Share:
As companies scramble to address the newly exploited, ubiquitous Log4j vulnerability, companies’ actions are now the potential source for government scrutiny. Our Privacy, Cyber & Data Security Team summarizes what the Log4j vulnerability is and how it’s being exploited, the recent Federal Trade Commission admonition to take the vulnerability seriously, and published guidance from the public and private sectors on remediation steps.
- The vulnerability impacts versions 2.0 through 2.16 and can allow for DoS attacks
- The FTC calls it a “severe risk” and says it will “use its full legal authority” against companies that fail to protect consumers
- General principles and resources that can guide your analysis
Source:
Share:





