Jump to content
C4 Forums | Control4

Log4j vulnerable?


Dueport

Recommended Posts


For my personal use and scanning my home network, I use OpenVAS community edition. It's free, but the VM needs cycled every once in a while since the OS does not update with the free version.

For work, we use Acunetix and Nessus, both have the ability to scan for the vulnerability just like OpenVAS. The only places we identified the vulnerability were in Composer and some back-end servers not exposed to the public. All of that is currently being worked on or has been fixed.

Link to comment
Share on other sites

58 minutes ago, Dunamivora said:

For my personal use and scanning my home network, I use OpenVAS community edition. It's free, but the VM needs cycled every once in a while since the OS does not update with the free version.

For work, we use Acunetix and Nessus, both have the ability to scan for the vulnerability just like OpenVAS. The only places we identified the vulnerability were in Composer and some back-end servers not exposed to the public. All of that is currently being worked on or has been fixed.

Thank you @Dunamivora - this looks like a good project to explore. Really appreciate the recommendations. 

Link to comment
Share on other sites

FYI - I found this statement on the Control4 web site.

LOG4J VULNERABILITY RESPONSE
Dear Partner,
On Friday, Dec 10, a vulnerability in the “Log4j” Java library was announced (CVE-2021-44228).
An initial audit of our systems and applications indicates that the vulnerability is not present in
any Snap One mobile application or product.

Snap One’s usage of the affected “Log4j” library is limited to internal, backend services. Based
on available information, we have no indication that the vulnerability has been exploited within
our organization and are confident that there is no impact to customer data.

The security of our products is a top priority and critical to our ongoing commitment to foster
trust and transparency for our customers.

Snap One continues to monitor our systems and applications, as well as information provided
by CISA (Cybersecurity and Infrastructure Security Agency), threat intelligence and other
vendors for new information, and we will continue to take prompt action as necessary.

Snap One Cybersecurity Team

Link to comment
Share on other sites

5 hours ago, Riverguy said:

FYI - I found this statement on the Control4 web site.

LOG4J VULNERABILITY RESPONSE
 vulnerability is not present in any Snap One mobile application or product.
Snap One’s usage of the affected “Log4j” library is limited to internal, backend services. 

 

so not in the application, but is in the backend services?

I understand what you're trying to say, but might need a bit of a tweak.

 

 

 

Link to comment
Share on other sites

3 minutes ago, ekohn00 said:

so not in the application, but is in the backend services?

I understand what you're trying to say, but might need a bit of a tweak.

 

 

 

Internal, backend services would be employee tools, nothing that concerns customers and customer services.

Link to comment
Share on other sites

Just now, ekohn00 said:

and customer tools never get compromised in order to gain control of a network.......  (sarcasm in case you can't tell)

 

???

I would understand the sarcasm if it made sense.

 

No customer tools, software, or services were impacted.

 

The only issues were internal tools unrelated to anything to do with customers.

Link to comment
Share on other sites

15 minutes ago, zaphod said:

But for those of us on Unifi there is a vulnerability in the Unifi Controller software.  You need to upgrade to the latest release or manually upgrade the log4j jar files.

I didn't see anything for the controller, but the network app.... simple upgrade....

https://community.ui.com/releases/Security-Advisory-Bulletin-023-023/808a1db0-5f8e-4b91-9097-9822f3f90207

Link to comment
Share on other sites

5 minutes ago, Dunamivora said:

???

I would understand the sarcasm if it made sense.

 

No customer tools, software, or services were impacted.

 

The only issues were internal tools unrelated to anything to do with customers.

A vulnerability need not have to be directly related to "a customer".

Link to comment
Share on other sites

15 minutes ago, ekohn00 said:

A vulnerability need not have to be directly related to "a customer".

Sure, we looked at situations that would indirectly impact customers as well and none existed. We don't use log4j.

Are you indicating you feel vulnerable regardless of the reassurance?

 

Link to comment
Share on other sites

4 hours ago, ekohn00 said:

I didn't see anything for the controller, but the network app.... simple upgrade....

https://community.ui.com/releases/Security-Advisory-Bulletin-023-023/808a1db0-5f8e-4b91-9097-9822f3f90207

Isn't the Unifi Network the same as the Controller?  When they are saying "A vulnerable third-party library used in UniFi Network Version 6.5.53 and earlier (Log4J CVE-2021-44228) allows a malicious actor to control the application. " Isn't that the Unifi controller?  I run the Unifi Controller in a Docker on my unRAID server and there has been discussion on how to fix this vulnerability on the unRAID Docker forums.

Link to comment
Share on other sites

2 hours ago, zaphod said:

Isn't the Unifi Network the same as the Controller?  When they are saying "A vulnerable third-party library used in UniFi Network Version 6.5.53 and earlier (Log4J CVE-2021-44228) allows a malicious actor to control the application. " Isn't that the Unifi controller?  I run the Unifi Controller in a Docker on my unRAID server and there has been discussion on how to fix this vulnerability on the unRAID Docker forums.

I run a UDM-PRO. On the UDM-pro, it's broken down to "apps". I didn't see anything on the base controller, which is firmware on the UDM-PRO, but only the network module.

The docker/"SW" implementations may be different...I can't remember if my cloud key has independent apps, or everything was updated at once.

 

Link to comment
Share on other sites

This thread is quite old. Please consider starting a new thread rather than reviving this one.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.