Symantec Web Application Firewall (WAF) Protection for Log4Shell attack.
search cancel

Symantec Web Application Firewall (WAF) Protection for Log4Shell attack.


Article ID: 230903


Updated On:


Web Application Firewall


Protection Prerequisites:

ProxySG versions 6.7.x and greater 

Latest application protection version 20210921. See “New attack permutations” section for examples on how to stay up-to-date even if you are not subscribed to application protection

Symantec WAF detects payloads in the request including all query string keys and values, header keys and values, post keys and value and cookie keys and values.


The Symantec WAF has many engines and settings. The example below is provided to ensure the WAF has at a minimum these options enabled.

If the WAF was configured via the WAF Management Center UX then the default profile will have correctly included this configuration.


http.request.detection.other.invalid_encoding(block) \

define application_protection_set WAF_engines


Vector Detection Results

While the set of permutations is very large, the following vectors are shown below as an example of attacks that are detected:



















New attack permutations

New attack permutations are expected and it is very likely that the signatures will need to be updated. Fortunately the Symantec WAF enables an administrator to write custom rules to detect these new vectors. The minimum policy required for this uses the following form:


deny http.request[name,value].regex = <latest security research regex1>
deny http.request[name,value].regex = <latest security research regex2>