None of Hatteland Technology products or 3rd party products delivered by Hatteland Technology is known to be affected by this vulnerability.
Please see table on bottom to see full overview and more information from our suppliers.We will advise our customers to get a full overview over assets in their networks who might be a target for this vulnerability, and patch as soon as possible.
Follow NSM’s recommendations, “Identify”, “Update”, “Take action” and “Monitor”.
If not already, turn on full logging on firewalls, network devices and servers. Make sure to actively review all logs.
Other sources for information regarding Log4j:
https://logging.apache.org/log4j/2.x/security.html
https://blog.talosintelligence.com/2021/12/apache-log4j-rce-vulnerability.html
https://blog.cloudflare.com/inside-the-log4j2-vulnerability-cve-2021-44228/
Axis |
https://www.axis.com/files/faq/Log4j2VulnerabilityStatementFinal.pdf |
Bosch |
https://www.boschsecurity.com/xc/en/support/product-security/security-advisories.html |
Hanwha |
Not affected |
HATTELAND® SeaHawk |
Not affected |
Milestone |
https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US |
Moxa |
|
Oring |
Not affected |
Pelco |
Not affected |
Robustel |
Not affected |
Sprinx |
Not affected |
If in need for further assistance beyond this, please contact our support: https://www.hattelandtechnology.com/support/contact