Log4J day-zero exploit CVE-2021-44228

SOLVE
PRDuque
Participant

Since Hubspot uses Log4J (https://product.hubspot.com/blog/bid/6011/log4j-dynamic-appender-configuration), does anyone knows what mitigation measures have been taken to deal with day-zero exploit CVE-2021-44228 ?

 

HubSpot uses Cloudflare (https://www.cloudflare.com/case-studies/hubspot/), and Cloudflare has already initiated mitigation measures (https://info.cloudflare.com/index.php/email/emailWebview?mkt_tok=NzEzLVhTQy05MTgAAAGBRbAScyE5IiQgYSp...).

 

But has HubSpot initiated some mitigation measures  by themselfs ?

1 Accepted solution

Accepted Solutions
jonathanhaber
Solution
HubSpot Product Team

We've published a landing page that will hopefully be helpful:

https://www.hubspot.com/log4j2

View solution in original post

4 Replies 4
dennisedson
Community Manager

@PRDuque 

HubSpot is aware of CVE-2021-44228 and we have performed a thorough check of our systems and have seen no indications of any impact from this vulnerability at this time. Out of an abundance of caution, our team is continuing to monitor this event. Customers don't need to take any action at this time.

Thanks,

Dennis




Check out our Community Developer Blog
where we feature our Community driven developer podcast and how to content
PRDuque
Participant
Have you updated all projects to log4j latest version, and deployed it to production?
jonathanhaber
Solution
HubSpot Product Team

We've published a landing page that will hopefully be helpful:

https://www.hubspot.com/log4j2

View solution in original post

DSidler
Participant

Thanks @jonathanhaber , this is very useful.

Not sure if already discussed, but it would be tremendously helpful if such information could be pushed out to us admins proactively. It took me some googling to even find this thread.