author_avatar_image
by Hatteland Technology
20 Dec 2021

Hatteland Technology statement

None of Hatteland Technology products or 3rd party products delivered by Hatteland Technology is known to be affected by this vulnerability.

Please see table on bottom to see full overview and more information from our suppliers.

We will advise our customers to get a full overview over assets in their networks who might be a target for this vulnerability, and patch as soon as possible.

Follow NSM’s recommendations, “Identify”, “Update”, “Take action” and “Monitor”.

If not already, turn on full logging on firewalls, network devices and servers. Make sure to actively review all logs.

Other sources for information regarding Log4j:
https://logging.apache.org/log4j/2.x/security.html

https://blog.talosintelligence.com/2021/12/apache-log4j-rce-vulnerability.html

https://blog.cloudflare.com/inside-the-log4j2-vulnerability-cve-2021-44228/

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/nyheter-fra-ncsc/samleside-for-log4j/one-linere-og-script

 

Apache-Log4j-Logo-810x298_c

 

Our partners status and infopages:

Axis

https://www.axis.com/files/faq/Log4j2VulnerabilityStatementFinal.pdf

Bosch

https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html

Hanwha

Not affected

HATTELAND® SeaHawk

Not affected

Milestone

https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US

Moxa

https://www.moxa.com/en/support/product-support/security-advisory/moxa-s-response-regarding-the-apache-log4j-vulnerability

Oring

Not affected

Pelco

Not affected

Robustel

Not affected

Sprinx

Not affected

 

If in need for further assistance beyond this, please contact our support: https://www.hattelandtechnology.com/support/contact

 

You May Also Like