FYSA
Ivanti has updated its Log4j
Advisory<https://urldefense.us/v3/__https:/forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US__;!!BClRuOV5cvtbuNI!VF2cGKx3WUhXe6DKGv3cOViaZcasQOqfrRToj4dKZSq7bPNhLznPL1hIGCx1uRTEdtfAMfM$>
with security updates for multiple products to address CVE-2021-44228. An
unauthenticated attacker could exploit this vulnerability to take control of an
affected system.
CISA Recommendations:
* CISA encourages users and administrators to review the Ivanti security
advisories pages for
Avalanche<https://urldefense.us/v3/__https:/forums.ivanti.com/s/article/CVE-2021-44228-Avalanche-Remote-code-injection-Log4j?language=en_US__;!!BClRuOV5cvtbuNI!VF2cGKx3WUhXe6DKGv3cOViaZcasQOqfrRToj4dKZSq7bPNhLznPL1hIGCx1uRTESXaAyhU$>;
File
Director<https://urldefense.us/v3/__https:/forums.ivanti.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-and-Ivanti-File-Director-CVE-2021-44228?language=en_US__;!!BClRuOV5cvtbuNI!VF2cGKx3WUhXe6DKGv3cOViaZcasQOqfrRToj4dKZSq7bPNhLznPL1hIGCx1uRTETDgKEs4$>;
and MobileIron Core, MobileIron Sentry (Core/Cloud), and MobileIron Core
Connector<https://urldefense.us/v3/__https:/forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j__;!!BClRuOV5cvtbuNI!VF2cGKx3WUhXe6DKGv3cOViaZcasQOqfrRToj4dKZSq7bPNhLznPL1hIGCx1uRTEPBzhZWQ$>
and apply the necessary updates and workarounds.
We kindly request any incidents related to this product be reported to CISA at
https://us-cert.cisa.gov/report, ;
Central@xxxxxxxxxxxx<mailto:Central@xxxxxxxxxxxx>, or 888-282-0870.
Theresa A. Masse
Cyber Security Advisor, Region 10 (Oregon)
Cybersecurity and Infrastructure Security Agency
Department of Homeland Security
Phone: (503) 930-5671
Email: theresa.masse@xxxxxxxxxxxx<mailto:theresa.masse@xxxxxxxxxxxx>
[cid:image001.png@01D8093C.2C29E320]