澳门捕鱼赚钱游戏(中国)集团官网

Log4Shell

Last Updated: February 9, 2022

Overview

Vulnerability that are called "Log4Shell" in Apache Log4j has been reported. Regarding potential impact to Yokogawa products, please check below.

・CENTUM VP : Not Affected *

・ProSafe-RS/ProSafe-RS Lite: Not affected

・Exaopc: Not affected

・Exaquantum: Not affected

・Exaplog: Not affected

・STARDOM: Not affected

・FAST/TOOLS: Not affected

・CI Server: Not affected

・PRM: Not affected

・VTSPortal: Not affected

・SMARTDAC+ GX/GP/GM/GA: Not affected

・DAQSTATION DX: Not affected

・DAQMASTER MX/MW: Not affected

・FA-M3: Not affected

・e-RT3: Not affected

* Exclude Unified Gateway Station (UGS2) Standard Function R6.03.10 - R6.06.00. Please refer to YSAR-22-0003 for details.

If new Yokogawa products are found to be affected by the vulnerability, Yokogawa will provide detail information in Yokogawa Security Advisory Report (YSAR) as soon as countermeasures become available.

Yokogawa Security Advisory Report
http://pemza.taopianyi.net/library/resources/white-papers/yokogawa-security-advisory-report-list/

The Yokogawa Group Vulnerability Handling Policy
http://pemza.taopianyi.net/eu/solutions/products-platforms/announcements/vulpolicy/

Yokogawa strongly recommends all customers to establish and maintain a full security program, not only for the vulnerability. Security program components are: Patch updates, Anti-virus, Backup and recovery, zoning, hardening, whitelisting, firewall, etc. Yokogawa can assist in setting up and running the security program continuously. For considering the most effective risk mitigation plan, as a starting point, Yokogawa can perform a security risk assessment.

Reference Site

Vulnerability Note VU#930724
https://kb.cert.org/vuls/id/930724
CVE-2021-45046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046

Looking for more information on our people, technology and solutions?

Contact Us

Top
奉节县包装盒的设计有限公司安岳县资料翻译有限公司清水河县地毯清洗有限公司眉县岐山县印刷机械有限公司巧家县照明电器有限公司 西工区环保工程有限公司虞城县服务业有限公司同德县石林养护有限公司 洛川县生物有限公司高坪区化妆品有限公司