Second security flaw found in Log4Shell software — what this means for you
New vulnerability could knock websites offline
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Daily (Mon-Sun)
Tom's Guide Daily
Sign up to get the latest updates on all of your favorite content! From cutting-edge tech news and the hottest streaming buzz to unbeatable deals on the best products and in-depth reviews, we’ve got you covered.
Weekly on Thursday
Tom's AI Guide
Be AI savvy with your weekly newsletter summing up all the biggest AI news you need to know. Plus, analysis from our AI editor and tips on how to use the latest AI tools!
Weekly on Friday
Tom's iGuide
Unlock the vast world of Apple news straight to your inbox. With coverage on everything from exciting product launches to essential software updates, this is your go-to source for the latest updates on all the best Apple content.
Weekly on Monday
Tom's Streaming Guide
Our weekly newsletter is expertly crafted to immerse you in the world of streaming. Stay updated on the latest releases and our top recommendations across your favorite streaming platforms.
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
The Log4Shell flaw that has website administrators rushing to patch servers even as criminals ramp up attacks now has a sibling.
A second flaw has been found in the same logging utility, one that could crash websites, and the utility's developers have rushed out a patch that fixes both flaws.
The new flaw, catalogued as CVE-2021-45046 but which doesn't have a catchy name, abuses the same functions as Log4Shell, otherwise known as CVE-2021-44228.
It lets attackers cause a denial of service — i.e., a crash — in Log4j, the same utility being exploited by Log4Shell. That in turn might cause websites using Log4j to malfunction or crash.
The initial patch to stop Log4Shell, version 2.15.0 of Log4j, doesn't stop this new attack. So the Apache Software Foundation, which maintains Log4j, yesterday (Dec. 13) released Log4j version 2.16.0, which disables one of the functions that make the two flaws possible and removes the other function.
Crashing Log4j likely won't lead to the same devastating effects as Log4Shell does. The earlier flaw lets attackers slip malicious code into or steal sensitive information from any web server that contains Log4j somewhere in its software.
This new flaw might knock a web server offline, which is annoying and can be expensive if business transactions are halted, but most likely won't result in permanent damage.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
What to do about Log4Shell
Hundreds of thousands, if not millions, of web servers are believed to be impacted by Log4Shell, and all versions of the Java runtime environment are affected. The only permanent solution is to update Log4j.
The Netherlands' National Cyber Security Center has posted a list of enterprise software thought to be vulnerable to Log4Shell, which also includes software that has been found to be not vulnerable.
Among the well-known names on the list are Amazon, Broadcom, Cisco, Citrix, Dell, HPE, Huawei, IBM, McAfee, Microsoft, Netflix, Oracle, Red Hat, Siemens and Trend Micro.
As detailed in our earlier story, most Windows PCs, Macs and mobile devices are not vulnerable to attacks using Log4Shell unless the devices are running the Java runtime environment. (Microsoft's December Patch Tuesday updates don't address it.)
Gamers running Minecraft Java Edition do of course run Java, and they got a patch for Minecraft last week. Yesterday, Bitdefender reported seeing two campaigns that were putting ransomware and remote-access-Trojans on Windows machines that do have Java installed.
But again, neither Windows nor macOS ship with Java installed. Linux desktops are more vulnerable, as many of them do have it. Ubuntu has already released patches fixing Log4Shell, and other Linux distributions have probably also done so.
However, because of the sheer volume of financial and personal data held in web-facing servers, such as credit-card and banking information, email messages, login credentials, photos and other personal details, the risk of data breaches, identity thefts, credit card thefts and account hijackings has probably never been higher.
Likewise, criminals may use Log4Shell to corrupt websites to distribute malware or use them in phishing attacks to steal your personal information.
Now is a perfect time to start using one of the best password managers, to install some of the best antivirus software, to freeze your credit files and to check your credit reports.

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.
