URGENT BULLETIN

URGENT BULLETIN - IFS Advisory:  IFS Products, Services and Log4j - ​CVE-2021-44228

  • 13 December 2021
  • 74 replies
  • 19512 views


Show first post
This topic has been closed for comments

74 replies

Userlevel 6
Badge +18

It took some time for me to figure - The Impact KBA can be accessed by clicking a link in one of the updates at the top of this bulletin - 

Thank you IFS for providing these timely updates. 

Userlevel 7
Badge +17

Update (14th December 202118:15 UTC)

The Impact KBA has been updated to confirm that Clevest is not impacted by the vulnerability

Userlevel 7
Badge +17

HI, 

 

How do we check the log4j version in the IFS? 

 

Thanks 

Please see the latest update which includes a link to a new KBA with further info

Userlevel 7
Badge +17

Following the latest comment on  log4j version 2.15 being unaffected, can you advise how we can identify this if we are a IFS Cloud services customer. 

Jeremy

Please see the latest update which includes a link to a new KBA with further info

Userlevel 7
Badge +17

Update (14th December 2021 17:00hrs UTC)

Userlevel 4
Badge +8

I got an update from our database providers. 

Oracle Database has been confirmed as an unaffected product. SQL Developer and SQL Modeller may be vulnerable but Oracle have confirmed the solution to be updating this to the latest version.

 

For anyone using above products. 

Userlevel 2
Badge +2

Following the latest comment on  log4j version 2.15 being unaffected, can you advise how we can identify this if we are a IFS Cloud services customer. 

Jeremy

Userlevel 7
Badge +17

 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.

I can imagine touch apps being the biggest worry here, do we know when this is being looked at? 

As explained above, the situation surrounding this vulnerability and specific versions of log4j that are affected continues to evolve across the software industry.  It is a complex landscape with new information continually becoming available.  The current state is that log4j version 2.15 and above is unaffected but prior versions are potentially vulnerable to this exploit.  IFS will continue to use this bulletin to share information regarding affected and unaffected products as soon as either is confirmed and actionable.

Userlevel 7
Badge +17

is there any information on how IFS Cloud are protecting our cloud-hosted implementation while IFS assess the impact of the vulnerability?

As explained above, the situation surrounding this vulnerability and specific versions of log4j that are affected continues to evolve across the software industry.  It is a complex landscape with new information continually becoming available.  The current state is that log4j version 2.15 and above is unaffected but prior versions are potentially vulnerable to this exploit.  IFS will continue to use this bulletin to share information regarding affected and unaffected products as soon as either is confirmed and actionable.

Userlevel 3
Badge +6

HI, 

 

How do we check the log4j version in the IFS? 

 

Thanks 

Userlevel 4
Badge +8

 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.

I can imagine touch apps being the biggest worry here, do we know when this is being looked at? 

Userlevel 1
Badge +3

is there any information on how IFS Cloud are protecting our cloud-hosted implementation while IFS assess the impact of the vulnerability?

Userlevel 7
Badge +17

This is most hot news. when do we expect any fix for this. urgent response is appreciated. 

 

As explained above, the situation surrounding this vulnerability and specific versions of log4j that are affected continues to evolve across the software industry.  It is a complex landscape with new information continually becoming available.  The current state is that log4j version 2.15 and above is unaffected but prior versions are potentially vulnerable to this exploit.  IFS will continue to use this bulletin to share information regarding affected and unaffected products as soon as either is confirmed and actionable.

Userlevel 5
Badge +11

This is most hot news. when do we expect any fix for this. urgent response is appreciated. 

 

Userlevel 7
Badge +17

UPDATED (14th December 2021 07:45hrs UTC)

Userlevel 2
Badge +2

Subscribing.

We are the middle of a migration for Apps 7.5 to Apps 10u11, so we are dually interested in what is affected and the mitigation necessary for both environments.

 

+1 on this! Please deliver information for all IFS versions. We are currently migrating from IFS 8 to IFS CLOUD and need information for both versions.

Userlevel 1
Badge +3

Subscribing.

We are the middle of a migration for Apps 7.5 to Apps 10u11, so we are dually interested in what is affected and the mitigation necessary for both environments.

Userlevel 7
Badge +17

 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.

The list of unaffected products is being updated as we discover it, Touch Apps has not yet been excluded, we will keep updating as we know more.

Userlevel 7
Badge +17

Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?

Protecting the service access in the interim is a good thing, but we cannot validate the approach in detail at this time.

Userlevel 7
Badge +17

Update (13th December 2021 15:45hrs UTC)

ADDED UNAFFECTED PRODUCTS

Userlevel 4
Badge +9

Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?

Hi, 

Are you on IFS Cloud or On Premise? 

We are On Premise

Userlevel 1
Badge +2

 

Hi,

Is the touch-app-server affected? If exposed, this might be the most vulnerable point.

Userlevel 7
Badge +17

Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?

Hi, 

Are you on IFS Cloud or On Premise? 

Userlevel 4
Badge +9

Do you have any recommendation while waiting for the updates? We have exposed IFS Aurena externally outside our domain with Netscaler and reverse proxy. Do you recommend that we close this while waiting?