(Reventh image: Mojang) Audio player loading. A large security breach was discovered that could enable remote code execution by nefarious actors on a server, and that could impact heaps of online applications, such as Minecraft: Java Edition, Steam, Twitter, etc. if left unchecked. The exploit ID is CVE-2021-44228, which is marked as 9.8 as Red Hat is yet to be examined by NVD. It’s the widely used Apache Log4j Java-based logging library, and the danger lies in allowing a user to run code on a serverpotentially taking over complete control without proper access or authority. An attacker who can control log messages or log messages can execute arbitrary code loaded from LDAP servers to generate the lookup substitution operation, can read the following identification records. For a fix, there are a few different options, thankfully. This issue is apparently related to log4j versions between 2.0 and 2.04.1. Upgrading the Apache Log4j version 2.15 is the best approach to combat this issue, which is described in the security page. Even though users of older versions may be able to reduce the impact on systems – either by setting the url “log4j2.formatMsgNoLookups” to true, or by taking the JndiLookup class from classpath. If you’re running a server in a server that uses Apache, such as your own Minecraft Java server, you will want to upgrade to the newer version or get your old version ready to update as far as above, and protect your server. Similarly, Mojang has released a patch to protect the user’s game clients, and so on. Our first priority is protecting the person’s safety. Unfortunately, earlier today, we identified a security problem in Minecraft: Java Edition.The issue has been patched, but please follow these steps to secure your game server and/or servers. Please keep restraining.https://t.co/Ji8nsvpHfDecember 10, 2021. See more Long-term fear is that while those in the know are now going to get away with the potentially dangerous flaw, there will still be many more in the dark who will not and may leave the flaw unpatched for a long time. Many already fear that the vulnerability is being exploited already, including CERT NZ. As a result, many enterprise and cloud users are likely to be eager to understand the impact, just as fast as possible. Because of the ease of exploitation and the engrossibility, it’s possible that hackers begin to leverage this vulnerable market immediately, writes the security company in a post that explains it.