Update on Log4j

  • 13 December 2021
  • 2 replies
  • 264 views

Userlevel 3
Badge +3

Dear LogPoint Partner and Customer.

Recently, a critical remote code execution vulnerability in Apache log4j  (CVE-2021-44228), was discovered, affecting versions 2.0-2.14.1.

 

Vulnerability status of LogPoint products

At this time, we have determined that no LogPoint products are affected by the vulnerability.

For detailed information about the vulnerability status of each LogPoint product, please consult the table below. If you have any questions about the vulnerability, please contact LogPoint Support or LogPoint Community.

 

Details of vulnerability by LogPoint product

 

Product

Vulnerable?

Reason

LogPoint 6.12.2

Not affected

Log4J v 1.2 used

Previous LogPoint versions

Not affected

Previous versions used

UEBA

Not affected

Log4J v 1.x used

LogPoint Agent

Not applicable

Not used

Director Console

Not affected

Log4J v 1.2 used

Director Fabric

Not affected

Log4J v 1.2 used

Search Master

Not affected

Log4J v 1.2 used

AAHC

Not affected

Log4J v 1.2 used

Plugins

Not affected

Log4j v 1.2 used

Applications

Not applicable

Not used

LogPoint for SAP HANA

Not applicable 

Not used

LogPoint for SAP Light

Not affected

Not used

LogPoint for SAP Extended

Not applicable

Not used

 

* Note: log4j v1.2.x is vulnerable to another vulnerability, that is only exploitable when using the class JMSAppender. While LogPoint uses log4j in version 1.2, JMSAppender is not used in LogPoint and we have actively attempted to exploit the vulnerability, confirming that in these cases log4j v1.2 is not vulnerable in the current deployment configuration.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228

 

Regards,

 

Brian Hansen, LogPoint

VP, Customer Success

 


2 replies

We have version 6.11.2. Is she vulnerable?

Userlevel 3
Badge +3

Hi David.

No LogPoint versions are vulnerable.

As you see in the table stated as “Previous LogPoint versions” we use earlier versions.

Have a good day.

/ Brian Hansen

Reply