<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
90-Day CloudHSM Free Trial – Experience Securosys CloudHSM without commitment.
Start your Free Trial
Products & Solutions
Products & Solutions
Explore our portfolio of cutting-edge cybersecurity solutions, centered around our flagship Hardware Security Modules (HSMs). From encryption and key management to secure access and authentication, our products ensure robust protection for your most critical data and systems.
About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.
Home Blog Security advisory Log4J – Securosys products and services not affected

A critical vulnerability (CVE-2021-44228) has recently been discovered in a widely used software framework Apache Log4j. Securosys products and services are free of the framework by Apache Log4j and, therefore, not affected by this vulnerability.  

This security alert addresses CVE-2021-44228, a vulnerability in Apache Log4j that allows remote code execution. The vulnerability allows unauthenticated, remote code execution and is triggered when a specially crafted string provided by the attacker via various input vectors is parsed and processed by the vulnerable Log4j component. 

The vulnerability has been rated highly critical (warning level red) by BSI: https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-549032-10F2.pdf

The Apache Log4j framework is not used in any Securosys products and services. Primus HSM, Securosys CloudsHSM, Securosys 365, Imunes TEE, and Centurion encryptors are thus not affected. Local software components such as PKCS#11, MS CNG, and JCE APIs, as well as the Transaction Security Broker (TSB) and REST API are also not affected.