息。* | ## **摘要** 2021 年 12 月 9 日,[Apache Log4j 2](https://logging.apache.org/log4j/2.x/) 日志库中的一个[高严重程度远程代码执行漏洞](https://nvd.nist.gov/vuln/detail/CVE-2021-44228)(俗称 Log4Shell)被确认为在公共互联网上被利用(详见 [Unit 42 博客](https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/)上对漏洞的详细分析和建议的缓解措施)。 Log4j 库被大量基于 Java 的应用使用。它在开源库和产品中的广泛使用,再加上利用它所需的低复杂度,使得这个漏洞特别令人担忧。情况在不断发展变化。之前的建议是将 Apache Log4j 库升级到 2.15.0 版。但是,该版本库中的修补程序不完整,已在版本 2.16.0 中修复(请参阅 [CVE-2021-45046](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046))。 **强烈建议受影响的企业尽快升级到 Apache Log4j 版本 2.16.0 或以上。** 您如何知道自己的企业是否受到影响?特别是如果这些漏洞嵌入使用 Log4j 的软件,而不是内部开发的应用中,会有什么影响?这篇文章解释了我们正在做些什么来帮助您识别企业中易遭遇这种发展中的威胁的应用。 ## **如今 Cortex Xpanse 的作用** Cortex Xpanse 中的[*问题* 模块](https://www.youtube.com/watch?v=YUAb1hFriBw)通过识别存在已知问题的软件的品牌、型号和版本来检测数字攻击面中的安全漏洞。您在 Cortex Xpanse 中看到的问题是通过一系列*策略* 产生的,其中包含有关漏洞性质、严重性的信息,以及有关在您的网络中发现漏洞的位置的相关信息,包括受影响的 IP、证书、域等。 ## **寻找潜在的 Log4j 漏洞** Cortex Xpanse 将问题类型分为*类别或主题* ,以便于浏览和筛选。我们创建了一个新的问题类别,名为**使用 Apache Log4j 2.x 的软件(CVE-2021-44228、CVE-2021-45046)** ,包含涵盖可能受 CVE-2021-44228 和 CVE-2021-45056 影响的软件的所有现有策略。 [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/12/Cortex-Xpanse-Issues-Apache-Log4j-thumb-4.png?ts=markdown) [![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/12/Cortex-Xpanse-Issues-Apache-Log4j-thumb-4.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/12/Cortex-Xpanse-Issues-Apache-Log4j-thumb-4.png?ts=markdown) 新的分组现在立刻可用,但需要注意的是,它可能*未涵盖* 所有受影响的软件品牌、型号和版本,当您阅读本文时,相应列表正在增长和变化。 ## **接下来是什么?** 以下部分列出了 Cortex Xpanse 可以检测到的所有已知易受 CVE-2021-44228 和 CVE-2021-45056 影响的应用。随着我们的研发团队向我们的产品添加检测功能,我们将不断更新此列表。有关最新信息,请参阅本节。 ## **Cortex Xpanse 中的 Log4Shell 问题** 过去几天,大量供应商发布了建议性通告和修补程序。本节将随着我们向产品添加新策略保持更新。 Expander 展示了暴露于公共互联网的系统,无需安装任何类型的代理或传感器。下面的一些系统未公布版本信息,或者根据我们客户网络的配置在这方面受到限制。Expander 尝试检索或衍生版本信息,但并非在所有情况下都可以如此。 我们能够以更高的置信度确定一些设备/应用,从而推断它们可能使用的是受影响的 Log4j 版本。以下应用属于该类别,并已在 Cortex Xpanse 中自动启用为问题策略: * * [Apache Solr](https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228) * [Cisco Identity Services Engine (ISE)](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Cisco Webex Meetings Server](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Dell Wyse Management Suite](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability) * [IBM WebSphere Application Server](https://www.ibm.com/support/pages/node/6525706/) * [Oracle E-Business Suite](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) * [Oracle Fusion Middleware](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) * [SonicWall Email Security](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032) * [VMware Carbon Black EDR](https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134) * [VMware Workspace ONE Access](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) * [VMware vRealize Lifecycle Manager](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) 其他设备/应用不提供此级别的可视性。这些应用具有可由您的团队在*策略* 选项卡中启用的策略;我们鼓励客户根据需要将其切换到"开": * * [Cisco Integrated Management Controller (IMC)](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Cisco Unified Computing System](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Fortinet Device](https://www.fortiguard.com/psirt/FG-IR-21-245) * [VMware vRealize Automation Appliance](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) * [VMware vCenter](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) * [Elasticsearch](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476) * [Palo Alto Networks Panorama](https://security.paloaltonetworks.com/CVE-2021-44228)。(请注意,目前我们正在检测暴露在公共互联网上的*所有* Panorama 版本。但是,只有版本 9.0.x、9.1.x 和 10.0.x 受到影响。8.1.x 和 10.1.x 系列*未* 受影响。) * [Adobe ColdFusion](https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html) ## **开源扫描** 网络安全和基础架构机构 (CISA) 已经从开源社区的其他成员创建的扫描程序中衍生了一个开源的 log4j 扫描程序。此工具旨在帮助组织识别受 log4j 漏洞影响的潜在易受攻击的 Web服务。在 GitHub 上可以找到这一工具。 ## **Cortex Xpanse Log4Shell 主动扫描** 另外,Cortex Xpanse 为我们的客户提供对其基础架构的按需扫描。Log4Shell 扫描从 Cortex Xpanse 拥有的扫描基础架构运行,只扫描批准的周边目标。在实践中,我们通常会发现,即使漏洞可以从周边触发,被利用的计算机也不会直接面向互联网(见下图)。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/12/Log4J-DODIN-Generalized-No-IPs.png) 如果我们成功利用该漏洞,我们将对 Cortex Xpanse 拥有的 DNS 服务器进行 DNS 调用。我们跟踪对 DNS 服务器的所有调用,并向客户提供易受攻击系统的详细信息。 如果您想了解更多信息,请联系您的客户成功接洽经理。 ### Subscribe to Security Operations Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language