News

Client - Log4J Statement

Dec 20, 2021

Ipsotek is aware of the Log4J (unauthenticated remote command execution) zero-day exploit, as publicly disclosed by security researcher @P0rZ9 on Twitter, Thursday 9th December 2021. We are taking immediate appropriate preventive actions and are prioritizing the support and implementation of mitigating actions for any of our customers who may be vulnerable.

Ipsotek as already conducted several assessments, including updating our infrastructure as part of our own Cyber Security defence’s. We continue to assess all vulnerable customers supported by Ipsotek and are implementing remediation actions if required. Meanwhile, we continue to ensure business continuity for our clients.

For further information please contact support@ipsotek.com and your regional team will reply to your request.

Reference:

CVE-2021-44228 - https://nvd.nist.gov/vuln/detail/CVE-2021-44228

CVE-2021-45046 - https://nvd.nist.gov/vuln/detail/CVE-2021-45046

CVE-2021-45105 - https://nvd.nist.gov/vuln/detail/CVE-2021-45105

Related News

Ipsotek's Natural Language Detection (NLD) Finalist for Outstanding Commercial Security Solutions at Intersec 2025 Awards!

Ipsotek is pleased to announce that its Natural Language Detection (NLD) technology has…

Ipsotek selected as finalist for US OSPAs award with its new NLS feature

Ipsotek is delighted to announce that it has been selected as a finalist…

Copyright © 2024 Ipsotek Ltd. All rights reserved.