![]() ![]() 9, 2021, affecting a common software package (Apache log4j). Because log4j is widely used across web applications and cloud service providers, the full scope of this vulnerability is complex, and its impact is still being determined. Waters product and engineering teams continue to investigate this matter. Waters will provide updates for its customers about the log4j vulnerability as needed and will notify customers when the assessment is complete.Īs part of our initial investigation, it has been determined that the Waters MassLynx software, listed below, and its associated components are not impacted by the Apache log4j vulnerability. Waters is aware of the "zero day" vulnerability (CVE-2021-44228), announced by security researchers on Dec. Apache Log4j Vulnerability Update Feb 03,2022
0 Comments
Leave a Reply. |