Log4j Vulnerability Announcement

December 13, 2021


Updated: December 15, 2021

On December 9, 2021, a vulnerability for Log4j was publicly released. Log4j is a commonly used logging library made by the Apache Software Foundation. This critical vulnerability impacts all versions of Log4j from 2.0 to 2.14.1. We highly recommend reviewing any usage of Log4j and applying mitigations in accordance with the Apache Log4j Security Vulnerability guidance. More information on this vulnerability, named Log4Shell and known as CVE-2021-44228, may be found on the Apache Log4j Security Vulnerability page.

Since we became aware of this vulnerability, we have been evaluating Park Place Technologies services and systems to determine if any are potentially vulnerable to this exploit.

  1. Our security operations team has updated all our signatures to ensure that we can detect attempts to exploit this vulnerability.
  2. We have created custom alerts and IOCs to detect any activity that may be associated with this exploit.
  3. We have reviewed and scanned all our systems and identified instances where we will need to update the library.
  4. We are working directly with our vendors to ensure they are providing timely updates.
  5. We have applied workarounds where necessary, until patches become available.

Impacted Services:

Entuity

The vulnerability exists in the log4j 2.x libraries that are present in the following versions of Entuity:

  • Version 19 (Patch Released)
  • Version 18 (Patch Released)
  • Version 17 (Patch Released)

We recommend that all customers upgrade to the latest patches as soon as they are available.

ParkView Overvågning af hardware

No impact on our customers, our internal systems have been updated. This includes ParkView-I, ParkView-E, REM, the ParkView Hardware Virtual Machine (VM), and the Patrol Agent.

ParkView opdagelse

No impact on our customers.

ParkView Netværksadministration

All customers have been automatically upgraded to the latest patch.

ParkView Serveradministration

No impact on our customers.

If you have any questions or concerns, please reach out to your Account Manager or our Support Center. We will continue to update this page with the latest status of all impacted services.

Many providers and vendors have been impacted by this vulnerability. Please review notifications and guidance from other providers and vendors as to how to apply workarounds and patches on other systems.

Other resources:

About the Author

John Parlee, Chief Information Security Officer