TIBCO Patterns: Mitigation for CVE-2021-44228 (Log4Shell)

TIBCO Patterns: Mitigation for CVE-2021-44228 (Log4Shell)

book

Article ID: KB0072764

calendar_today

Updated On:

Products Versions
TIBCO Patterns 5.5.0, 5.6.0, 5.7.0

Description

 

TIBCO is aware of the recently announced Apache Log4J vulnerability (CVE-2021-44228), referred to as “Log4Shell”. Performing these attacks requires an attacker to have control of log messages or at least the parameters for a given log message. This vulnerability theoretically enables arbitrary code to be executed on the affected system.

TIBCO’s Security Team is actively monitoring the information coming out about the Apache Log4J Vulnerability and our Product Security Incident Response Team (PSIRT) is actively evaluating how this vulnerability may affect TIBCO products and cloud services.

 

Issue/Introduction

This article contains the initial mitigation steps for Apache Log4J vulnerability (CVE-2021-44228) for the TIBCO TIBCO Patterns

Environment

All Supported Platforms

Resolution

See the attached file "Patterns_Mitigation_CVE-2021-44228.pdf" for the initial mitigation steps for the issue. These instructions are based on the mitigation documented by Apache for different vulnerable versions of Log4j2.

We will provide updates as more information becomes available and we complete our investigation. Please contact TIBCO Support with any questions.

Additional Information

 

Apache Log4J Vulnerability Update

KB 000045606 Apache Log4J Vulnerability and Impact to TIBCO Products and Services

Attachments

TIBCO Patterns: Mitigation for CVE-2021-44228 (Log4Shell) get_app