Log4J Vulnerability Announcement
UPDATE: 16/12/2021 1030hrs
Cryoserver is also not vulnerable to the https://nvd.nist.gov/vuln/detail/CVE-2021-45046 variant - as we are not using the affected version of Log4J.
UPDATE: 14/12/2021 1630hrs
Following our previous announcement, we are pleased to confirm that no version of Cryoserver is vulnerable to CVE-2021-44228
Our initial examination of Cryoserver versions <v9.5.0 led us to believe that there existed a back-end vulnerability that could potentially be exploited. We have now confirmed that this is not the case.
Cryoserver customers pre-version 9.5 should nevertheless schedule an upgrade at some point in the future as good practice.
On Friday 10th December, Apache announced a critical vulnerability within the LOG4J logging library for Java, called Log4Shell or LogJam.
At 10/10 severity, this is comfortably one of the most serious IT vulnerabilities to have been discovered in recent memory, as Log4J is often installed on both Linux and Windows systems either directly, or often as a requirement of another package or system.
Log4J is included on servers built by Cryoserver.
All our Cloud services
Are not vulnerable to CVE-2021-44228
On-premises versions of Cryoserver on or above v.9.5.0
v9.5.0 released in January 2021 are not vulnerable to CVE-2021-44228
Versions prior to v9.5.0 are partially vulnerable, as described below.
CVE-2021-44228 Attack Vectors:
Web Site Attack Vector
The attacker uses the public website to initiate the attack.
No versions of Cryoservers' are vulnerable to this attack vector.
Back-End Attack Vector
The administrator of Cryoserver has set up an outbound connection to an LDAP server that is under the control of an attacker.
The attacker manipulates the remote LDAP server to initiate the attack.
Cryoserver v9.5.0 and above is not vulnerable to this attack vector.
As a next step, please email email@example.com if you have any concerns and/or wish to upgrade to our current 9.6 release.Blog Announcement