Skip to main content

URGENT BULLETIN

IFS Advisory:  IFS Products, Services and Log4j

 

IFS Advisory:  IFS Products, Services and Log4j

 

Update (22nd December 2021 8:30 UTC)

Thank you to everyone who has actively participated in this KBA.  We trust that the questions asked and the responses given have been of benefit to wider understanding of the mitigation of CVE-2021-44228 with respect to IFS products and services.  Questions have however now started to move beyond this particular CVE and in to the area of customer-specific issues that are hard to track in a single threaded article, so this KBA is now closed to further comments.  If you have product support issues please therefore report them through your usual support channel, or if you have questions or advice to share related to your experience with mitigating this vulnerability, please use the appropriate Community forum. 

 

Update (21st December 2021 13:30 UTC)

IFS Developer Studio update 21.82.845200.20211220 is now available. This update contains the fix (JndiLookup.class removal) that mitigates the log4j vulnerability CVE-2021-44228 when deploying to the local server on the developer machine. Please read the  KBA  article for information on how the tool is updated.

 

Update (20th December 2021 12:30 UTC)

IFS Cloud 21R1 SU9 is now available within the LE portal and completes the remediation deliveries for IFS Cloud with regard to CVE-2021-44228 vulnerability.  This is also completes the delivery of all necessary remediations for all IFS products for this vulnerability.  IFS on-premise customers are strongly recommended to apply the available remediations at the earliest opportunity. The impact KBA has been updated accordingly.

 

Update (19th December 2021 13:30 UTC)

IFS Cloud 21R2 SU2 is now available within the LE portal and remediates the CVE-2021-44228 vulnerability.  IFS Cloud 21R1 SU9 is in the final stages of deployment and is planned to be available on 20th December 2021.  The impact KBA has been updated accordingly.

 

Update (17th December 2021 17:15 UTC)

The impact KBA has been updated to reflect the availability of the IFS Maintenix Service Update.  Information on this and further important updates regarding mitigation actions relating to the IFS Maintenix product are available here.

 

Update (17th December 2021 17:00 UTC)

The impact KBA has been updated to include guidance for IFS Applications 10 on-premise and remote environments. 

 

Update (17th December 2021 14:30 UTC)

The impact KBA has been updated to include guidance regarding IFS development tools. 

 

Update (17th December 2021 14:00hrs UTC)

Oracle has announced that Oracle Weblogic is affected by CVE-2021-44228.  However, whilst Weblogic bundles Log4J, IFS is not enabling it nor including it in any CLASSPATH and therefore this is not an issue that needs mitigation.  IFS will provide the relevant Oracle patches with the next Oracle CPU to fully remediate the issue.

For those with an Oracle Support account, further information can be found at the following locations:

 

Update (16th December 2021 13:00 UTC)

The impact KBA has been updated. 

Protection against CVE-2021-44228 for IFS Applications 10 on premise deployment is now in final test and anticipated for release 17th December 2021.  This protection will also be included in IFS Applications 10 Update 15 planned for release on Thursday 3rd March 2022.

 

Update (16th December 2021 12:45 UTC)

Mitigation to protect against CVE-2021-44228 is now in place for IFS Applications 10 in the IFS Cloud ServiceFull remediation for IFS Apps 10 Cloud Service customers is in test and further details regarding deployment will be posted in the bulletin.

 

Update (16th December 2021 9:00 UTC)

The impact KBA has been updated to reflect that all customer environments for IFS Cloud in the IFS Cloud Service now have mitigation applied. Mitigation for remote or on premise IFS Cloud customers and all IFS Applications 10 customers regardless of deployment type are in test. Service Updates for IFS Cloud and IFS Applications 10 are also in test.

 

Update (15th December 2021 19:30 UTC)

Our KBA has been updated to reflect that IFS Fleet Planner service updates are now fully applied.

 

Update (15th December 2021 16:00 UTC)

IFS are following closely the ongoing analysis regarding CVE-2021-45046 and would highlight that our remediation is currently based upon the Log4j 2.16.0 fix. Remediations already completed using 2.15.0 will be updated to 2.16.0 where applicable.  We will continue to monitor further developments and keep our knowledge base article aligned accordingly.

 

Update (15th December 2021 15:30 UTC)

The IFS Cloud Service Updates 21R1 SU9 and 21R2 SU2, originally scheduled for release on Thursday 16th December 2021, will be available on the LE Portal by Sunday 19th December 2021 for you to apply to your environments and which will include the remediation patch for CVE-2021-44228.  Changes for these updates are now complete and we are starting the test and deployment processes this evening.  We will continue to update the KBA to reflect the status as these processes complete.

 

Update (15th December 2021 13:05 UTC)

The Impact KBA has been updated to reflect the fact that ESM assystIPaaS mitigation has been applied in the Cloud and mitigation is available for on-premise customers.  Additionally, IFS Cloud customers in APAC now have mitigation applied and EMEA customers will be completed by midnight UTC today.

 

Update (14th December 2021 18:17 UTC)

The Impact KBA has been updated to confirm that Clevest is not impacted by the vulnerability

 

Update (14th December 2021 17:00hrs UTC)

IFS has made significant progress in understanding the impact of CVE-2021-44228, known colloquially as Log4j, upon our products and services.  It is important to note that only a limited number of IFS products are affected and IFS is currently preparing a service update for those affected products.  We have produced a knowledge based article available here which we will update regularly as our work continues.  Understanding, mitigating and remediating this vulnerability is our absolute priority. Thank you for your patience while we complete this process.

 

Update (14th December 2021 07:45hrs UTC)

The situation surrounding this vulnerability and specific versions of log4j that are affected continues to evolve across the software industry. The current state is that log4j version 2.15 and above is unaffected but prior versions are potentially vulnerable to this exploit.

Whilst investigations continue please avoid using vulnerable versions of log4j in any customization or integration projects that may result in your IFS installation being compromised.

 

Update (14th December 2021 07:00hrs UTC)

For IFS Maintenix customers wanting to understand the impact of CVE-2021-44228, please see the detailed impact assessments and mitigation actions available in the following articles: 

 

Update (13th December 2021 15:45hrs UTC)

The following IFS products are confirmed unaffected by CVE-2021-44228.

  • Astea Alliance
  • Astea FieldCentrix
  • CE
  • Customerville
  • FSM

IFS continues to analyse the impact of this vulnerability on our remaining products and services and will update this bulletin as confirmed information becomes available.

 

13th December 2021 - 11:00hrs UTC

There have been widespread media reports regarding the open source Apache Software Foundation log4j Java logging component which was discovered to have a critical vulnerability CVE-2021-44228. Since its discovery, IFS has been analysing its impact upon our products and services and can confirm that this component is used within a number of our solutions.

Owing to the complex nature of the vulnerability and specifically the various environmental conditions that need to exist to make it exploitable, our analysis is still ongoing to establish what form mitigation and remediation might take.

Over the coming days we will continue to provide regular updates and mitigation/remediation information, both with respect to customers of the IFS Cloud Service and remote. Communication related to this vulnerability will continue to be posted to this IFS Community thread until further notice.

 

 

PLEASE ‘SUBSCRIBE’ TO THIS KBA TO RECEIVE NOTIFICATIONS OF UPDATES 

Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?


Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?

Hi, 

Are you on IFS Cloud or On Premise? 


 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.


Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?

Hi, 

Are you on IFS Cloud or On Premise? 

We are On Premise


Update (13th December 2021 15:45hrs UTC)

ADDED UNAFFECTED PRODUCTS


Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?

Protecting the service access in the interim is a good thing, but we cannot validate the approach in detail at this time.


 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.

The list of unaffected products is being updated as we discover it, Touch Apps has not yet been excluded, we will keep updating as we know more.


Subscribing.

We are the middle of a migration for Apps 7.5 to Apps 10u11, so we are dually interested in what is affected and the mitigation necessary for both environments.


Subscribing.

We are the middle of a migration for Apps 7.5 to Apps 10u11, so we are dually interested in what is affected and the mitigation necessary for both environments.

 

+1 on this! Please deliver information for all IFS versions. We are currently migrating from IFS 8 to IFS CLOUD and need information for both versions.


UPDATED (14th December 2021 07:45hrs UTC)


This is most hot news. when do we expect any fix for this. urgent response is appreciated. 

 


This is most hot news. when do we expect any fix for this. urgent response is appreciated. 

 

As explained above, the situation surrounding this vulnerability and specific versions of log4j that are affected continues to evolve across the software industry.  It is a complex landscape with new information continually becoming available.  The current state is that log4j version 2.15 and above is unaffected but prior versions are potentially vulnerable to this exploit.  IFS will continue to use this bulletin to share information regarding affected and unaffected products as soon as either is confirmed and actionable.


is there any information on how IFS Cloud are protecting our cloud-hosted implementation while IFS assess the impact of the vulnerability?


 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.

I can imagine touch apps being the biggest worry here, do we know when this is being looked at? 


HI, 

 

How do we check the log4j version in the IFS? 

 

Thanks 


is there any information on how IFS Cloud are protecting our cloud-hosted implementation while IFS assess the impact of the vulnerability?

As explained above, the situation surrounding this vulnerability and specific versions of log4j that are affected continues to evolve across the software industry.  It is a complex landscape with new information continually becoming available.  The current state is that log4j version 2.15 and above is unaffected but prior versions are potentially vulnerable to this exploit.  IFS will continue to use this bulletin to share information regarding affected and unaffected products as soon as either is confirmed and actionable.


 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.

I can imagine touch apps being the biggest worry here, do we know when this is being looked at? 

As explained above, the situation surrounding this vulnerability and specific versions of log4j that are affected continues to evolve across the software industry.  It is a complex landscape with new information continually becoming available.  The current state is that log4j version 2.15 and above is unaffected but prior versions are potentially vulnerable to this exploit.  IFS will continue to use this bulletin to share information regarding affected and unaffected products as soon as either is confirmed and actionable.


Following the latest comment on  log4j version 2.15 being unaffected, can you advise how we can identify this if we are a IFS Cloud services customer. 

Jeremy


I got an update from our database providers. 

Oracle Database has been confirmed as an unaffected product. SQL Developer and SQL Modeller may be vulnerable but Oracle have confirmed the solution to be updating this to the latest version.

 

For anyone using above products. 


Update (14th December 2021 17:00hrs UTC)


Following the latest comment on  log4j version 2.15 being unaffected, can you advise how we can identify this if we are a IFS Cloud services customer. 

Jeremy

Please see the latest update which includes a link to a new KBA with further info


HI, 

 

How do we check the log4j version in the IFS? 

 

Thanks 

Please see the latest update which includes a link to a new KBA with further info


Update (14th December 202118:15 UTC)

The Impact KBA has been updated to confirm that Clevest is not impacted by the vulnerability


It took some time for me to figure - The Impact KBA can be accessed by clicking a link in one of the updates at the top of this bulletin - 

Thank you IFS for providing these timely updates. 


Received this from our on premise customer:

Please note this screenshot:

 

 

We are running additional tools to verify any vulnerability related but wanted to make you aware of the tool being used for IFS Developer Studio.