US English (US)
ES Spanish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • Contact Us
English (US)
US English (US)
ES Spanish
  • Home
  • Password Boss Knowledgebase
  • Password Boss Partner Documents
  • RECENT CHANGES
  • Announcements

Apache Log4j2 vulnerability (CVE-2021-44228)

Learn about the security vulnerability in the Apache Log4j2 library and how to protect yourself against it.

Written by Owen Parry

Updated at July 27th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • AutoElevate Knowledgebase
    New to AutoElevate? START HERE General & Troubleshooting Managing Rules Integrations Announcements FAQ Sales & Marketing
  • Password Boss Knowledgebase
    Using Password Boss Business Administration Password Boss Partner Documents
  • Changelogs for Autoelevate and Password Boss
  • Current Status
  • Marketing Toolkit
    MSP Marketing & Education Toolkit
+ More

Table of Contents

Password Boss' services and applications are not affected by the Apache Log4j2 vulnerability (CVE-2021-44228)

Password Boss' services and applications are not affected by the Apache Log4j2 vulnerability (CVE-2021-44228)

Background
On 12/10/21, a high-severity security vulnerability in the Java-based log4j logging framework (CVE-2021-44228) was reported and began to be actively exploited on systems across the internet. This exploit, also known as "log4shell" or "shellshock, " provides a vector for remote code execution.

Since the vulnerability was made public, we have been actively reviewing and deep-diving into all our codebases, dependencies infrastructure, and 3rd party vendors to see whether any part was affected. We are happy to report that nothing was found.

None of our web services are written or make use of any Java code or libraries. The only Java code in our stack is our Android mobile application, which was checked thoroughly, including all dependencies, and there is no usage of Log4j at all.

Security is a top priority at Password Boss, so we will continue to review & assess vulnerabilities as they become known to maintain and ensure security in your environments.

log4j2 vulnerability

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Important Password Boss Notification
  • Products
    • Privileged Access Management
    • Password Management
  • Solutions
    • For MSPs
    • For IT Pros
    • By Industry
  • Resources
    • Weekly Demos
    • Events
    • Blog
    • FAQ
  • Company
    • Leadership
    • Culture + Values
    • Careers
    • Awards
    • News & Press
    • Trust Center
    • Distributors
  • Get Pricing
  • Free Trial
  • Request a Demo
  • Support
  • Login
  • Contact
4925 Independence Parkway
Suite 400
Tampa, FL 33634
CALL US (813) 578-8200
  • Link to Facebook
  • Link to Linkedin
  • Link to Twitter
  • Link to Youtube
© 2023 CYBERFOX LLC ALL RIGHTS RESERVED  |  Privacy Policy

Knowledge Base Software powered by Helpjuice

Expand