Patch Your Systems! Log4j Vulnerability Sparks a Warning From the FTC

Davis Wright Tremaine LLP
Contact

Davis Wright Tremaine LLP

Since first announced in December 2021, the critical Log4j vulnerability has stolen the attention of many cybersecurity professionals. The Federal Trade Commission (FTC) has taken notice too.

The FTC recently published a blog post advising companies to take immediate action to remediate the Log4j vulnerability. The post states that the FTC "intends to use its full legal authority to pursue companies that fail to take reasonable steps" to remediate the Log4j vulnerability or "similar known vulnerabilities in the future," and that such failures may violate the FTC Act.

Log4j is an open-source software library that is used on many computer systems and applications, including millions of consumer-facing websites, applications, and connected devices, as well as industrial control systems (ICS). The Log4j vulnerability, commonly known as "Log4Shell," is a remote code execution (RCE) vulnerability that can be used by an attacker to run malicious commands on a vulnerable system and take control of that system.

There have been widespread reports of attackers, including multiple ransomware gangs, exploiting Log4Shell. To help companies respond, the Cybersecurity and Infrastructure Security Agency (CISA) has issued guidance on addressing Log4Shell.

The FTC's Log4j blog post raises several broader points about how it may be approaching data security issues:

  • While the FTC has been increasingly active in data security enforcement, it is still rare for the FTC to issue guidance like this on a major topic in the data security field. The Commission may take a more significant role in shaping data security practices proactively—not just through enforcement.
  • The blog post highlights what the FTC calls a "broader set of structural issues" related to open-source software like Log4j. As the blog post notes, countless sites, applications, and systems use numerous open-source software libraries for critical operations. Many of those libraries are maintained by volunteers, and the companies that use them may never evaluate the security of those libraries or have adequate resources and personnel for incident response and proactive maintenance. Look for the FTC to scrutinize more how companies evaluate and use open-source software for critical functions.
    • The FTC addressed the issue of companies' responsibilities for the security of externally developed software recently when it issued its new Standards for Safeguarding Customer Information (known as the "Safeguards Rule") under the Gramm-Leach-Bliley Act (GLBA). Under the new rule, covered Financial Institutions must adopt "procedures for evaluating, assessing, or testing the security of externally developed applications," presumably including open-source software.
  • The FTC likely will continue to focus on companies' failure to timely adopt security patches as a ground for enforcement under the FTC Act. The blog post referenced the FTC's enforcement action against Equifax, in which the FTC alleged that a failure to patch a known vulnerability led to exposure of the data of 147 million consumers. Equifax agreed to pay $700 million to settle actions by the FTC as well as the Consumer Financial Protection Bureau, and all 50 states. A June 2021 memorandum from the White House to the private sector also highlighted the importance of timely patching.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Davis Wright Tremaine LLP | Attorney Advertising

Written by:

Davis Wright Tremaine LLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Davis Wright Tremaine LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide