{"id":2626,"date":"2021-12-13T11:51:21","date_gmt":"2021-12-13T11:51:21","guid":{"rendered":"https:\/\/locaterisk.com\/?p=2626"},"modified":"2025-08-08T07:26:03","modified_gmt":"2025-08-08T07:26:03","slug":"sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","title":{"rendered":"Log4j Vulnerability - Find out Which of Your Servers Are Affected"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Log4j Vulnerability - Find out Which of Your Servers Are Affected<\/h1>\r\n            <p class=\"paragraph\">The German Federal Office for Information Security (BSI) issued a red alert on Saturday night. Exploiting the log4j vulnerability is as simple as can be. The attacks are already running. Do not waste time and check the security of your systems.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"571\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-1024x571.jpg\" alt=\"Das Netzt brennt \u2013 Sicherheitsl\u00fccke im Java-Logging log4j\" class=\"wp-image-2627\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-1024x571.jpg 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-300x167.jpg 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-768x428.jpg 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-18x10.jpg 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Photo by Arnau Soler on Unsplash<\/figcaption><\/figure><\/div>\n\n<h3>Log4Shell vulnerability scanner for faster inventory<\/h3>\n<p>LocateRisk Log4Shell scanner quickly identifies the CVE-2021-44228 vulnerability in accessible web applications. The software is executable under the most common operating systems - so it is also possible to scan systems in the internal network.<\/p>\n<p><b>Why is the scanner not included in the LocateRisk scan?<\/b> <span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">From our point of view, the scan cannot be categorized as \"non-invasive\" because of the increased request load. The scanner puts the JNDI string into various headers, user agent and URL parameters. A system crash is unlikely, but cannot be ruled out.<\/span><\/p>\n<p><b>Important: Only systems for which consent for an invasive scan has been obtained will be checked! <\/b><\/p>\n<p><b>How do I use the Log4Shell scanner?<br \/><\/b><span style=\"font-weight: 400;\">A line-separated domain \/ IP list is required <\/span><span style=\"font-weight: 400;\">as input for the analysis tool. The ports and protocols are automatically added by the software. <\/span><span style=\"font-weight: 400;\">The system list from the LocateRisk scan provides an initial starting point.&nbsp;<\/span><\/p>\n<p><strong>This is how it works<\/strong><br \/>1. <span class=\"s1\">Enter domain names and IP addresses to be checked in the \"hosts.txt\" file in the application directory. IP ranges cannot be stored.<br \/><\/span><span class=\"s1\">2. Run application.<br \/><\/span><span class=\"s1\">3. You can find the results on the console and in the results file in the application directory.<\/span><\/p>\n<p>Are you interested in the solution? Then send a message to: sales@LocateRisk.com<\/p>\n<p><strong>Note<\/strong><br \/>LocateRisk is not liable for any damages and expenses caused by the scans as well as vulnerabilities not found. It is only a quick check - this means that there is no test tailored to the respective applications. The tool is provided on a transitional basis. We will shut down the corresponding infrastructure again in a few weeks.<\/p>\n<p>Since we cannot guarantee that every Log4J and associated Log4Shell vulnerability will be found, we recommend that you dial into any system running Java apps and follow these 5 steps as well:<\/p>\n<h3><b>How to find out if and where you are using the Java library Log4j<\/b><\/h3>\n<p><span style=\"font-weight: 400;\"><strong>Step 1<\/strong><br \/>Open your latest security scan on the LocateRisk platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Step 2<\/strong><br \/>Go to the \"Details for professionals\" list and select the \"App\" category filter for the report.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Step 3<\/strong><br \/>Search the results using the adjacent search for the JAVA and TOMCAT applications or for the affected applications below.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Step 4<\/strong><br \/>Log in to the corresponding servers. A high CPU load indicates that crypto miners may be installed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Step 5<\/strong><br \/>Take all JAVA applications (JAR and Tomcat files) you find on the above servers and check them on Github in the following tool <br \/><a href=\"https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228-Scanner<\/a><\/span><span style=\"font-weight: 400;\"> or under <a href=\"https:\/\/github.com\/hillu\/local-log4j-vuln-scanner\" target=\"_blank\" rel=\"noopener\">local-log4j-vuln-scanner<\/a>.<\/span><span style=\"font-weight: 400;\"><br \/>You will find out immediately if the vulnerability is in the application and you can fix it directly. <\/span><\/p>\n<p>You can get more information about the vulnerability and how to fix it directly from the <a href=\"http:\/\/Mehr Infos zur Schwachstelle und Behebung gibt es beim BSI: https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2021\/2021-549032-10F2.pdf?__blob=publicationFile&amp;v=3\" target=\"_blank\" rel=\"noopener\" data-wplink-url-error=\"true\">BSI<\/a><\/p>\n<p><b>The LocateRisk team is working hard to include the affected applications in the risk analysis and will update the still incomplete list with each additional case that becomes known.<\/b><\/p>\n<h3><b>Products affected by the Log4j vulnerability<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Most products are applications that use Java in their infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apache Struts2<br \/><\/span><span style=\"font-weight: 400;\">Apache Tomcat<br \/><\/span><span style=\"font-weight: 400;\">Apache Spark<br \/><\/span><span style=\"font-weight: 400;\">Apache Solr<br \/><\/span><span style=\"font-weight: 400;\">Apache Druid<br \/><\/span><span style=\"font-weight: 400;\">Apache Nimble<br \/><\/span><span style=\"font-weight: 400;\">ElasticSearch<br \/><\/span><span style=\"font-weight: 400;\">flume<br \/><\/span><span style=\"font-weight: 400;\">Apache Dubbo<br \/><\/span><span style=\"font-weight: 400;\">Logstash<br \/><\/span><span style=\"font-weight: 400;\">Kafka<br \/><\/span><span style=\"font-weight: 400;\">IBM Qradar SIEM<br \/><\/span><span style=\"font-weight: 400;\">VMWare<br \/><\/span><span style=\"font-weight: 400;\">NetApp<\/span><span style=\"font-weight: 400;\">C<br \/>Cisco, F5<br \/><\/span><span style=\"font-weight: 400;\">Citrix<br \/><\/span><span style=\"font-weight: 400;\">Carbon Black<br \/><\/span><span style=\"font-weight: 400;\">Imperva<br \/><\/span><span style=\"font-weight: 400;\">Jenkins<br \/><\/span><span style=\"font-weight: 400;\">McAfee<br \/><\/span><span style=\"font-weight: 400;\">Oracle<br \/><\/span><span style=\"font-weight: 400;\">Webex<br \/><\/span><span style=\"font-weight: 400;\">Palo Alto Networks<br \/><\/span><span style=\"font-weight: 400;\">Pulse Secure<\/span><\/p>\n<p>A list of applications with the corresponding sources can be found on <a href=\"https:\/\/github.com\/authomize\/log4j-log4shell-affected\/blob\/main\/affected_components.md\" target=\"_blank\" rel=\"noopener\">GitHub<\/a><\/p>\n<h3>The provision of the Log4Shell scanner meets with great interest<\/h3>\n<p><strong>We are glad that we can help many partners and customers with the Log4Shell scanner. The friendly feedbacks and valuable suggestions for the extension confirm us in the action!&nbsp;<\/strong><\/p>\n<p>\"Thank you very much for the good cooperation! Have recommended LocateRisk scanner to my customers. We all benefit from the tool.\"<\/p>\n<p>\"Our systems are already patched. Of course, we'd still be happy to have them send us access to the analysis tool so we can take a closer look at it when we get a chance.\"<\/p>\n<p>\"I've already scanned our infrastructure with various tools, but one more time never hurts \ud83d\ude0a\"<\/p>\n<p>\"Our data protection officer informed me just now that you offer a free analysis tool for the Log4Shell vulnerability. I would very much like to test this and check our internal systems with it.\"<\/p>\n<p>\"We are excited about the software...\"<\/p>\n<p>\"Good morning. Please send me the analysis tool. Thank you in advance.\"<\/p>\n<p>\"Hello everyone, glad to have this tool \ud83d\ude42\"<\/p>\n<p>\"We would love to give your test tool to our prospective customers.\"<\/p>\n<p>\"Great. Thanks a lot for the tool. Have a nice weekend and Merry Christmas;-))\"<\/p>\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Security vulnerability in Log4j - attacks are already underway. Do not waste time and check the security of your systems.<\/p>","protected":false},"author":8,"featured_media":2627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[15,16],"class_list":["post-2626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-log4j","tag-sicherheitsluecke"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk<\/title>\n<meta name=\"description\" content=\"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T11:51:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:26:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"602\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind\",\"datePublished\":\"2021-12-13T11:51:21+00:00\",\"dateModified\":\"2025-08-08T07:26:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\"},\"wordCount\":925,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"keywords\":[\"log4j\",\"Sicherheitsl\u00fccke\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\",\"name\":\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"datePublished\":\"2021-12-13T11:51:21+00:00\",\"dateModified\":\"2025-08-08T07:26:03+00:00\",\"description\":\"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"width\":1080,\"height\":602,\"caption\":\"Sicherheitsl\u00fccke setzt das Netz in Flammen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security vulnerability in Log4j - Find out which of your servers are affected - LocateRisk","description":"Vulnerability in Log4j - What to do? Don't waste any time! Check the security of your systems with the Log4j scanner and in these 5 steps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","og_locale":"en_US","og_type":"article","og_title":"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk","og_description":"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.","og_url":"https:\/\/locaterisk.com\/en\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","og_site_name":"LocateRisk","article_published_time":"2021-12-13T11:51:21+00:00","article_modified_time":"2025-08-08T07:26:03+00:00","og_image":[{"width":1080,"height":602,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","type":"image\/jpeg"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind","datePublished":"2021-12-13T11:51:21+00:00","dateModified":"2025-08-08T07:26:03+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/"},"wordCount":925,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","keywords":["log4j","Sicherheitsl\u00fccke"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","url":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","name":"Security vulnerability in Log4j - Find out which of your servers are affected - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","datePublished":"2021-12-13T11:51:21+00:00","dateModified":"2025-08-08T07:26:03+00:00","description":"Vulnerability in Log4j - What to do? Don't waste any time! Check the security of your systems with the Log4j scanner and in these 5 steps.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","width":1080,"height":602,"caption":"Sicherheitsl\u00fccke setzt das Netz in Flammen"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/2626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=2626"}],"version-history":[{"count":44,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/2626\/revisions"}],"predecessor-version":[{"id":6303,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/2626\/revisions\/6303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/2627"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=2626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=2626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=2626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}