News
Abstract
I am using IBM RPA with Automation Anywhere. What is the impact of CVE-2021-44228 on my environment?
Content
For v19
Currently, there are no known instances of log4j configuration that can lead to remote exploit in IBM RPA with Automation Anywhere v19 releases.
We recommend deploying all in-depth defense measures listed by AA. Those measures and the full statement from Automation Anywhere can be found here. (Apeople login required)
For v11
At this moment in time, there are no known exploits that can be deployed using log4j in versions 11.0.0.2 up to 11.0.0.10.IFix003 of IBM RPA with Automation Anywhere.
With that said, we recommend implementing In-depth defense measures. Those measures, the step by step on how to implement them and the full statement from Automation anywhere can be found here (Apeople login required)
With that said, we recommend implementing In-depth defense measures. Those measures, the step by step on how to implement them and the full statement from Automation anywhere can be found here (Apeople login required)
Version 11.0.0.1 of IBM RPA with Automation Anywhere (AA version 11.2.0) is susceptible to the remote exploit—steps on how to remediate this can be found here under "On these versions 11.2.0, 11.2.1 to 11.2.1.5 of Control Room installation, this will disable Bot Insight:".
The investigation is still ongoing for versions 11.0.0.0.
IBM version (installer) Software Lifecycle |
Implements AAE version | Known exploits |
11.0.0.10.iFix003 | 11.3.5.3 | No |
11.0.0.10.iFix002 | 11.3.5.2 | No |
11.0.0.10.iFix001 | 11.3.5.1 | No |
11.0.0.10 | 11.3.5 JDK update | No |
11.0.0.9 | 11.3.5 | No |
11.0.0.8.iFix002 | 11.3.4.2 | No |
11.0.0.8.iFix001 | 11.3.4.1 | No |
11.0.0.8 | 11.3.4 | No |
11.0.0.7.ifix001 | 11.3.3.1 | No |
11.0.0.7 | 11.3.3 | No |
11.0.0.6.ifix001 | 11.3.2.2 | No |
11.0.0.6 | 11.3.2 | No |
11.0.0.5 | 11.3.2 | No |
11.0.0.4.ifix002 | 11.3.1.2 | No |
11.0.0.4.ifix001 | 11.3.1.1 | No |
11.0.0.4 | 11.3.1.0 | No |
11.0.0.3 | 11.3.0.0 | No |
11.0.0.2 | 11.3.0.0 | No |
11.0.0.1 | 11.2.0.0 | Yes |
11.0.0.0 | 11.1.2.0 | Under Investigation |
IMPORTANT
Automation Anywhere and IBM are constantly reassessing the risks, and new analysis indicates that variations of the exploit are still being found.
You can expect updates both on this page, and the two Automation Anywhere links listed above.
Automation Anywhere and IBM are constantly reassessing the risks, and new analysis indicates that variations of the exploit are still being found.
You can expect updates both on this page, and the two Automation Anywhere links listed above.
Additionally please subscribe to My Notifications and stay informed of critical IBM software support updates.
If you have any questions about the procedure described here, open a ticket with IBM Support
[{"Type":"MASTER","Line of Business":{"code":"LOB45","label":"Automation"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSMGNY","label":"IBM Robotic Process Automation with Automation Anywhere"},"ARM Category":[{"code":"a8m50000000L2YvAAK","label":"RPA-\u003EControl Room"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"11.0.0;19.0.0"}]
Was this topic helpful?
Document Information
Modified date:
23 December 2021
UID
ibm16525866