Wallarm API Security Wallarm updates logo

Wallarm updates

Discover the latest features, improvements, and updates in Wallarm API Security

Subscribe to Updates

Labels

  • All Posts
  • API Security
  • WAAP
  • ANNOUNCEMENT
  • IMPROVEMENT
  • FIX
  • FAST

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • August 2021
  • April 2021
  • March 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • October 2019
  • August 2019
  • April 2019
ANNOUNCEMENT
3 years ago

Update on new DoS security issue in Log4j (CVE-2021-45105)

A new Log4j attack vector can potentially lead to the Denial of Service attack and the application crash. CVE-2021-45105 has been issued (the severity for this is classified as High - 7.5).

  • Wallarm Research Team has already verified that the Wallarm attack engine can detect CVE-2021-45105 exploits.
  • Attempts at exploitation will be automatically blocked in a blocking mode. When working in a monitoring mode, consider creating a virtual patch
  • A new fixed version of Log4j (2.17) has been published by Apache. Upgrades are highly recommended.
Avatar of authorWallarm team
ANNOUNCEMENT
3 years ago

Update on Log4Shell (CVE-2021-44228)

Quick update

  • Wallarm has rolled out the update to detect and mitigate CVE-2021-44228.
  • No additional actions are required from the customers
  • Attempts at exploitation will be automatically blocked in a blocking mode
  • When working in a monitoring mode, consider creating a virtual patch

Log4Shell

A 0-day exploit in the Java core library log4j was discovered that results in Remote Code Execution (RCE) by simple 1-line exploit with JNDI url. Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. Read more.

The attack surface is very wide, since it’s almost impossible to find any single Java project without the log4j library enabled. It affects internal services and APIs that are based on Java and uses other API and application data to log them.

Wallarm update

Wallarm automatically identifies attempts of the Log4Shell exploitation and logs these attempts in the Wallarm Console. Corresponding changes have been added within two hours after the first information about CVE-2021-44228 has been published.

image.png

You can search for the relevant events by using filter by CVE:

image.png

Mitigation

When using Wallarm in blocking mode, these attacks will be automatically blocked. No actions required.

When using a monitoring mode, we suggest creating a virtual patch. Feel free to reach out to support@wallarm.com if you need assistance.

Avatar of authorWallarm team
API SecurityWAAP
3 years ago

Simplified configuration of bruteforce protection

It's now easier to configure protection against API abuse, bruteforce or dirbusting attacks. Use an updated interface of Triggers:

  • The Bruteforce trigger defines classic bruteforce attack protection against specific URI based on the number of incoming requests.
  • The Forced browsing trigger forced browsing attacks allows to protect your apps against dirbusting (based on application 404 response codes)

In the simplest case, it is enough to enter the URI when creating the trigger. Wallarm will collect statistics from all the distributed Wallarm nodes deployed across your whole infrastructure.

image.png

When required, you can also use regular expressions (for example. wildcard URLs) or specify specific request headers (such as cookies) using the advanced view. Read more in our documentation.

Note: There is no need to edit your existing rules. However, previous rules “Add forced browsing attack tag to requests”, “Add brute force attacks tag to requests” will no longer be visible in the Rules section.

Avatar of authorWallarm team
ANNOUNCEMENT
3 years ago

Wallarm Node 3.4 released

EN_3.4.png

The new version of Wallarm Node is released. We recommend planning an upgrade soon.

The main changes for Node 3.4:

  • Added support for CloudLinux OS 6.x
  • Version of Envoy used in the Wallarm Envoy-based Docker image has been increased to 1.18.4

Wallarm Node 2.18 and lower are no longer supported. Note: Existing nodes will continue to operate as usual. However, we won't provide hotfixes and will limit support requests.

Before upgrading the agents, please carefully review the list of changes and general recommendations. Should you have any questions, feel free to contact our support team at support@wallarm.com.

Avatar of authorWallarm team
ANNOUNCEMENT
3 years ago

Updates from Wallarm’s detection team (October 2021)

new-detects.png

We are happy to share recent work on the quality of attack and vulnerability detection!

We have added the support for new attack type detection: SSTI, SSI and Email Injection.

The rule set for detection of other attack types (SQLi, XSS, Path Traversal, Scanner, RCE) is now wider and more accurate.

We have also added the rules for Wallarm Scanner to detect new vulnerabilities in applications:

  • Remote Code Execution in Confluence Server and Data Center — CVE‑2021‑26084
  • Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 — CVE‑2021‑41773
  • Remote Code Execution in Microsoft Exchange Server — CVE‑2021‑26855
  • Remote Code Execution in Apache Druid Embedded — CVE‑2021‑25646
  • Remote Code Execution in Laravel Debug Mode — CVE‑2021‑3129
  • Directory Traversal in ffay lanproxy 0.1 — CVE‑2021‑3019
  • NoSQL injection in Agentejo Cockpit before 0.11.2 via the Controller/Auth.php resetpassword function — CVE‑2020‑35847

The changes are already supported by the Wallarm components. Additional product configuration to apply the changes is not required.

Avatar of authorWallarm team
IMPROVEMENT
3 years ago

Microsoft Teams integration

news-pic-placeholder (6).png

Notifications to your Microsoft Teams channel are now available.
Get updates for security and system events:

  • Vulnerabilities detected
  • Scope changed: updates in hosts, services, and domains
  • Exceeded threshold of attack, hit, or incident number
  • Newly added users
  • Deleted or disabled integration

Read more about setting up the integration with Microsoft Teams on our documentation portal.

Avatar of authorWallarm team
ANNOUNCEMENT
3 years ago

URI constructor for rule conditions

news-pic-placeholder (4).png

Now rule conditions can be configured faster. It is enough to specify a request address in the newly added URI constructor form, and we will automatically convert it to a variety of conditions for each request point. The conversion result can be extended in the advanced edit form you used before.

The URI constructor accepts regular expressions and several other formats. For more information, check our documentation.

Avatar of authorWallarm team
ANNOUNCEMENT
3 years ago

New rules

news-pic-placeholder.png

Reduce the number of false positives by using the following rules:

  • Disable base64 parser for parameters with unencoded values
  • Allow file upload and binary data transfer in parameters
  • Disable search some attack types for specific endpoints, such as SQL injection, in posts on the DBA forum

With other rule types, you can also add headers to the server response or control the mode of the Active threat verification module. For the detailed description of the new rules, check our
 documentation
.

P.S. If our support team has already created these rules, they will be displayed in the Rules section.

Avatar of authorWallarm team
ANNOUNCEMENT
3 years ago

Blocking countries, Tor nodes, proxies, and data centers

news-pic-placeholder (1).png

Should your customers come from data centers? Not typically. It could be helpful to exclude some of the traffic sources to improve the security of applications and APIs.

With Wallarm, you can block traffic originated from a specific country based on compliance requirements ,or block Tor exit nodes and popular proxy servers frequently generating a lot of malicious requests.

Wallarm also identifies and displays in the Wallarm Console the IP address sources, i.e countries, data centers, VPN, and residential proxies.

Read more about the new blocking features on our documentation portal.

We rely on the data from 3rd party providers including IP2Location which is a partner of Wallarm.

Avatar of authorWallarm team
ANNOUNCEMENT
3 years ago

Wallarm Node 3.2 Released

news-pic-placeholder.png

We are pleased to announce the general availability of the Wallarm Node 3.2. This is a major update recommended to install.

Highlights

  • Support for new filtration mode, safe blocking
  • Management of IP address whitelist via the Wallarm Console
  • Ability to whitelist, blacklist, or greylist a subnet, Tor network IPs, VPN IPs, a group of IP addresses registered in a specific country or data center
  • Ability to whitelist, blacklist, or greylist request sources for specific applications
  • New module API Discovery that automatically identifies the application API structure based on real traffic analysis
  • The number of requests originated from blacklisted IPs is now displayed in the statistic service output, in the new parameter blockedbyacl and in the existing parameters requests, blocked

How to upgrade

Upgraded packages of Wallarm node are already available for installation from the repositories, AWS AMI and GCP VM images. The migration guide is available on the docs portal.

Avatar of authorWallarm team