skip to Main Content

The log4shell vulnerability – What to know

UPDATE (Dec 20th, 2021): Again another update has been released, NoTouch Center 4.5.246 with log4j 2.17.0 that also addresses CVE-2021-45105. We will continue to monitor log4j and follow their updates in an extremely timely manner.

UPDATE (Dec 15th, 2021): Another update has been released, NoTouch Center 4.5.233 with log4j 2.16.0 that also addresses CVE-2021-45046, which is way less bad and only applies in specific non-standard configurations. Nevertheless, we suggest to update.

A new security flaw is all over the news – “log4shell” (CVE-2021-44228), affecting (not only) Internet giants like Twitter and Apple. The culprit is a certain line of code in the Apache log4j package, an open source Java logging utility that is widely used. NoTouch Center 4.5.231, released December 11, 2021 and future versions contain log4j 2.15.0 (or newer), the updated version that is definitely not susceptible. When used in a properly up-to-date Stratodesk Virtual Appliance, it seems that the actual, malicious Remote Code Execution is not possible because the used Java version 11.0.x has that disabled by default. Nevertheless, Stratodesk strongly recommends to update to NoTouch Center 4.5.231.

NoTouch OS does not use log4j at all; furthermore a Virtual Appliance in Cloud Xtension mode also doesn’t use log4j.

A quick mitigation is to update the Virtual Appliance to 1.0-657 as it will use a mitigation technique based on the log4j.formatMsgNoLookups=true setting. In other words, if you don’t want to update NoTouch Center right away, please ensure you are running 1.0-657 as per Updating the Virtual Appliance Software (KB) – this is quick and painless and available regardless of subscription status.

The log4shell vulnerability – What to know

UPDATE (Dec 20th, 2021): Again another update has been released, NoTouch Center 4.5.246 with log4j 2.17.0 that also addresses CVE-2021-45105. We will continue to monitor log4j and follow their updates in an extremely timely manner.

UPDATE (Dec 15th, 2021): Another update has been released, NoTouch Center 4.5.233 with log4j 2.16.0 that also addresses CVE-2021-45046, which is way less bad and only applies in specific non-standard configurations. Nevertheless, we suggest to update.

A new security flaw is all over the news – “log4shell” (CVE-2021-44228), affecting (not only) Internet giants like Twitter and Apple. The culprit is a certain line of code in the Apache log4j package, an open source Java logging utility that is widely used. NoTouch Center 4.5.231, released December 11, 2021 and future versions contain log4j 2.15.0 (or newer), the updated version that is definitely not susceptible. When used in a properly up-to-date Stratodesk Virtual Appliance, it seems that the actual, malicious Remote Code Execution is not possible because the used Java version 11.0.x has that disabled by default. Nevertheless, Stratodesk strongly recommends to update to NoTouch Center 4.5.231.

NoTouch OS does not use log4j at all; furthermore a Virtual Appliance in Cloud Xtension mode also doesn’t use log4j.

A quick mitigation is to update the Virtual Appliance to 1.0-657 as it will use a mitigation technique based on the log4j.formatMsgNoLookups=true setting. In other words, if you don’t want to update NoTouch Center right away, please ensure you are running 1.0-657 as per Updating the Virtual Appliance Software (KB) – this is quick and painless and available regardless of subscription status.

Endpoint Security and Network Monitoring News for the Week of August 26; Updates from Contrast Security, Tanium, NordLayer, and More | #cybersecurity | #cyberattack

Stratodesk Achieves VMware Ready Status for 12 Consecutive Years Stratodesk, an endpoint security solutions provider,…

Read more

Subscribe to our newsletter:

Back To Top
X