The Untold Story of Log4j and Log4Shell
Analysis of the Log4Shell crisis through the eyes of a Log4j maintainer and practical lessons on open source security in 2024.
Source
YouTube talk
Original talk by Christian Grobmeier about Log4j and Log4Shell.
What is the issue about?
Christian Grobmeier tells the story of the incident Log4Shell (CVE-2021-44228) from within the Apache Logging Services team. The Log4j vulnerability showed how fragile a global dependency chain can be: a critical flaw in a small library affected infrastructure around the world, including enterprise services, government agencies and consumer platforms.
The main focus of the release is not only on the technical bug, but also on systemic reasons: lack of support from maintainers, low transparency of dependencies, weak secure development culture and late response of organizations to critical CVEs.
Guest and his regalia
Christian Grobmeier
- Maintainer of the Apache Log4j library.
- Member of the Apache Logging Services team (Apache Software Foundation).
- One of the people who worked in the response phase center during the Log4Shell incident.
Key insights
Open source is not automatically safe
Even a mature and widely used library may contain a critical vulnerability. Security depends on processes, people and support culture.
The scale of dependencies increases the risk
A small component in the supply chain can create a global incident in thousands of services simultaneously.
The most dangerous vulnerability is ignorance
The lack of secure coding competencies among developers and maintainers turns into a real architectural hole.
Maintainer support is part of security
Critical libraries cannot be supported by the efforts of a couple of volunteers. We need input, review and joint support from consumer companies.
Collaborative culture influences sustainability
Aggression and blame only worsen the response. Working together on a fix and respecting maintainers speeds up recovery.
Proactive security is more important than fire response
SBOM, dependency scanning, regular updates and defense-in-depth should be built into the process until the next 0-day.
What does this mean for engineers?
- Control dependencies: minimize unnecessary libraries and check their lifecycle.
- Enable automatic alerts and dependency updates (Dependabot/SCA).
- Don't trust external input by default and validate data at system boundaries.
- Disable unsafe library features by default if they are not needed.
- Add vulnerability scanning, secrets scanning, and dependency chain checking to CI/CD.
- Generate SBOM to quickly understand the blast radius of new CVEs.
What does this mean for team leads and CTOs?
- Consider open source dependency risks as part of the business risk and SRE risk model.
- Assign ownership to monitoring CVEs and urgently applying critical patches.
- Maintain an up-to-date SBOM for all services and regularly check the composition of dependencies.
- Give engineers time to contribute to critical open source projects that the company uses.
- Develop a secure coding culture: training, internal champions and regular tabletop reviews.
- Plan defense-in-depth at the architectural level: isolation, sandboxing, principle of least privilege.
CVE
CVE-2021-44228
Official Log4Shell vulnerability card in NVD.

