{"id":4765,"date":"2021-12-13T14:01:42","date_gmt":"2021-12-13T19:01:42","guid":{"rendered":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/?p=4765"},"modified":"2021-12-17T10:46:48","modified_gmt":"2021-12-17T15:46:48","slug":"the-apache-log4j-vulnerability-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/the-apache-log4j-vulnerability-what-you-need-to-know\/","title":{"rendered":"The Apache Log4j vulnerability: What you need to know"},"content":{"rendered":"<p>On December 9<sup>th<\/sup> 2021, Apache published a zero-day critical vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2021-44228\" target=\"new\" rel=\"noopener\">(CVE-2021-44228)<\/a> for its widely popular Apache Log4j, and is being referred to as \u201cLog4Shell.\u201d This vulnerability is considered \u201ccritical\u201d with a CVSS score of 10, allowing for Remote Code Execution with system-level privileges. If you haven&#8217;t yet <a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-attackers-are-making-thousands-of-attempts-to-exploit-this-severe-vulnerability\/\">heard the news<\/a>, this is a severe risk with a major security flaw being discovered.<\/p>\n<p>&nbsp;<\/p>\n<p>When exploited, an attacker can run arbitrary code on a device and gain full control of the exploited device &#8212; this will render the device compromised, and may impact other devices trusted by the compromised device which is now controlled by the attacker.<\/p>\n<p>&nbsp;<\/p>\n<p>What does that mean for you? What iManage products have been affected? How has iManage responded to this vulnerability?<\/p>\n<h4><\/h4>\n<h4><strong>NOTE: RBRO products do not use any Java libraries, including Log4J. This vulnerability will have no impact on any of our products.<\/strong><\/h4>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<h3><strong>iManage products affected by this issue<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>iManage has released mitigation steps on the latest Apache log4j vulnerability (<a href=\"https:\/\/fs.imanage.com\/adfs\/ls?RelayState=https%3A%2F%2Fhelp.imanage.com%2Fhc%2Fen-us%2Farticles%2F4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2&amp;brand_id=328408&amp;SAMLRequest=fZHNTsMwEITvfYrIdyexU9rEalJFrZAqFYRa4MDNdRYaEdvB65SfpycNVCqH%0Act2d0cx%2BO5t%2F6CY4gMPampywMCbzYjRDqZtWlJ3fmw28dYA%2B6HUGxbDISeeM%0AsBJrFEZqQOGV2JY3a8HDWLTOeqtsQ84s%2FzskIjjfFyDBapmTo8HRXVaNeSIV%0AvVLjhDIGiqZ8EtOdTLNpxidpVbFej9jByqCXxueEx5xRxilL7lkqkqng2RMJ%0AHk%2FX9VkkKE9hC2uw0%2BC24A61gofNOid771sUUVRraeQLYNe21vnwC0wF%2BBoq%0AqyOpFCBGx5KkGECJoYQrLptm0bnul%2B5tz2G1vLNNrT6Dsmns%2B8KB9JAT7zog%0AwbV1WvrL5FjIhkld0edBKkDLuimryvUFSVT8pP59YzH6Bg%3D%3D%0A\">see iManage for complete details<\/a>). The following components listed by iManage are affected by CVE-2021-44228 and require action to remediate the issue.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>NOTE:<\/strong>\u00a0All cloud issues have been mitigated and there was zero impact to any customer data stored in iManage Cloud.<\/p>\n<p>&nbsp;<\/p>\n<p>iManage Work Server is not affected by this issue.<\/p>\n<p>&nbsp;<\/p>\n<table width=\"0\">\n<thead>\n<tr>\n<td><strong>Product affected<\/strong><\/p>\n<p>&nbsp;<\/td>\n<td><strong>Component(s) affected in product<\/strong><\/p>\n<p>&nbsp;<\/td>\n<td><strong>Versions affected<\/strong><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>iManage Work Indexer powered by<\/p>\n<p>IDOL (IDOL Indexer)<\/td>\n<td>\n<ul>\n<li>WorkSite Connector<\/li>\n<li>WorkSite DiffTool<\/li>\n<\/ul>\n<\/td>\n<td>IDOL Indexer 10.3.0.26 and later<\/td>\n<\/tr>\n<tr>\n<td>iManage Work Indexer powered by<\/p>\n<p>RAVN (RAVN Indexer)<\/td>\n<td>\n<ul>\n<li>RAVN Solr<\/li>\n<\/ul>\n<\/td>\n<td>RAVN Indexer 10.3.x<\/td>\n<\/tr>\n<tr>\n<td>iManage Records Manager<\/td>\n<td>\n<ul>\n<li>iManage Records Manager Server<\/li>\n<li>iManage Records Manager Indexer<\/li>\n<\/ul>\n<\/td>\n<td>Records Manager 10.3.x and later<\/td>\n<\/tr>\n<tr>\n<td>iManage Security Policy Manager<\/td>\n<td>\n<ul>\n<li>iManage Records Manager Agent<\/li>\n<li>Adjust Security REST Service<\/li>\n<\/ul>\n<\/td>\n<td>All versions<\/td>\n<\/tr>\n<tr>\n<td>iManage Threat Manager<\/td>\n<td>\n<ul>\n<li>iManage Threat Manager<\/li>\n<\/ul>\n<\/td>\n<td>All versions<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>We are committed to security<\/strong><\/h3>\n<p>RBRO Solutions has identified the affected components and we are updating our systems and products. Our security team and their efforts completed the investigation of its own devices and networks and found no evidence of compromise at this time.<\/p>\n<p>If you require additional information, please do not hesitate to contact your RBRO Solutions representative.<\/p>","protected":false},"excerpt":{"rendered":"<p>On December 9th 2021, Apache published a zero-day critical vulnerability (CVE-2021-44228) for its widely popular Apache Log4j, and is being referred to as \u201cLog4Shell.\u201d This vulnerability is considered \u201ccritical\u201d with a CVSS score of 10, allowing for Remote Code Execution with system-level privileges. If you haven&#8217;t yet heard the news, this is a severe risk [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4766,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,20,101],"tags":[],"class_list":["post-4765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-imanage","category-security","category-cloud"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/posts\/4765"}],"collection":[{"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/comments?post=4765"}],"version-history":[{"count":0,"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/posts\/4765\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/media\/4766"}],"wp:attachment":[{"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/media?parent=4765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/categories?post=4765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites7.ditcanada.com\/rbro\/trunk\/wp-json\/wp\/v2\/tags?post=4765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}