Azure WAF matching for Log4j vuln(CVE-2021-44228)

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query will alert on a positive pattern match by Azure WAF for CVE-2021-44228 log4j vulnerability exploitation attempt. If possible, it then decodes the malicious command for further analysis. Reference: https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/

Attribute Value
Type Analytic Rule
Solution Apache Log4j Vulnerability Detection
ID 2de8abd6-a613-450e-95ed-08e503369fb3
Severity High
Status Available
Kind Scheduled
Tactics InitialAccess
Techniques T1190
Required Connectors WAF
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AzureDiagnostics 🔶 Category in "ApplicationGatewayFirewallLog,FrontdoorWebApplicationFirewallLog"
ResourceProvider == "MICROSOFT.NETWORK"
? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Apache Log4j Vulnerability Detection