Ticket Description

Viewing Service: Chile <--> Puerto Rico

Domains affected:

  • AmLight - UPR

  • ANSP

  • ESNet

  • FLR

  • Internet2

  • NCSA

  • RedCLARA

  • Reuna

  • RNP

  • Vera Rubin Observatory

Services affected: Clear Filters

Sub-services affected:

  • 100G - BCT - ATL

  • 100G - BCT - MIA

  • 100G - FTZ - CPT

  • 100G - MIA - JAX

  • 100G - MIA - SJU

  • 100G - SAO - FTZ

  • 100G - SCL - PTY

  • 100G - SCL - SAO

  • 100G - SJU - PTY

  • 200G - FTZ - BCT

  • 200G - SAO - BCT

  • Crown Castle Dark Fiber - Shortest Path

  • Google PoC

Ticket ID: T00000255

Started: Dec. 9, 2021, midnight

Ended: Jan. 31, 2022, midnight

Description:

AmLight/AMPATH is aware of the Apache Zero-Day Log4j vulnerability, first reported publicly on December 9, 2021, as well as subsequent log4j vulnerabilities. To date, AmLight/AMPATH has observed no Indicators of Compromise (IOC) in either our network infrastructure or supporting systems. AmLight/AMPATH is proactively monitoring, investigating, and responding to threats that may impact the Academic/Commodity network. In addition, we are working closely with our connectors, vendors, and service providers to identify the potential impact and to ensure their organizations have initiated containment, investigations, and mitigation plans addressing this vulnerability and any other potential cyber threat.

Notes:


Ticket Logs