Exploring the Log4j Zero-Day Vulnerability: Implications for Application Security and Privacy

Thirumal, S and Udayakumar, N and Kumar, Narayanan and Saritha, A and Sheela Gowr, P Exploring the Log4j Zero-Day Vulnerability: Implications for Application Security and Privacy. IEEE XPLORE.

[thumbnail of Exploring the Log4j Zero-Day Vulnerability_ Implications for Application Security and Privacy _ IEEE Conference Publication _ IEEE Xplore.pdf] Text
Exploring the Log4j Zero-Day Vulnerability_ Implications for Application Security and Privacy _ IEEE Conference Publication _ IEEE Xplore.pdf - Published Version

Download (389kB)

Abstract

The necessity for security to protect the privacy of everyone who frequently uses PCs, cell phones, and IOT devices has increased along with the quick development and expansion of technology. Thus, logs have become a vital tool and greatest buddy for developers and other IT administrators in current technological age. Application logs have been used for a variety of tasks, such as business analytics, security compliance, debugging, and monitoring. Thus, Log4j is a popular open-source Java software library used by developers to monitor the activity of their software applications. Alibaba Cloud security researchers published a notification on December 9, 2023, alerting the public to a new Zero-Day vulnerability affecting the Java logging package log4j, tagged as CVE-2021-44228. With a severity score of 10.0 (the highest rating) this vulnerability allows hosts running software that makes use of this log4j version to execute simple remote code execution.

Item Type: Article
Subjects: Computer Science Engineering > Machine Learning
Domains: Computer Science Engineering
Depositing User: Mr IR Admin
Date Deposited: 15 Dec 2025 08:04
Last Modified: 15 Dec 2025 08:04
URI: https://ir.vistas.ac.in/id/eprint/11465

Actions (login required)

View Item
View Item