Advises from our vendors. We update when new info is available. If you need any assistance please reach out to our support.
A high severity vulnerability (CVE-2021-44228) impacting multiple versions of the Apache Log4j2 utility was disclosed publicly on December 9, 2021. The vulnerability impacts Apache Log4j2 versions below 2.16.0. Find the details of this vulnerability documented here: https://logging.apache.org/log4j/2.x/security.html
ManageEngine products bundled with vulnerable Log4j2:
Product name |
Jar version in bundled dependency |
ADManager Plus |
V2.11.1 |
ADAudit Plus |
V2.10.0 |
DataSecurity Plus |
V2.10.0 |
EventLog Analyzer |
V2.9.1 |
M365 Manager Plus |
V2.11.1 |
RecoveryManager Plus |
V2.11.1 |
Exchange Reporter Plus |
V2.11.1 |
Log360 |
V2.9.1 |
Log360 UEBA |
V2.11.1 |
Cloud Security Plus |
V2.9.1 |
Analytics Plus |
V2.7 |
M365 Security Plus |
V2.11.1 |
Please note that we have not identified any exploitable cases due to Log4j2 in the above products as we do not use Log4j directly for logging. But, some of the third parties we use bundle Log4j2 as a dependency. So as an additional safety measure, customers are instructed to apply the mitigation steps listed below:
Other ManageEngine products that are not listed above are NOT impacted by this vulnerability.
We are continuing to analyze the issue and will update this advisory if any new information becomes available.
For any additional details or assistance, please contact security@manageengine.com
Source: ManageEngine PitStop
A zero-day vulnerability “Log4Shell” (CVE-2021-44228) has been disclosed on 9 December 2021 and is already actively being exploited.
Important things first: Cryptshare products are not affected by the Log4Shell vulnerability.
Please note, however, that our Software Development Kit (SDK) includes a third-party mail server (Apache James) which is affected by the vulnerability.
Here you can find our detailed statement about the incident and how you should act regarding the SDK.
Update (2021-12-16) - A further vulnerability was discovered in the Log4J component (CVE-2021-45046) and we are continuing to investigate the impact.
F-Secure Messaging Security Gateway is affected and patches are available. For most customers, these have been automatically applied, but please refer to https://community.f-secure.com/common-business-en/kb/articles/9226-the-log4j-vulnerabilities-cve-2021-44228-cve-2021-45046-which-f-secure-products-are-affected-what-it-means-what-steps-should-you-takefor more details.
F-Secure Policy Manager and related products listed below are NOT affected by this new vulnerability, and the existing patch resolves all known issues.
F-Secure Elements Connector has been automatically upgraded to a patched version and no customer action is needed. We do advise customers to check they have the latest version installed though.
We recommend that customers regularly check the https://community.f-secure.com/common-business-en/kb/articles/9226-the-log4j-vulnerabilities-cve-2021-44228-cve-2021-45046-which-f-secure-products-are-affected-what-it-means-what-steps-should-you-takefor the latest information, but we will update this status as critical information is available.
Trustwave security and engineering teams became aware of the Log4j zero-day CVE-2021-44228 overnight on December 9. We immediately investigated the vulnerability and potential exploits.
Trustwave infrastructure has not been affected by the vulnerability / exploit.
Where there was potential for abuse via the exploit, we have remedied in our environments. We are diligently watching over our customers for exposure and associated attacks, as we are able to detect the exploit in the wild. We are taking action with approved mitigation efforts.
Trustwave Product Information:
Source: Trustwave support portal & this blog post