Flashes (Alerts)
Abstract
CVE-2021-44228 is a remote code execution vulnerability in Apache Log4j
Content
The Guardium Data Protection development team is actively working on a mitigation for this issue with the highest priority. Remediation is now available. Please refer to the following Security Bulletin for more details: https://www.ibm.com/support/pages/node/6527082
Further details:
- IBM Security Guardium STAPs (Windows, Linux, UNIX & z/OS) and GIM clients are not affected
- This updated blog lists products and components the are not affected. Please see latest updates in the IBM Product Security Incident Response (PSIRT) site for information and updates: https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/
- Note - At the time of release of this technote, STAP and GIM clients status has not yet been updated on the blog
- This blog explains how Log4j Vulnerability Could Impact You. IBM X-Force shares the latest on the vulnerability dubbed “Log4Shell,” a remote code execution vulnerability: https://securityintelligence.com/posts/apache-log4j-zero-day-vulnerability-update/
- This webinar explains details on the vulnerability - Log4j Zero-Day Vulnerability: What You Need to Know Now available On Demand: https://event.on24.com/wcc/r/3570143/66C51D1B65F9821B262E9E0A36CC69C1
[{"Type":"MASTER","Line of Business":{"code":"LOB24","label":"Security Software"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m0z000000Gp0JAAS","label":"APPLIANCE"}],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]
Was this topic helpful?
Document Information
Modified date:
17 December 2021
UID
ibm16525870