US English (US)
ES Spanish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • Contact Us
English (US)
US English (US)
ES Spanish
  • Home
  • AutoElevate Knowledgebase
  • Announcements

Apache Log4j2 vulnerability (CVE-2021-44228)

AutoElevate services are not impacted by Apache Log4j2's vulnerability (CVE-2021-44228)

Written by Owen Parry

Updated at July 27th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • AutoElevate Knowledgebase
    New to AutoElevate? START HERE General & Troubleshooting Managing Rules Integrations Announcements FAQ Sales & Marketing
  • Password Boss Knowledgebase
    Using Password Boss Business Administration Password Boss Partner Documents
  • Changelogs for Autoelevate and Password Boss
  • Current Status
  • Marketing Toolkit
    MSP Marketing & Education Toolkit
+ More

Table of Contents

Background

AutoElevate's services and applications are NOT affected by the Apache Log4j2 vulnerability (CVE-2021-44228).

 

Background


In 2021, a high-severity security vulnerability in the Java-based log4j logging framework (CVE-2021-44228) was reported and began to be actively exploited on systems across the internet. This exploit, also known as "log4shell" or "shellshock, " provides a vector for remote code execution.

Since the vulnerability was made public, we have been actively reviewing and deep-diving into all our codebases, dependencies infrastructure, and 3rd party vendors to see whether or not any part was affected. We are happy to report that nothing was found.

None of our web services are written or use Java code or libraries. The only Java code in our stack is our Android mobile application, which was checked thoroughly, including all dependencies. In addition, there is no usage of Log4j at all.

Security is a top priority at AutoElevate, so we will continue to review & assess vulnerabilities as they become known. We want to maintain and ensure security in your environments.  


 

vulnerability log4j2

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to disable ConnectWise Access Management (CAM)
  • Removal of the "Number of Rules" column from the Events grid
  • Products
    • Privileged Access Management
    • Password Management
  • Solutions
    • For MSPs
    • For IT Pros
    • By Industry
  • Resources
    • Weekly Demos
    • Events
    • Blog
    • FAQ
  • Company
    • Leadership
    • Culture + Values
    • Careers
    • Awards
    • News & Press
    • Trust Center
    • Distributors
  • Get Pricing
  • Free Trial
  • Request a Demo
  • Support
  • Login
  • Contact
4925 Independence Parkway
Suite 400
Tampa, FL 33634
CALL US (813) 578-8200
  • Link to Facebook
  • Link to Linkedin
  • Link to Twitter
  • Link to Youtube
© 2023 CYBERFOX LLC ALL RIGHTS RESERVED  |  Privacy Policy

Knowledge Base Software powered by Helpjuice

Expand