<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: About Apache Log4j vulnerability in Installation &amp; update</title>
    <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325276#M31653</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for the question!&lt;/P&gt;
&lt;P&gt;As I mentioned previously, there's no need to modify anything on older Archicad versions. This specific vulnerability affects&amp;nbsp;&lt;SPAN&gt;Log4j&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;2.x and 2.15.0-rc1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;U&gt; only&lt;/U&gt;,&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;thus, no further action from the users is needed. Older Log4j versions are not affected by this vulnerability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for your understanding! Feel free to ask if you have any questions!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Minh&lt;/P&gt;</description>
    <pubDate>Mon, 20 Dec 2021 11:04:43 GMT</pubDate>
    <dc:creator>Minh Nguyen</dc:creator>
    <dc:date>2021-12-20T11:04:43Z</dc:date>
    <item>
      <title>About Apache Log4j vulnerability</title>
      <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/324908#M31605</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Last week, a critical security vulnerability&amp;nbsp;in Java logging library&amp;nbsp;&lt;EM&gt;Log4j&lt;/EM&gt;&amp;nbsp;has been found. The&amp;nbsp;vulnerability allows&amp;nbsp;attackers to perform remote code execution, which means they can run any code and access all data on the affected machine. It is registered in the CVE database as&amp;nbsp;&lt;A title="Original URL: https://gspartner.graphisoft.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. Click or tap if you trust this link." href="https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgspartner.graphisoft.com%2Fnewsletter%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%3D%3D&amp;amp;data=04%7C01%7Cmnguyen%40graphisoft.com%7Cfa403d4e6a6c4be0c43608d9bef4bdb2%7C917332b65fee4b929d05812c7f08b9b9%7C0%7C0%7C637750780623471876%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;amp;sdata=n2ZqBeJr0C26IN4V0RaWePgjS8SvKaf2vjROCEN1AGs%3D&amp;amp;reserved=0" target="_blank" rel="noopener noreferrer" data-auth="Verified" data-linkindex="1" data-ogsc=""&gt;CVE-2021-44228&lt;/A&gt;. This vulnerability affected&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Apache Log4j between 2.x and 2.15.0-rc1&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Log4j&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;library was used in the following Archicad versions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;Log4j 1.2.7&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;was used by Energy Evaluation Add-On up to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Archicad 20&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;EM&gt;Log4j 1.2.8&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;was used by Usagelog and Bug Report submitter up to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Archicad 19&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;BIMcloud and CodeMeter components did not use the Log4j library. Therefore, no further action is required from the users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even though our products are not affected by the vulnerability, this may not apply to other third-parties addons. Please contact the addons’ developers for further information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any questions or comments, please let us know. Thank you very much!&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR aria-hidden="true" /&gt;Minh&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 11:35:29 GMT</pubDate>
      <guid>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/324908#M31605</guid>
      <dc:creator>Minh Nguyen</dc:creator>
      <dc:date>2021-12-14T11:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: About Apache Log4j vulnerability</title>
      <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325053#M31613</link>
      <description>&lt;P&gt;Hi Minh, thanks for that advice! We are still on AC18, and this news just makes our long intended upgrade all the more urgent! In the meantime, do you have any advice as to how we should protect ourselves against this?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 06:09:08 GMT</pubDate>
      <guid>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325053#M31613</guid>
      <dc:creator>tjmillar</dc:creator>
      <dc:date>2021-12-16T06:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: About Apache Log4j vulnerability</title>
      <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325056#M31614</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for the question!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There's no need to worry about this vulnerability. The older Archicad versions used an old Log4j library, whereas the exploit can only work between Log4j version&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;2.x and 2.15.0-rc1&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;only. In the scope of this vulnerability, we won't have to take any action on older products.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope it answers your question. Please let us know if you still have any concerns about this!&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Minh&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 06:31:22 GMT</pubDate>
      <guid>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325056#M31614</guid>
      <dc:creator>Minh Nguyen</dc:creator>
      <dc:date>2021-12-16T06:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: About Apache Log4j vulnerability</title>
      <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325267#M31651</link>
      <description>&lt;P&gt;Hi Minh, thanks for your information!&lt;/P&gt;&lt;P&gt;Please tell me/us, is it possible to replace the Log4j 1.2.7 with a newer not vulnerability one (if yes please provide the correct one) and if not, how is the correct procedure to uninstall the Energy Evaluation Add-On without uninstalling the AC20. Thanks. Greetings!&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 09:16:38 GMT</pubDate>
      <guid>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325267#M31651</guid>
      <dc:creator>KOA</dc:creator>
      <dc:date>2021-12-20T09:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: About Apache Log4j vulnerability</title>
      <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325276#M31653</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for the question!&lt;/P&gt;
&lt;P&gt;As I mentioned previously, there's no need to modify anything on older Archicad versions. This specific vulnerability affects&amp;nbsp;&lt;SPAN&gt;Log4j&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;2.x and 2.15.0-rc1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;U&gt; only&lt;/U&gt;,&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;thus, no further action from the users is needed. Older Log4j versions are not affected by this vulnerability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for your understanding! Feel free to ask if you have any questions!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Minh&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 11:04:43 GMT</pubDate>
      <guid>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325276#M31653</guid>
      <dc:creator>Minh Nguyen</dc:creator>
      <dc:date>2021-12-20T11:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: About Apache Log4j vulnerability</title>
      <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325514#M31687</link>
      <description>&lt;P&gt;Hi Minh,&lt;BR /&gt;Our IT found some issue regarding AC20 and older since the last update about log4j.jar. Can you confirm that these older versions are still save to use?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&amp;nbsp;&lt;BR /&gt;Anne&lt;/P&gt;</description>
      <pubDate>Fri, 24 Dec 2021 10:24:13 GMT</pubDate>
      <guid>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325514#M31687</guid>
      <dc:creator>KUBUS</dc:creator>
      <dc:date>2021-12-24T10:24:13Z</dc:date>
    </item>
    <item>
      <title>Re: About Apache Log4j vulnerability</title>
      <link>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325886#M31726</link>
      <description>&lt;P&gt;Hi Anne,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the question!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no action needed from the client-side. The vulnerability affects&amp;nbsp;&lt;SPAN&gt;Log4j&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;2.x and 2.15.0-rc1&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;U&gt;only&lt;/U&gt;&lt;/STRONG&gt;&lt;/EM&gt;, meanwhile older Archicad versions might contain Log4j before 2.x, thus they are not affected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Minh&lt;/P&gt;</description>
      <pubDate>Fri, 31 Dec 2021 15:28:43 GMT</pubDate>
      <guid>https://community.graphisoft.com/t5/Installation-update/About-Apache-Log4j-vulnerability/m-p/325886#M31726</guid>
      <dc:creator>Minh Nguyen</dc:creator>
      <dc:date>2021-12-31T15:28:43Z</dc:date>
    </item>
  </channel>
</rss>

