Recently, a critical vulnerability has been reported on Log4j, which is used by Java based applications. This vulnerability can be exploited for RCE (Remote Command Execution) depending on the configuration of the system. There is active exploitation in the wild and systems are having various Trojans, ransomware and crypto miners etc have been known to be loaded.

Some details on the vulnerability are:

https://www.cisa.gov/uscert/ncas/current-activity/2021/12/10/apache-releases-log4j-version-2150-address-critical-rce

https://www.cisa.gov/news/2021/12/11/statement-cisa-director-easterly-log4j-vulnerability

https://logging.apache.org/log4j/2.x/security.html

https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476

https://isc.sans.edu/forums/diary/Log4j+Log4Shell+Followup+What+we+see+and+how+to+defend+and+how+to+access+our+data/28122/

The eMite application and adapters are not vulnerable to the Log4j vulnerability - as these do not use any Java, Apache based components and has minimal third party based libraries as they are based on C# and .Net code base, so this reduces the attack surface. However, eMite does use Elasticsearch for data storage.

Contents:

From the Elasticsearch advisory

Mitigation for eMite or customer-hosted Amazon Connect environments