Detecting Log4Shell in Cipher Scans: A Hidden Risk
Log4Shell (CVE-2021-44228) remains a top exploited vulnerability in 2025. But many miss a critical vector: TLS termination at edge devices.
The Attack Chain
- Attacker sends: User-Agent
- Load balancer (HAProxy, Nginx, F5) logs the header
log4jin the LB triggers RCE- Backend Java app may be patched — but the edge is not
Role of Weak Ciphers
Weak ciphers enable downgrade attacks:
TLS_RSA_WITH_RC4_128_MD5allows protocol downgrade- Attacker forces TLS 1.0 + malicious header
- Even patched backends are bypassed
Scan Example
nmap --script ssl-enum-ciphers -p 443 lb.example.com
| TLSv1.0:
| TLS_RSA_WITH_RC4_128_MD5 (F)
Mitigation
- Disable RC4, 3DES, TLS 1.0/1.1 at the edge
- Use TLS 1.3 + HSTS
- Remove
log4jfrom frontends or disable message lookup - Scan all TLS endpoints with the Weak Cipher Tester
FAQ
Is Log4Shell still active in 2025?
Yes — CISA lists it in the KEV catalog. Edge devices are often forgotten.
Can CDN protect against this?
Only if it strips malicious headers before logging.
Should I scan my CDN?
Yes — Cloudflare, Akamai, Fastly terminate TLS too.
Log4Shell isn’t dead. Your edge might be the entry point.