{"id":7332,"date":"2021-12-13T15:17:08","date_gmt":"2021-12-13T23:17:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7332"},"modified":"2022-10-20T11:46:06","modified_gmt":"2022-10-20T18:46:06","slug":"infoblox-response-to-apache-log4j-vulnerability","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/","title":{"rendered":"Infoblox Response to Apache Log4j Vulnerability"},"content":{"rendered":"<h3><span style=\"font-weight: 400;\">Summary<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On December 10th, a zero-day vulnerability (<\/span><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\">CVE-2021-44228<\/a><\/strong><span style=\"font-weight: 400;\">) was discovered in a popular Java-based logging audit framework within Apache called Log4j. Since this disclosure, there has been a deluge of threat actors attempting to discover instances where this vulnerability still exists in order to exploit the issue. Infoblox has been diligently investigating this new threat, and we have concluded that our SaaS products are not subject to this vulnerability at this time. Investigative efforts are still ongoing for all Log4j-related vulnerabilities, including <\/span><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5645\">CVE-2017-5645<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-17571\">CVE-2019-17571<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-9488\">CVE-2020-9488<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-4104\">CVE-2021-4104,<\/a>\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-45046\">CVE-2021-45046<\/a><\/strong>, <span style=\"font-weight: 400;\"><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-45105\">CVE-2021-45105<\/a><\/strong>, and <strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44832\">CVE-2021-44832<\/a><\/strong>.\u00a0(See <\/span><strong><a href=\"https:\/\/community.infoblox.com\/t5\/Trending-KB-Articles\/Infoblox-NIOS-and-BloxOne-products-not-vulnerable-to-CVE-2021\/ba-p\/23542#M117\">KB Article 000007559<\/a><\/strong><span style=\"font-weight: 400;\">).<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><!-- The script tag should live in the head of your page if at all possible --><script type=\"text\/javascript\" async src=\"https:\/\/play.vidyard.com\/embed\/v4.js\"><\/script><!-- Put this wherever you would like your player to appear --><img decoding=\"async\" class=\"vidyard-player-embed\" style=\"width: 100%; margin: auto; display: block;\" src=\"https:\/\/play.vidyard.com\/P8hoPDEUGnVmhvYx2Rnpkm.jpg\" data-uuid=\"P8hoPDEUGnVmhvYx2Rnpkm\" data-v=\"4\" data-type=\"inline\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Our customers have two very important questions:\u00a0 \u201cAre any of the products they use vulnerable to this zero-day?\u201d and \u201cCan their security tools help to detect or prevent adversaries from exploiting the vulnerability?\u201d<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Infoblox Exposure<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It is vital that an organization\u2019s security infrastructure does not itself introduce any security vulnerabilities.\u00a0 Following an exhaustive audit of our solutions, we found\u00a0 that the most recent versions of NIOS 8.4, 8.5 and 8.6, BloxOneDDI, BloxOne Threat Defense or any of our other SaaS offerings are not affected or do not pose an increased risk to the Log4j vulnerabilities listed above.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We are aware that a vulnerability exists in NetMRI. This specific attack vector has dependencies that make successful attacks difficult, and there have been additional mitigations put into place., The presence of this vulnerability does not increase the risk profile of the system. A hotfix has been developed and is available to customers on the Infoblox Support portal. When AutoUpdate is enabled, the hotfix has already been pushed to customer devices. This hotfix has been tested by our internal Red Team and confirmed that NetMRI with the hotfix applied is not vulnerable to the Log4j vulnerabilities. Customers can access additional technical details at our KB (see <\/span><strong><a href=\"https:\/\/community.infoblox.com\/t5\/Trending-KB-Articles\/Infoblox-NIOS-and-BloxOne-products-not-vulnerable-to-CVE-2021\/ba-p\/23542#M117\">KB Article 000007559<\/a><\/strong><span style=\"font-weight: 400;\">).<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Investigative Efforts<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The Infoblox Product Security Incident Response Team (PSIRT) monitors these types of issues and has been engaged since the initial disclosure. We immediately started our investigation to understand the potential impact to our products and infrastructure with a focus on the presence of Log4j and its versions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once we had this view, our internal Red Team was able to create a test to validate if an instance of Log4j in our environment could be exploited. This rigorous process provides us with confidence in the results as to the exploitability of our products. We will continue to monitor the situation and test our products as new vulnerabilities are discovered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infoblox continues to scan our internal network for applications and systems. We employ security systems that can detect and prevent attempted exploits of this vulnerability in our environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Infoblox Security Compliance team has also contacted our subprocessors to confirm whether they have checked their systems for vulnerabilities, are remediating any issues found, and also to confirm that they have also performed due diligence on their subprocessors \/ downstream vendors.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How can Infoblox help?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">During Infoblox\u2019s due diligence involving this vulnerability, it has uncovered evidence of invalid DNS queries that we believe may be associated with adversary groups attempting to exploit systems.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using this methodology, we have uncovered several customers that may have been impacted by CVE-2021-44228 in a manner unrelated to the Infoblox product line.\u00a0 We have already communicated directly with impacted organizations and are working to help them remediate this threat as quickly as possible and limit their exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infoblox\u2019s Threat Intelligence team is actively hunting for and tracking attacks related to this vulnerability. Due to the serious nature of the threat, Infoblox will add all suspicious indicators to our MalwareC2_Generic threat feeds<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">As Infoblox learns more about the threats involved, we will continue to update our Threat Intelligence feeds.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For a more detailed analysis of the vulnerability exploitation, please read this <\/span><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/\"><span style=\"font-weight: 400;\"><b>Cyber Campaign Brief<\/b><\/span><\/a><span style=\"font-weight: 400;\"> or watch the video below.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary On December 10th, a zero-day vulnerability (CVE-2021-44228) was discovered in a popular Java-based logging audit framework within Apache called Log4j. Since this disclosure, there has been a deluge of threat actors attempting to discover instances where this vulnerability still exists in order to exploit the issue. Infoblox has been diligently investigating this new threat, [&hellip;]<\/p>\n","protected":false},"author":361,"featured_media":2565,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[455,527,613,614,395,153,615],"class_list":{"0":"post-7332","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-zero-day-exploit","9":"tag-vulnerability","10":"tag-apache","11":"tag-log4j","12":"tag-technology","13":"tag-bloxone","14":"tag-cve-2021-44228","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infoblox Response to Apache Log4j Vulnerability<\/title>\n<meta name=\"description\" content=\"This article discusses Infoblox&#039;s response to zero-day vulnerability. Learn more about its discovery within Apache and what else it is known as in the article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infoblox Response to Apache Log4j Vulnerability\" \/>\n<meta property=\"og:description\" content=\"This article discusses Infoblox&#039;s response to zero-day vulnerability. Learn more about its discovery within Apache and what else it is known as in the article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T23:17:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-20T18:46:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Druce MacFarlane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Druce MacFarlane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/\"},\"author\":{\"name\":\"Druce MacFarlane\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/6d42d673612f839efc3550add8ee84d5\"},\"headline\":\"Infoblox Response to Apache Log4j Vulnerability\",\"datePublished\":\"2021-12-13T23:17:08+00:00\",\"dateModified\":\"2022-10-20T18:46:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/\"},\"wordCount\":652,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"keywords\":[\"Zero-Day Exploit\",\"vulnerability\",\"Apache\",\"Log4j\",\"technology\",\"BloxOne\u00ae\",\"CVE-2021-44228\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/\",\"name\":\"Infoblox Response to Apache Log4j Vulnerability\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"datePublished\":\"2021-12-13T23:17:08+00:00\",\"dateModified\":\"2022-10-20T18:46:06+00:00\",\"description\":\"This article discusses Infoblox's response to zero-day vulnerability. Learn more about its discovery within Apache and what else it is known as in the article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 Security Vulnerability Scanning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-response-to-apache-log4j-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infoblox Response to Apache Log4j Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/6d42d673612f839efc3550add8ee84d5\",\"name\":\"Druce MacFarlane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_361_1639437222-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_361_1639437222-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_361_1639437222-96x96.jpg\",\"caption\":\"Druce MacFarlane\"},\"description\":\"Druce MacFarlane is the Sr. Product Manager for Threat Intelligence and Analytics here at Infoblox. He has worked in cybersecurity for 15 years.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/druce-macfarlane\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infoblox Response to Apache Log4j Vulnerability","description":"This article discusses Infoblox's response to zero-day vulnerability. Learn more about its discovery within Apache and what else it is known as in the article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Infoblox Response to Apache Log4j Vulnerability","og_description":"This article discusses Infoblox's response to zero-day vulnerability. Learn more about its discovery within Apache and what else it is known as in the article.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/","og_site_name":"Infoblox Blog","article_published_time":"2021-12-13T23:17:08+00:00","article_modified_time":"2022-10-20T18:46:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","type":"image\/jpeg"}],"author":"Druce MacFarlane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Druce MacFarlane","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/"},"author":{"name":"Druce MacFarlane","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/6d42d673612f839efc3550add8ee84d5"},"headline":"Infoblox Response to Apache Log4j Vulnerability","datePublished":"2021-12-13T23:17:08+00:00","dateModified":"2022-10-20T18:46:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/"},"wordCount":652,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","keywords":["Zero-Day Exploit","vulnerability","Apache","Log4j","technology","BloxOne\u00ae","CVE-2021-44228"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/","url":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/","name":"Infoblox Response to Apache Log4j Vulnerability","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","datePublished":"2021-12-13T23:17:08+00:00","dateModified":"2022-10-20T18:46:06+00:00","description":"This article discusses Infoblox's response to zero-day vulnerability. Learn more about its discovery within Apache and what else it is known as in the article.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","width":660,"height":454,"caption":"IPv6 Security Vulnerability Scanning"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-response-to-apache-log4j-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Infoblox Response to Apache Log4j Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/6d42d673612f839efc3550add8ee84d5","name":"Druce MacFarlane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_361_1639437222-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_361_1639437222-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_361_1639437222-96x96.jpg","caption":"Druce MacFarlane"},"description":"Druce MacFarlane is the Sr. Product Manager for Threat Intelligence and Analytics here at Infoblox. He has worked in cybersecurity for 15 years.","url":"https:\/\/www.infoblox.com\/blog\/author\/druce-macfarlane\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/361"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7332"}],"version-history":[{"count":16,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7332\/revisions"}],"predecessor-version":[{"id":8150,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7332\/revisions\/8150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}