APPSEC OBSERVER

The latest trends and tips in DevSecOps through instrumentation and Security Observability.

Subscribe To Blog

Contrast SECURITY VULNERABILITY DETECTION vs the Log4J2 CVE - A demonstration

This week, Contrast Security proved that we could detect the Log4j2 vulnerability that caused CVE-2021-44228 and stop attacks against it, without updating versions or using a WAF. Here is a short demonstration from our founder Jeff Williams: 

 

Some key takeaways from Jeff’s video:

Contrast SCA identified that the application uses the vulnerable version of log4j. Our runtime context also allows you to identify which applications use JMSAppender, the specific class that can be exploited using this CVE. 

Contrast Protect defended the applications against the underlying vulnerability. This means, Contrast was protecting you against the log4j vulnerability long before it was disclosed as a CVE this week.

Finally, Contrast Assess application security detects the underlying vulnerability in applications. This means, Contrast will find the next application vulnerability like this one, before it becomes a disclosed CVE or major incident.


Connect with us now to learn how Contrast can protect your Java applications against exploits like Log4j and how you can get started at no charge today.

GET STARTED

Mahesh Babu

Mahesh Babu

Mahesh leads Product Marketing for Contrast's Application Security Platform at Contrast Security. He takes every opportunity to tell everyone how Contrast has fundamentally changed application security for the first time since he started working in security 10+ years ago. Mahesh has seen the industry evolve as a researcher, consultant, and practitioner within a large bank. He began his career as a security researcher at the CERIAS center at Purdue University. He then went on to build and scale large security & privacy programs a Senior Manager & architect for HSBC Information Security & Risk. He also spent time as a consultant at Deloitte and Booz & Company. Mahesh has a BS in Computer Science and MS in Information Security from Purdue University and an MBA from Duke University.

SUBSCRIBE TO THE BLOG