{"id":7934307,"date":"2021-12-16T19:56:46","date_gmt":"2021-12-16T18:56:46","guid":{"rendered":"https:\/\/www.wildix.com\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/"},"modified":"2022-11-28T11:59:24","modified_gmt":"2022-11-28T10:59:24","slug":"dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability","status":"publish","type":"email-news","link":"https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/","title":{"rendered":"[US] Dec 16, 2021 &#8211; Wildix&#8217;s response to the reported Log4j vulnerability"},"content":{"rendered":"<div dir=\"ltr\">\n<p style=\"margin:10px 0px 0px;padding:0px;font-family:-apple-system,\"system-ui\",\"Segoe UI\",Roboto,Oxygen,Ubuntu,\"Fira Sans\",\"Droid Sans\",\"Helvetica Neue\",sans-serif;font-size:14px;line-height:1.42857;letter-spacing:-0.07px;color:rgb(23,43,77)\">Based on recent public disclosure, our security team has researched reported vulnerabilities (CVE-2021-44228, CVE-2021-44228) within an open-source Java Library called\u00a0<strong>Log4j<\/strong>.\u00a0<\/p>\n<p style=\"margin:10px 0px 0px;padding:0px;font-family:-apple-system,\"system-ui\",\"Segoe UI\",Roboto,Oxygen,Ubuntu,\"Fira Sans\",\"Droid Sans\",\"Helvetica Neue\",sans-serif;font-size:14px;line-height:1.42857;letter-spacing:-0.07px;color:rgb(23,43,77)\">After performing analysis and testing, we can confirm that\u00a0<strong>the Wildix PBX and related services are not subject to such attacks<\/strong>.\u00a0<\/p>\n<p style=\"margin:10px 0px 0px;padding:0px;font-family:-apple-system,\"system-ui\",\"Segoe UI\",Roboto,Oxygen,Ubuntu,\"Fira Sans\",\"Droid Sans\",\"Helvetica Neue\",sans-serif;font-size:14px;line-height:1.42857;letter-spacing:-0.07px;color:rgb(23,43,77)\">However, as a precaution and as part of our dedication to maintaining a fully secure-by-design architecture,\u00a0<strong>we have deployed an additional update to patch this potential vulnerability.\u00a0<\/strong>The update is related to the server-side only, no manual actions from you are required.<\/p>\n<p style=\"margin:10px 0px 0px;padding:0px;font-family:-apple-system,\"system-ui\",\"Segoe UI\",Roboto,Oxygen,Ubuntu,\"Fira Sans\",\"Droid Sans\",\"Helvetica Neue\",sans-serif;font-size:14px;line-height:1.42857;letter-spacing:-0.07px;color:rgb(23,43,77)\">Security is a top priority at Wildix. We make sure that every product and every version that we release, corresponds to the latest security standards.\u00a0<\/p>\n<div dir=\"ltr\" class=\"gmail_signature\" data-smartmail=\"gmail_signature\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Based on recent public disclosure, our security team has researched reported vulnerabilities (CVE-2021-44228, CVE-2021-44228) within an open-source Java Library called\u00a0Log4j.\u00a0 After performing analysis and testing, we can confirm that\u00a0the Wildix PBX and related services are not subject to such attacks.\u00a0 However, as a precaution and as part of our dedication to maintaining a fully secure-by-design [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"template":"","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jet_sm_ready_style":"","_jet_sm_style":"","_jet_sm_controls_values":"","_jet_sm_fonts_collection":"","_jet_sm_fonts_links":""},"class_list":["post-7934307","email-news","type-email-news","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>[US] Dec 16, 2021 - Wildix&#039;s response to the reported Log4j vulnerability | Wildix<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[US] Dec 16, 2021 - Wildix&#039;s response to the reported Log4j vulnerability | Wildix\" \/>\n<meta property=\"og:description\" content=\"Based on recent public disclosure, our security team has researched reported vulnerabilities (CVE-2021-44228, CVE-2021-44228) within an open-source Java Library called\u00a0Log4j.\u00a0 After performing analysis and testing, we can confirm that\u00a0the Wildix PBX and related services are not subject to such attacks.\u00a0 However, as a precaution and as part of our dedication to maintaining a fully secure-by-design [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Wildix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/wildixtechwizards\/?mibextid=6NoCDW\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-28T10:59:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@wildix_\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[US] Dec 16, 2021 - Wildix's response to the reported Log4j vulnerability | Wildix","robots":{"index":"noindex","follow":"follow"},"og_locale":"de_DE","og_type":"article","og_title":"[US] Dec 16, 2021 - Wildix's response to the reported Log4j vulnerability | Wildix","og_description":"Based on recent public disclosure, our security team has researched reported vulnerabilities (CVE-2021-44228, CVE-2021-44228) within an open-source Java Library called\u00a0Log4j.\u00a0 After performing analysis and testing, we can confirm that\u00a0the Wildix PBX and related services are not subject to such attacks.\u00a0 However, as a precaution and as part of our dedication to maintaining a fully secure-by-design [&hellip;]","og_url":"https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/","og_site_name":"Wildix","article_publisher":"https:\/\/www.facebook.com\/groups\/wildixtechwizards\/?mibextid=6NoCDW","article_modified_time":"2022-11-28T10:59:24+00:00","twitter_card":"summary_large_image","twitter_site":"@wildix_","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/","url":"https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/","name":"[US] Dec 16, 2021 - Wildix's response to the reported Log4j vulnerability | Wildix","isPartOf":{"@id":"https:\/\/www.wildix.com\/de\/#website"},"datePublished":"2021-12-16T18:56:46+00:00","dateModified":"2022-11-28T10:59:24+00:00","breadcrumb":{"@id":"https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.wildix.com\/de\/email-news\/dec-16-2021-wildixs-response-to-the-reported-log4j-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.wildix.com\/de\/"},{"@type":"ListItem","position":2,"name":"News on WMP","item":"https:\/\/www.wildix.com\/de\/email-news\/"},{"@type":"ListItem","position":3,"name":"[US] Dec 16, 2021 &#8211; Wildix&#8217;s response to the reported Log4j vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.wildix.com\/de\/#website","url":"https:\/\/www.wildix.com\/de\/","name":"Wildix","description":"","publisher":{"@id":"https:\/\/www.wildix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wildix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wildix.com\/de\/#organization","name":"Wildix","url":"https:\/\/www.wildix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wildix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wildix.com\/wp-content\/uploads\/2021\/09\/logo-1.svg","contentUrl":"https:\/\/www.wildix.com\/wp-content\/uploads\/2021\/09\/logo-1.svg","caption":"Wildix"},"image":{"@id":"https:\/\/www.wildix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/groups\/wildixtechwizards\/?mibextid=6NoCDW","https:\/\/x.com\/wildix_"]}]}},"clean_content":"Based on recent public disclosure, our security team has researched reported vulnerabilities (CVE-2021-44228, CVE-2021-44228) within an open-source Java Library called\u00a0Log4j.\u00a0 After performing analysis and testing, we can confirm that\u00a0the Wildix PBX and related services are not subject to such attacks.\u00a0 However, as a precaution and as part of our dedication to maintaining a fully secure-by-design architecture,\u00a0we have deployed an additional update to patch this potential vulnerability.\u00a0The update is related to the server-side only, no manual actions from you are required. Security is a top priority at Wildix. We make sure that every product and every version that we release, corresponds to the latest security standards.\u00a0","clean_excerpt":"Based on recent public disclosure, our security team has researched reported vulnerabilities (CVE-2021-44228, CVE-2021-44228) within an open-source Java Library called\u00a0Log4j.\u00a0After performing analysis and testing, we can confirm that\u00a0the Wildix PBX and related services are not subject to such attacks.\u00a0However, as a precaution and as part of our dedication to maintaining a fully secure-by-design architecture,\u00a0we have...","_links":{"self":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/email-news\/7934307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/email-news"}],"about":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/types\/email-news"}],"author":[{"embeddable":true,"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/users\/4"}],"wp:attachment":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/media?parent=7934307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}