<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228</link><pubDate>Thu, 14 Apr 2022 18:50:31 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Zach Puderbach</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Current Revision posted to Appian Knowledge Base by Zach Puderbach on 4/14/2022 6:50:31 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j 2.x instances to version 2.15 in accordance with NIST&amp;rsquo;s recommendation. Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability. This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp;The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical). Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgraded all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;li&gt;On March 11, 2022, Appian released an additional hotfix that replaces the use of log4j 1.2.17 versions across all components except for Service Manager. There is no patch available for these components at this time, but Appian expects to update these components by early Q2. In the meantime, Appian has confirmed that our usage of Log4j 1.2.17 is not vulnerable to CVE-2022-23302, CVE-2022-23305, and CVE-2022-23307.&lt;/li&gt;
&lt;li&gt;On March 25, 2022, Appian released an additional hotfix on all supported versions except for 22.1 that replaces the use of log4j 1.2.17 versions within Kafka and Zookeeper.&lt;/li&gt;
&lt;li&gt;On April 8, 2022, Appian released an additional hotfix for 22.1 that replaces the use of log4j 1.2.17 versions within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of these hotfixes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related vulnerability against Log4j2, announced December 14, 2021. Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10) released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch through our normal hotfix cycle&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;3/11/2022 -&amp;nbsp;Hotfix from Appian released, updating log4j 1.2.17 across all components except Kafka and Zookeeper (refer to #7 above for additional details)&lt;/li&gt;
&lt;li&gt;3/25/2022 - Hotfix from Appian released for all supported versions except for 22.1, updating log4j 1.2.17 within Kafka and Zookeeper.&lt;/li&gt;
&lt;li&gt;4/8/2022 - Hotfix from Appian for 22.1 is released, updating log4j 1.2.17 within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;April 14, 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/32</link><pubDate>Mon, 28 Mar 2022 18:32:24 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 32 posted to Appian Knowledge Base by Elly Meng on 3/28/2022 6:32:24 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j 2.x instances to version 2.15 in accordance with NIST&amp;rsquo;s recommendation. Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability. This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp;The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical). Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgraded all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;li&gt;On March 11, 2022, Appian released an additional hotfix that replaces the use of log4j 1.2.17 versions across all components except for Service Manager. There is no patch available for these components at this time, but Appian expects to update these components by early Q2. In the meantime, Appian has confirmed that our usage of Log4j 1.2.17 is not vulnerable to CVE-2022-23302, CVE-2022-23305, and CVE-2022-23307.&lt;/li&gt;
&lt;li&gt;On March 25, 2022, Appian released an additional hotfix on supported versions that replaces the use of log4j 1.2.17 versions within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of these hotfixes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related vulnerability against Log4j2, announced December 14, 2021. Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10) released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch through our normal hotfix cycle&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;3/11/2022 -&amp;nbsp;Hotfix from Appian released, updating log4j 1.2.17 across all components except Kafka and Zookeeper (refer to #7 above for additional details)&lt;/li&gt;
&lt;li&gt;3/25/2022 - Hotfix from Appian released, updating log4j 1.2.17 within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: March 28 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/31</link><pubDate>Mon, 28 Mar 2022 17:52:46 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 31 posted to Appian Knowledge Base by Elly Meng on 3/28/2022 5:52:46 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform. Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j 2.x instances to version 2.15 in accordance with NIST&amp;rsquo;s recommendation. Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability. This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp;The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical). Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgraded all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;li&gt;On March 11, 2022, Appian released an additional hotfix that replaces the use of log4j 1.2.17 versions across all components except for Service Manager. There is no patch available for these components at this time, but Appian expects to update these components by early Q2. In the meantime, Appian has confirmed that our usage of Log4j 1.2.17 is not vulnerable to CVE-2022-23302, CVE-2022-23305, and CVE-2022-23307.&lt;/li&gt;
&lt;li&gt;On March 25, 2022, Appian released an additional hotfix on supported versions that replaces the use of log4j 1.2.17 versions within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of these hotfixes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related vulnerability against Log4j2, announced December 14, 2021. Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10) released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch through our normal hotfix cycle&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;3/11/2022 -&amp;nbsp;Hotfix from Appian released, updating log4j 1.2.17 across all components except Kafka and Zookeeper (refer to #7 above for additional details)&lt;/li&gt;
&lt;li&gt;3/25/2022 - Hotfix from Appian released, updating log4j 1.2.17 within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: March 28 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/30</link><pubDate>Mon, 28 Mar 2022 17:50:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 30 posted to Appian Knowledge Base by Elly Meng on 3/28/2022 5:50:18 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j 2.x instances to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp;The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgraded all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;li&gt;On March 11, 2022, Appian released an additional hotfix that replaces the use of log4j 1.2.17 versions across all components except for Service Manager. There is no patch available for these components at this time, but Appian expects to update these components by early Q2. In the meantime, Appian has confirmed that our usage of Log4j 1.2.17 is not vulnerable to CVE-2022-23302, CVE-2022-23305, and CVE-2022-23307.&lt;/li&gt;
&lt;li&gt;On March 25, 2022, Appian released an additional hotfix on supported versions that replaces the use of log4j 1.2.17 versions within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of these hotfixes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - &lt;b&gt;&amp;nbsp;&lt;/b&gt;Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch through our normal hotfix cycle&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;3/11/2022 -&amp;nbsp;Hotfix from Appian released, updating log4j 1.2.17 across all components except Kafka and Zookeeper (refer to #7 above for additional details)&lt;/li&gt;
&lt;li&gt;3/25/2022 - Hotfix from Appian released, updating log4j 1.2.17 within Kafka and Zookeeper. With this update, there is no remaining usage of log4j 1.x versions within the Appian Platform&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: March 28 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/29</link><pubDate>Tue, 15 Mar 2022 00:09:23 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 29 posted to Appian Knowledge Base by Parmida Borhani on 3/15/2022 12:09:23 AM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgrades all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;li&gt;On March 11, 2022, Appian released an additional hotfix that replaces the use of log4j 1.2.17 versions across all components except for Service Manager. There is no patch available for these components at this time, but Appian expects to update these components by early Q2. In the meantime, Appian has confirmed that our usage of Log4j 1.2.17 is not vulnerable to&amp;nbsp;CVE-2022-23302, CVE-2022-23305, and CVE-2022-23307.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of these hotfixes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)i&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;3/11/2022 - Hotfix from Appian released, updating log4j 1.2.17 across all components except Kafka and Zookeeper (refer to #7 above for additional details).&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: March 14&amp;nbsp;2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/28</link><pubDate>Mon, 31 Jan 2022 21:55:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 28 posted to Appian Knowledge Base by Elly Meng on 1/31/2022 9:55:15 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgrades all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian uses Log4j 1.2.17, and just like every other third-party component within the Appian platform, we monitor it for new vulnerabilities. Should a vulnerability related to Log4j 1.2.17 be discovered, we will investigate the vulnerability to determine if the Appian platform is impacted and remediate the issue as necessary as part of our normal hotfix process. At this time, Appian is unaware of any vulnerabilities within Log4j 1.2.17 that impact the Appian platform.&amp;nbsp;Specifically, Appian is not vulnerable to CVE-2022-23302, CVE-2022-23305, and CVE-2022-23307.&lt;b&gt;&amp;nbsp;&lt;/b&gt;In the future, Appian has plans to upgrade all Log4j 1.2.17 to the latest version of Log4j 2.x. While we are unable to provide additional details on the expected timeline at this time, our security team will continue to monitor the threat landscape related to Log4j and keep customers informed as developments arise.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)i&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;January 31 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/27</link><pubDate>Mon, 31 Jan 2022 21:51:51 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 27 posted to Appian Knowledge Base by Elly Meng on 1/31/2022 9:51:51 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgrades all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian uses Log4j 1.2.17, and just like every other third-party component within the Appian platform, we monitor it for new vulnerabilities. Should a vulnerability related to Log4j 1.2.17 be discovered, we will investigate the vulnerability to determine if the Appian platform is impacted and remediate the issue as necessary as part of our normal hotfix process. At this time, Appian is unaware of any vulnerabilities within Log4j 1.2.17 that impact the Appian platform.&amp;nbsp;&lt;b&gt;Specifically, Appian is not vulnerable to CVE-2022-23302, CVE-2022-23305, and CVE-2022-23307.&amp;nbsp;&lt;/b&gt;In the future, Appian has plans to upgrade all Log4j 1.2.17 to the latest version of Log4j 2.x. While we are unable to provide additional details on the expected timeline at this time, our security team will continue to monitor the threat landscape related to Log4j and keep customers informed as developments arise.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)i&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;January 31 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/26</link><pubDate>Fri, 21 Jan 2022 22:26:24 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 26 posted to Appian Knowledge Base by Elly Meng on 1/21/2022 10:26:24 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgrades all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian uses Log4j 1.2.17, and just like every other third-party component within the Appian platform, we monitor it for new vulnerabilities. Should a vulnerability related to Log4j 1.2.17 be discovered, we will investigate the vulnerability to determine if the Appian platform is impacted and remediate the issue as necessary as part of our normal hotfix process. At this time, Appian is unaware of any vulnerabilities within Log4j 1.2.17 that impact the Appian platform. In the future, Appian has plans to upgrade all Log4j 1.2.17 to the latest version of Log4j 2.x. While we are unable to provide additional details on the expected timeline at this time, our security team will continue to monitor the threat landscape related to Log4j and keep customers informed as developments arise.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;January 21 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/25</link><pubDate>Fri, 21 Jan 2022 22:20:53 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 25 posted to Appian Knowledge Base by Elly Meng on 1/21/2022 10:20:53 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgrades all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian uses Log4j 1.2.17, and just like every other third-party component within the Appian platform, we monitor it for new vulnerabilities. Should a vulnerability related to Log4j 1.2.17 be discovered, we will investigate the vulnerability to determine if the Appian platform is impacted and remediate the issue as necessary as part of our normal hotfix process. At this time, Appian is unaware of any vulnerabilities within Log4j 1.2.17 that impact the Appian platform. In the future, Appian has plans to upgrade all Log4j 1.2.17 to the latest version of Log4j 2.x. While we are unable to provide additional details on the expected timeline at this time, our security team will continue to monitor the threat landscape related to Log4j and keep you informed as developments arise.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;January 21 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/24</link><pubDate>Tue, 18 Jan 2022 00:38:37 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 24 posted to Appian Knowledge Base by Parmida Borhani on 1/18/2022 12:38:37 AM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On January 17, 2021, Appian released an additional hotfix that upgrades all log4j2 2.x instances to 2.17.1.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, as of January 17 2022, Appian has updated all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;1/17/2022 - Hotfix from Appian released, upgrading all log4j2 2.x instances to 2.17.1.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed:&amp;nbsp;January 17 2022&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/23</link><pubDate>Thu, 30 Dec 2021 21:08:32 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 23 posted to Appian Knowledge Base by Elly Meng on 12/30/2021 9:08:32 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, Appian still plans to update all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 29 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/22</link><pubDate>Thu, 30 Dec 2021 21:08:08 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 22 posted to Appian Knowledge Base by Elly Meng on 12/30/2021 9:08:08 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, Appian still plans to update all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 30 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/21</link><pubDate>Wed, 29 Dec 2021 17:34:50 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 21 posted to Appian Knowledge Base by Elly Meng on 12/29/2021 5:34:50 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832"&gt;CVE-2021-44832&lt;/a&gt; is a new vulnerability against Log4j2, announced December 28, 2021. Unauthenticated and basic users do not have the ability to modify the log4j logging configuration file within the Appian platform. However, Appian still plans to update all instances of Log4j 2.x to 2.17.1 through our normal hotfix cycle.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;
&lt;div&gt;12/28/2021 - CVE-2021-44832 vuln (CVSS 3.1) released (2.17.1 update). This is a medium severity issue that Appian plans to patch&amp;nbsp;through our normal hotfix cycle.&lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 23 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/20</link><pubDate>Thu, 23 Dec 2021 22:15:45 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 20 posted to Appian Knowledge Base by Parmida Borhani on 12/23/2021 10:15:45 PM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left:30px;"&gt;Appian customers&amp;rsquo; support contacts have been notified of the availability of this hotfix.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 23 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/19</link><pubDate>Thu, 23 Dec 2021 07:43:58 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 19 posted to Appian Knowledge Base by Parmida Borhani on 12/23/2021 7:43:58 AM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 22 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/18</link><pubDate>Thu, 23 Dec 2021 07:40:01 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 18 posted to Appian Knowledge Base by Parmida Borhani on 12/23/2021 7:40:01 AM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228. Vuln (CVSS 10)&amp;nbsp; released&amp;nbsp;&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 22 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/17</link><pubDate>Thu, 23 Dec 2021 07:37:39 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 17 posted to Appian Knowledge Base by Parmida Borhani on 12/23/2021 7:37:39 AM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228 vuln (CVSS 10) released&lt;/li&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components Elasticsearch) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 22 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/16</link><pubDate>Thu, 23 Dec 2021 07:37:03 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 16 posted to Appian Knowledge Base by Parmida Borhani on 12/23/2021 7:37:03 AM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;&lt;code&gt;log4j2.formatMsgNoLookups&lt;/code&gt;&amp;quot; to &amp;ldquo;&lt;code&gt;true&lt;/code&gt;&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228 vuln (CVSS 10) released&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components Elasticsearch) on 12/22/2021&lt;/li&gt;
&lt;li&gt;12/22/2021 - Hotfix from Appian released (2.17 update)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 22 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 &amp; CVE-2021-45046)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/15</link><pubDate>Thu, 23 Dec 2021 07:34:23 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 15 posted to Appian Knowledge Base by Parmida Borhani on 12/23/2021 7:34:23 AM&lt;br /&gt;
&lt;p&gt;Following the December 10, 2021 announcement of the critical Log4j2 security vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt;), Appian determined that impacted versions of Log4j2 were being used in the Appian platform.&amp;nbsp; Appian has taken the following actions in response:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Appian is continuously conducting active security monitoring of Appian Cloud and is not aware of any breach or indicators of compromise related to this vulnerability, whether internal or external.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Appian confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions used in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE). In these versions, &amp;ldquo;&lt;code&gt;com.sun.jndi.ldap.object.trustURLCodebase&lt;/code&gt;&amp;rdquo; is set to &amp;ldquo;&lt;code&gt;false&lt;/code&gt;&amp;rdquo;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian released a hotfix for all supported Appian releases, upgrading Log4j to version 2.15 in accordance with NIST&amp;rsquo;s recommendation.&amp;nbsp; Appian notified customers&amp;rsquo; designated support contacts of the hotfix availability.&amp;nbsp; This hotfix has been deployed to all Appian Cloud environments.&lt;/li&gt;
&lt;li&gt;On December 11, 2021, Appian published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;Appian Selenium API (Application Programing Interface)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;Cucumber for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;/a&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;FitNesse for Appian&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Appian contacted plugin authors for Appian Community supported plugins, encouraging them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, Appian customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;On December 22, 2021, Appian released an additional hotfix that provides the following updates:
&lt;ul&gt;
&lt;li&gt;Appian previously identified one third-party component, whose codebase is not within Appian&amp;rsquo;s control, where a fix was not yet issued by the third-party.&amp;nbsp; In order to mitigate the original vulnerability, Appian applied the NIST-recommended system setting/property &amp;quot;log4j2.formatMsgNoLookups&amp;quot; to &amp;ldquo;true&amp;rdquo; where needed.&amp;nbsp; The December 22, 2021 hotfix now fully addresses this by upgrading Log4j in this component to version 2.17.0.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;On December 14, 2021 a new, but related, vulnerability against log4j2 (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046"&gt;CVE-2021-45046&lt;/a&gt;) was announced with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any location. In the absence of using that format, the Appian platform is not vulnerable to this CVE. While the Appian platform is not affected by this vulnerability, Appian has taken the NIST-recommended action for this CVE by updating Log4j from version 2.15.0 to version 2.17.0.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228 vuln (CVSS 10) released&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components Elasticsearch) on 12/22/2021&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 22 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/14</link><pubDate>Tue, 21 Dec 2021 15:57:24 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 14 posted to Appian Knowledge Base by Elly Meng on 12/21/2021 3:57:24 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Through investigation, Appian has determined that we are using potentially impacted versions of Log4j2 within our product (&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;&lt;span style="font-weight:400;"&gt;CVE-2021-44228&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;), including 3 of our Appian supported utilities. Currently, Appian is not aware of any breach or indicators of compromise related to this vulnerability in our security monitoring, whether internal or external.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;We have confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions that Appian uses in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE (Common Vulnerabilities and Exposures). In these versions, &lt;code&gt;&amp;ldquo;com.sun.jndi.ldap.object.trustURLCodebase&amp;rdquo;&lt;/code&gt; is set to &lt;code&gt;&amp;ldquo;false&amp;rdquo;&lt;/code&gt;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability. Our teams have been treating this issue as one of highest priority.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Hotfix releases have been created for 19.4 releases and forward, and were made available to customers on Saturday, December 11.&amp;nbsp;In these hotfixes, vulnerable versions of Log4j2 have been upgraded to version 2.15.0. Customers&amp;rsquo; designated support contacts have been notified by email of the hotfix availability.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian Cloud customers are being notified by our Support team of mandatory scheduling of maintenance windows for deploying the hotfix to their sites, following Appian&amp;rsquo;s&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Cloud_Site_Maintenance.html#critical-maintenance"&gt;&lt;span style="font-weight:400;"&gt;Critical Maintenance&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; procedures. For self-managed customers, Appian has made the &lt;a href="https://docs.appian.com/suite/help/21.4/Product_Release_History.html#appian-self-managed" rel="noopener noreferrer" target="_blank"&gt;hotfix installers available for download&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has also published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;span style="font-weight:400;"&gt;Appian Selenium API (Application Programing Interface)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;span style="font-weight:400;"&gt;Cucumber for Appian&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;&lt;span style="font-weight:400;"&gt;FitNesse for Appian&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;For Community maintained plugins, Appian has contacted&amp;nbsp;plugin authors and encouraged them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;For third-party components running version 2.11.1, i.e., components which still need to have the patch applied but whose codebase is not within Appian&amp;rsquo;s control, Appian has taken steps to mitigate the vulnerability, for instance by applying the NIST-recommended system setting/property &lt;code&gt;&amp;quot;log4j2.formatMsgNoLookups&amp;quot;&lt;/code&gt; to &lt;code&gt;&amp;ldquo;true&amp;rdquo;&lt;/code&gt; where needed. Appian has identified one third-party component that is still on 2.11.1. &lt;span&gt;Given that Appian has applied the NIST-recommended mitigation approach mentioned above, Appian expects to upgrade this component and make this available to customers through standard maintenance procedures once the patch becomes available.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-45046&lt;/a&gt; is a new, but related, vulnerability against Log4j2, originally announced on December 14, 2021 with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s current configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any locations. In absence of using that format, the Appian platform is not vulnerable to the vulnerabilities as described within CVE-2021-45046. While the Appian platform is not affected by this vulnerability, Appian is in the process of updating to version 2.17 and will make this update available to customers through standard maintenance procedures once available.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228 vuln (CVSS 10) released&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components Elasticsearch) on 12/22/2021&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 21 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item><item><title>KB-2204 Information about the Log4j2 security vulnerability (CVE-2021-44228)</title><link>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228/revision/13</link><pubDate>Tue, 21 Dec 2021 15:50:19 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:bf5da23b-4f3f-4cc0-9df0-9eb160e2525e</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228#comments</comments><description>Revision 13 posted to Appian Knowledge Base by Elly Meng on 12/21/2021 3:50:19 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Through investigation, Appian has determined that we are using potentially impacted versions of Log4j2 within our product (&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"&gt;&lt;span style="font-weight:400;"&gt;CVE-2021-44228&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;), including 3 of our Appian supported utilities. Currently, Appian is not aware of any breach or indicators of compromise related to this vulnerability in our security monitoring, whether internal or external.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;We have confirmed that the JDK (Java Platform, Standard Edition Development Kit) versions that Appian uses in its latest hotfix (11.0.12+7 and 8u312) are not affected by the LDAP (Lightweight Directory Access Protocol) attack vector in this CVE (Common Vulnerabilities and Exposures). In these versions, &lt;code&gt;&amp;ldquo;com.sun.jndi.ldap.object.trustURLCodebase&amp;rdquo;&lt;/code&gt; is set to &lt;code&gt;&amp;ldquo;false&amp;rdquo;&lt;/code&gt;, meaning JNDI (Java Naming and Directory Interface) cannot load a remote codebase using LDAP. However, there may potentially be other attack vectors targeting this vulnerability. Our teams have been treating this issue as one of highest priority.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Hotfix releases have been created for 19.4 releases and forward, and were made available to customers on Saturday, December 11.&amp;nbsp;In these hotfixes, vulnerable versions of Log4j2 have been upgraded to version 2.15.0. Customers&amp;rsquo; designated support contacts have been notified by email of the hotfix availability.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian Cloud customers are being notified by our Support team of mandatory scheduling of maintenance windows for deploying the hotfix to their sites, following Appian&amp;rsquo;s&amp;nbsp;&lt;/span&gt;&lt;a href="https://docs.appian.com/suite/help/latest/Appian_Cloud_Site_Maintenance.html#critical-maintenance"&gt;&lt;span style="font-weight:400;"&gt;Critical Maintenance&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; procedures. For self-managed customers, Appian has made the &lt;a href="https://docs.appian.com/suite/help/21.4/Product_Release_History.html#appian-self-managed" rel="noopener noreferrer" target="_blank"&gt;hotfix installers available for download&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has also published new versions of the following affected plugins that are supported by Appian:&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/b/appmarket/posts/appian_2d00_selenium_2d00_api"&gt;&lt;span style="font-weight:400;"&gt;Appian Selenium API (Application Programing Interface)&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/b/appmarket/posts/cucumber-for-appian"&gt;&lt;span style="font-weight:400;"&gt;Cucumber for Appian&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/b/appmarket/posts/fitnesse-for-appian"&gt;&lt;span style="font-weight:400;"&gt;FitNesse for Appian&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;For Community maintained plugins, Appian has contacted&amp;nbsp;plugin authors and encouraged them to review their plugins for this vulnerability and publish updates if they are affected. As all AppMarket plugins are open-source, customers also have the ability to inspect and update independently (and can publish their updates back to the AppMarket)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;For third-party components running version 2.11.1, i.e., components which still need to have the patch applied but whose codebase is not within Appian&amp;rsquo;s control, Appian has taken steps to mitigate the vulnerability, for instance by applying the NIST-recommended system setting/property &lt;code&gt;&amp;quot;log4j2.formatMsgNoLookups&amp;quot;&lt;/code&gt; to &lt;code&gt;&amp;ldquo;true&amp;rdquo;&lt;/code&gt; where needed. Appian has identified one third-party component that is still on 2.11.1. &lt;span&gt;Given that Appian has applied the NIST-recommended mitigation approach mentioned above, Appian expects to upgrade this component and make this available to customers through standard maintenance procedures once the patch becomes available.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-45046&lt;/a&gt; is a new, but related, vulnerability against Log4j2, originally announced on December 14, 2021 with a provisional CVSS score of 3.7 (low) and updated December 17, 2021 to a CVSS score of 9.0 (Critical).&amp;nbsp; Appian&amp;rsquo;s current configuration mitigates risks associated with this CVE since Appian does not use pattern layouts with a context lookup (ex: ctx) in any locations. In absence of using that format, the Appian platform is not vulnerable to the vulnerabilities as described within CVE-2021-45046. While the Appian platform is not affected by this vulnerability, Appian is in the process of updating to version 2.17 and will make this update available to customers through standard maintenance procedures once available.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" rel="noopener noreferrer" target="_blank"&gt;CVE-2021-4104&lt;/a&gt; is a new, but related, vulnerability against Log4j2, announced December 14, 2021.&amp;nbsp; Appian does not use the JMSAppender in any instances of 1.x. Therefore, the Appian platform is not impacted by this CVE.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Timeline:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12/10/2021 - CVE-2021-44228 vuln (CVSS 10) released&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/11/2021 - Hotfix from Appian released (2.15 update), including Apache and NIST recommended mitigations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/14/2021 - CVE-2021-45046 vuln (CVSS 3.7) released (2.16 update); relevant mitigations still apply&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/17/2021 - CVE-2021-45046 CVSS score was elevated to 9.0&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/18/2021 - CVE-2021-45105 vuln (CVSS 7.5) released (2.17 update); relevant mitigations still apply&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;12/21/2021 - Appian updates plans to issue a hotfix upgrading all log4j2 2.x instances to 2.17 (including relevant third-party components Elasticsearch) on 12/22/2021&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Appian response to the FedRAMP Log4j2&amp;nbsp;questionnaire is in-progress and will be available on OMB Max.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: December 21 2021&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: logging, Security, installation&lt;/div&gt;
</description></item></channel></rss>