DriveLock Products Not Affected by Log4j Vulnerability

by DriveLock
Cyber attack loading time
Source iStock

National information security authorities are warning:
A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected in Java Log4j library.

The vulnerability exploits the use of JNDI configurations in Java applications. JNDI (Java Naming and Directory Interface) is an application programming interface (API) that provides naming and directory capabilities to applications written using the Java programming language.

CVE-2021-44228 does not affect DriveLock software because DriveLock applications do not use Java or its runtime environment.

Related posts

12 tips on preventing social engineering attacks

In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...

5 reasons to run DriveLock in the cloud

Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to...

DriveLock and DataStore enter into distribution partnership

DataStore is integrating German vendor DriveLock into its enhanced IT security portfolio