サポート
お知らせ
サポート情報検索
FAQ・マニュアル・ファームウェア/ドライバー
検索
製品カテゴリー一覧
スイッチ
ルーター
メディアコンバーター
VDSL / HomePNA
無線LAN
Voice/Video
HUB
ネットワークマネージメント・ソフトウェア
LANアダプター
トランシーバー
ソフトウェア
アクセサリー
TELESYN Series

Extreme Networks
Juniper Networks
アイコム
Sitara Networks
LANアダプター・ドライバーダウンロード
サービス提供のご案内
販売終了製品一覧
サポートセンター受付窓口
セキュリティ・脆弱性について

Vulnerability of handshake traffic on Wi-Fi Protected Access II (WPA2)

Allied Telesis K.K.
Release 2021.12.16
Updated 2022.06.15

Japanese Page (日本語ページ) >
Apache Log4j vulnerability

Allied Telesis products do not have the below vulnerability.

1) Summary

  A high severity vulnerability, CVE-2021-44228, has been reported in Apache Log4j, a popular Java logging package. 
   Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack.

2) Affected Products

   None.

3) Detail

   Allied Telesis products do not implement Apache Log4j or implement Apache Log4j,
   but they are not affected by this vulnerability.
   Therefore all our products are safe from this vulnerability.

   ■ Not implement Apache Log4j

    - All AlliedWarePlus products
    - Non AlliedWarePlus switches
    - Non AlliedWarePlus routers
    - AT-VST-APL, AT-VST-VRT
    - AlliedView NMS Standard Edition
    - All wireless products
    - AT-SESC, AMF Security
    - All media converter products

   ■ Apache Log4j library is installed, but it is the fixed version

    - AT-Vista Manager EX Ver.3.9.0 and newer

   ■ The affected version of the Apache Log4j library is installed, but not used

    - AT-Vista Manager EX Ver.3.0.3 - Ver.3.8.0

   ■ The affected version of the Apache Log4j library is installed and used limitedly,
      but implemented so as not to be affected by this vulnerability

    - AT-Vista Manager EX Ver.3.0.2 and older
      Note: The Ver.3.0.2 and older version are no longer supported.





PAGE TOP