Skip to main content
ExLibris

Knowledge Assistant

BETA
 
Cross-Product

 

Ex Libris Knowledge Center
  1. Search site
    Go back to previous article
    1. Sign in
      • Sign in
      • Forgot password
  1. Home
  2. Cross-Product
  3. Security
  4. Statements
  5. Security Advisory– Log4Shell Security vulnerability (CVE-2021-44228) - December 12, 2021

Security Advisory– Log4Shell Security vulnerability (CVE-2021-44228) - December 12, 2021

  1. Last updated
  2. Save as PDF
  3. Share
    1. Share
    2. Tweet
    3. Share
  1. Overview
  2. References
  3. Effective Security Severity Level
  4. Affected Systems
  5. Tests and Certifications
  6. Actions Taken for Hosted Systems
  7. Required Actions for On-Premises and Local Systems

Overview

On December 10, 2021, A critical remote command execution (RCE) vulnerability (CVE-2021-44228) was disclosed in Apache Log4j versions 2.0 to 2.14.1, a logging tool widely used globally in many consumer and enterprise apps, cloud services, and websites. Exploiting this unauthenticated remote code execution vulnerability in Apache's Log4j Java-based logging tool, depending on how the system is configured, potentially allows an attacker to download and subsequently execute a malicious payload.

References

  • (CVE-2021-44228)

Effective Security Severity Level

Critical

Affected Systems

Ex Libris products are not affected by this vulnerability.

Tests and Certifications

Ex Libris products are being tested to confirm that they are not affected by this vulnerability.

Actions Taken for Hosted Systems

Ex Libris products are not affected by this vulnerability. As an added precaution, Ex Libris deployed additional protection in our cloud data centers to further protect our systems from this vulnerability.

Required Actions for On-Premises and Local Systems

Ex Libris products are not affected by this vulnerability.

For customers using Apache Log4j versions locally installed elsewhere in their environment, we recommend consulting their local security staff or in case of third party systems, follow the respective vendor's instructions.

 

Exploitation and Public Announcements

The Ex Libris Security Incident Response Team (SIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory in the context of Ex Libris products.

 

Record of Changes

Type of information Document Data

Document Title:

Security Advisory– Log4Shell Security vulnerability (CVE-2021-44228) - December 12, 2021

Document Owner:

Tomer Shemesh - Ex Libris Chief Information Security Officer (CISO)

Approved by:

Barak Rozenblat – VP Cloud Services

Issued:

December 12, 2021

Reviewed & Revised:

December 12, 2021

 

Revision Control

Version Number Nature of Change Date Approved

1.0

Initial version

December 12, 2021

Document Distribution and Review

The document owner will distribute this document to all approvers when it is first created and as changes or updates are made. This document will be reviewed and updated regularly or upon written request by an approver or stakeholder. Questions or feedback about this document can be directed to the owner or a listed approver.

View article in the Exlibris Knowledge Center
  1. Back to top
    • Security Update - Ex Libris Patron Directory Services (PDS) Security Vulnerability
    • Statement of Applicability
  • Was this article helpful?

Recommended articles

  1. Content Type
    Documentation
  2. Tags
    This page has no tags.
  1. © Copyright 2025 Ex Libris Knowledge Center
  2. Powered by CXone Expert ®
  • Term of Use
  • Privacy Policy
  • Contact Us
2025 Ex Libris. All rights reserved