DNSFilter Response to Log4j Vulnerability

If you've been on the internet at all in the last 72 hours, you've undoubtedly heard that you should be concerned about the Log4j exploit and that lots of your software is currently vulnerable to it. On the off-chance you missed it, the nitty gritty details are here.

We've done a full internal audit of all aspects of the DNSFilter software stack, including our dashboard, backend software, databases, and our roaming clients, and can confidently say that we have no exposure to the log4j vulnerability from any angle.

Of course, we recommend doing a complete review of all of your software, as due to the nature of the exploit, it is not something DNSFilter can intercept and protect you from—but you don't have to worry about DNSFilter itself.

While DNSFilter does not play a role in mitigation or prevention of the Log4j threat, we do protect our users from malicious domains queried from your infrastructure. Since Log4j allows for the adding of malicious links into logs which get parsed, we can lessen the impact of these attacks if you are blocking malware, botnet, phishing, or other deceptive domains—including newly registered domains.

For assistance in discovering which tools actually use Log4j, this article from InfoWorld has some great suggestions on steps you can take.

Our very own Mikey Pruitt and Peter Lowe were on the RocketMSP podcast Monday December 13 discussing the Log4j vulnerability. (I made myself known in the background). You can watch the full video here:

Technical Update December 16, 2021:

As further CVEs have been released since our initial statement, we just wanted to follow up here to confirm that DNSFilter is not affected by any of the following CVEs related the the Log4J vulnerability. These include all CVEs currently known to us: CVE-2021-44228, CVE-2021-45046, CVE-2021-4104.

Full details of the vulnerabilities can be found on the CERT website.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Tycoon 2FA Infrastructure Expansion: A DNS Perspective, and Release of 65 Root Domain IOCs Tycoon 2FA Infrastructure Expansion: A DNS Perspective, and Release of 65 Root Domain IOCs

Our analysis of Tycoon 2FA infrastructure has revealed significant operational changes, including the platform's coordinated expansion surge in Spanish (.es) domains starting April 7, 2025, and evidence suggesting highly targeted subdomain usage patterns. This blog shares our findings from analyzing 11,343 unique FQDNs (fully qualified domain names) and provides 65 root domain indicators of compromise (IOCs) to help network defenders implement mo...

The Best Content Filter Software Checklist: A Buyer's Guide to DNS-Level Protection The Best Content Filter Software Checklist: A Buyer's Guide to DNS-Level Protection

Staying Ahead with Smarter Web Filtering

Across every industry and network environment, content filtering isn’t just a matter of productivity, it’s a front line of defense. From malware and phishing to compliance risks and productivity drains, the threats are real, and the stakes are high.

Smarter DNS Policies: What You Should Be Blocking (But Probably Aren’t) Smarter DNS Policies: What You Should Be Blocking (But Probably Aren’t)

DNS filtering is a foundational layer of defense and helps to fortify the strongest security stacks. Most organizations use DNSFilter to block the obvious: malware, phishing, and adult content. That’s a great start, but many are missing out on the broader potential of DNS policies.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.