<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136263#M24380</link>
    <description>&lt;P&gt;I understand that many people are nervous now, as this is a serious threat (thats why I created this CheckMates thread on friday to have a space to discuss it).&lt;BR /&gt;Check Point told us multiple times, that they are unaffected with their product family and now Val shared the fact, that it is because they are not using the affected library.&lt;BR /&gt;&lt;BR /&gt;I just did a fast check on a R80.40 SMS and can confirm that while a log4j-core-2.12.0.jar is laying there under /opt/CPuepm-R80.40/engine/lib/, it does not seem to be loaded.&lt;/P&gt;
&lt;P&gt;Because I was pretty sure, that CP is using log4j in their products, I checked the loaded java processes. And there I could see, that they are using log4j 1.2.&lt;/P&gt;
&lt;P&gt;This means they are right, that they are not affected by &lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;CVE-2021-44228, because this exploit does not work in log4j 1.2 without JMSAppender beeing used (and it does not look like it is).&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;However, log4j 1.2 is end of life since 2015 which means that there might be other risks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;As with other older software, Check Point uses inside of their products and which is not patched anymore by their original maintainers, we have to hope that Check Point R&amp;amp;D patches it themself or take other precausions, that security issues cannot be exploited.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Generally, I (and I think some other Check Mates would agree with me) would like it, if nobody uses software in their products, which is end of life by their maintainers. But we all know how the enterprise software industry works, right? This is not a Check Point only problem.&lt;/P&gt;
&lt;P&gt;Details:&lt;/P&gt;
&lt;LI-SPOILER&gt;
&lt;PRE&gt;[Expert@SMS-Example:0]# find / -name "log4j-core*.jar"&lt;BR /&gt;/opt/CPuepm-R80.40/engine/lib/log4j-core-2.12.0.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ps -edalf | grep java&lt;BR /&gt;4 S admin 2595 1 0 80 0 - 1873700 futex_ Sep25 ? 01:10:22 /opt/CPshrd-R80.40/jre_64/bin/java -Xmx4096m -Xms128m -Xshar&lt;BR /&gt;4 S admin 7864 7767 0 80 0 - 1103890 futex_ Sep25 ? 09:49:53 /opt/CPshrd-R80.40/jre_64/bin/java -D_vSEC=TRUE -Xdump:direc&lt;BR /&gt;4 S admin 8195 7627 38 99 19 - 32722230 futex_ Sep25 ? 30-09:06:35 /opt/CPshrd-R80.40/jre_64/bin/java -D_solr=TRUE -Xdump:di&lt;BR /&gt;4 S admin 8213 7627 0 99 19 - 1190465 futex_ Sep25 ? 02:42:13 /opt/CPshrd-R80.40/jre_64/bin/java -D_RFL=TRUE -Xdump:direct&lt;BR /&gt;4 S admin 8238 7627 0 80 0 - 1464978 futex_ Sep25 ? 19:07:38 /opt/CPshrd-R80.40/jre_64/bin/java -D_smartview=TRUE -Xdump:&lt;BR /&gt;4 S admin 8724 7627 0 80 0 - 772185 futex_ Sep25 ? 00:00:41 /opt/CPshrd-R80.40/jre_64/bin/java -D_RepositoryManager=TRUE&lt;BR /&gt;4 S admin 12335 11940 0 80 0 - 662 pipe_w 10:52 pts/2 00:00:00 grep --color=auto java&lt;BR /&gt;4 S admin 14275 7627 2 80 0 - 3095046 futex_ Sep25 ? 1-21:49:08 /opt/CPshrd-R80.40/jre_64/bin/java -D_CPM=TRUE -Xaot:force&lt;BR /&gt;4 S admin 17841 1 0 80 0 - 1671 do_wai Oct06 ? 00:00:00 /bin/su -s /bin/sh -c /opt/CPshrd-R80.40/jre_64/bin/java -Dj&lt;BR /&gt;4 S cp_exte+ 17843 17841 0 80 0 - 856129 futex_ Oct06 ? 01:07:57 /opt/CPshrd-R80.40/jre_64/bin/java -Djava.io.tmpdir=/opt/CPs&lt;BR /&gt;4 S admin 20666 14275 2 80 0 - 2099273 futex_ Sep25 ? 1-18:42:12 /opt/CPshrd-R80.40/jre_64/bin/java -D_CPM_SOLR=TRUE -Xmx40&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/2595/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-Xmx4096m-Xms128m-Xshareclasses:none-Dfile.encoding=UTF-8-Djetty.home=/opt/CPshrd-R80.40/jetty-Djava.io.tmpdir=/opt/CPsuite-R80.40/fw1/tmp-Djetty.state=/opt/CPsuite-R80.40/fw1/api/conf/jetty.state-DSTOP.PORT=8078-DSTOP.KEY=checkpointkey-Dlog4j.configuration=file:/opt/CPsuite-R80.40/fw1/api/conf/log4j.properties-Dtdlog.logDir=/opt/CPsuite-R80.40/fw1/log-Dtdlog.web_api.logFile=api.elg-Dtdlog.output.appender=elgfile-Dtdlog.web_api.csvFile=api.csv-Dtdlog.output.csv.appender=csvfile-Djetty.host=0.0.0.0-Dpath=/opt/CPsuite-R80.40/fw1/api/lib/web_api_jetty.jar:-Xdump:directory=/var/log/dump/usermode-Xdump:heap:events=gpf+user-Xdump:system:none-Xdump:system:events=gpf+abort+traceassert+corruptcache-Xdump:tool:none-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh WEB_API %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=2,range=1..0,exec=javaCompress.sh WEB_API %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,priority=1,exec=kill -9 %pid-jar/opt/CPshrd-R80.40/jetty/start.jarOPTIONS=Server/opt/CPsuite-R80.40/fw1/api/conf/jetty.xml&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/7864/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-D_vSEC=TRUE-Xdump:directory=/var/log/dump/usermode-Xdump:heap:events=gpf+user-Xdump:tool:none-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh vSEC %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=1,range=1..0,exec=javaCompress.sh vSEC %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,exec=kill -9 %pid-Xaggressive-Xshareclasses:none-Xgc:scvTenureAge=1,noAdaptiveTenure-Dcpdiag=mainClass-Xmx1024m-Dfwdir=/opt/CPsuite-R80.40/fw1-Dlog4j.configuration=file:///opt/CPvsec-R80.40/lib/log4j.properties-cp/opt/CPvsec-R80.40/lib/*:/opt/CPsuite-R80.40/fw1/cpm-server/*:/opt/CPsuite-R80.40/fw1/VE/bin/*com.checkpoint.datacenter.Main127.0.0.1&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/8195/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-D_solr=TRUE-Xdump:directory=/var/log/dump/usermode-Xdump:heap:events=gpf+user-Xdump:tool:none-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh solr %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=1,range=1..0,exec=javaCompress.sh solr %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,exec=kill -9 %pid-Xaggressive-Xshareclasses:none-Xgc:scvTenureAge=1,noAdaptiveTenure-Xmx29420m-Xms256m-Dcp.ssl.tls.version=1-Dorg.terracotta.quartz.skipUpdateCheck=true-Xdump:system:none-Dlog4j.configuration=file:/opt/CPrt-R80.40/conf/solr.log4j.properties-Dpath=/opt/CPrt-R80.40/jars/aspectjrt-1.7.0.jar:/opt/CPrt-R80.40/jars/commons-io-2.3.jar:/opt/CPrt-R80.40/jars/commons-lang-2.6.jar:/opt/CPrt-R80.40/jars/cxf-core-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-java2ws-plugin-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-bindings-soap-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-bindings-xml-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-databinding-aegis-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-databinding-jaxb-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-frontend-jaxws-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-frontend-simple-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-javascript-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-transports-http-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-transports-http-jetty-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-ws-addr-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-ws-policy-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-wsdl-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-common-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-java2ws-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-validator-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-wsdlto-core-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-wsdlto-databinding-jaxb-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-wsdlto-frontend-jaxws-3.1.0.jar:/opt/CPrt-R80.40/jars/java_is.jar:/opt/CPrt-R80.40/jars/java_sic.jar:/opt/CPrt-R80.40/jars/jaxb-xjc-2.2.11.jar:/opt/CPrt-R80.40/jars/jetty_assist.jar:/opt/CPrt-R80.40/jars/stax2-api-3.1.4.jar:/opt/CPrt-R80.40/jars/woodstox-core-asl-4.4.1.jar:/opt/CPrt-R80.40/jars/wsdl4j-1.6.3.jar:/opt/CPrt-R80.40/jars/xmlschema-core-2.2.1.jar:/opt/CPsuite-R80.40/fw1/cpm-server/jackson-annotations-2.5.0.jar:/opt/CPsuite-R80.40/fw1/cpm-server/jackson-core-2.5.0.jar:/opt/CPsuite-R80.40/fw1/cpm-server/jackson-databind-2.5.0.jar:-Dsolr.log=/opt/CPrt-R80.40/log/solr.log-DSTOP.PORT=7210-DSTOP.KEY=log_infra-jarstart.jar/opt/CPrt-R80.40/conf/jetty.xml&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/8213/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-D_RFL=TRUE-Xdump:directory=/var/log/dump/usermode-Xdump:heap:events=gpf+user-Xdump:tool:none-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh RFL %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=1,range=1..0,exec=javaCompress.sh RFL %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,exec=kill -9 %pid-Xaggressive-Xshareclasses:none-Xgc:scvTenureAge=1,noAdaptiveTenure-Xmx1024m-Xms96m-Dcp.ssl.tls.version=1-Dorg.terracotta.quartz.skipUpdateCheck=true-Dupgrade.cores.count=-Dfile.encoding=UTF-8-DreportingServer.conf.dir=/opt/CPrt-R80.40/conf-Dlog4j.configuration=file:/opt/CPrt-R80.40/conf/rfl.log4j.properties-DReportingServer.log=/opt/CPrt-R80.40/log-cp/opt/CPrt-R80.40/jars/*com.checkpoint.core.LogCore-typejms&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/8238/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-D_smartview=TRUE-Xdump:directory=/var/log/dump/usermode-Xdump:heap:events=gpf+user-Xdump:tool:none-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh smartview %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=1,range=1..0,exec=javaCompress.sh smartview %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,exec=kill -9 %pid-Xaggressive-Xshareclasses:none-Xgc:scvTenureAge=1,noAdaptiveTenure-Xmx2048m-Xms512m-Djava.io.tmpdir=/opt/CPrt-R80.40/tmp-Dfile.encoding=UTF-8-DDedicatedServer=false-DIsMLM=false-DTaskExecThreads=4-Dlog4j.configuration=file:/opt/CPrt-R80.40/conf/smartview.log4j.properties-Dorg.terracotta.quartz.skipUpdateCheck=true-DRTDIR=/opt/CPrt-R80.40-Dpath=/opt/CPrt-R80.40/jars/aspectjrt-1.7.0.jar:/opt/CPrt-R80.40/jars/commons-io-2.3.jar:/opt/CPrt-R80.40/jars/commons-lang-2.6.jar:/opt/CPrt-R80.40/jars/cxf-core-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-java2ws-plugin-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-bindings-soap-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-bindings-xml-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-databinding-aegis-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-databinding-jaxb-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-frontend-jaxws-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-frontend-simple-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-javascript-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-transports-http-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-transports-http-jetty-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-ws-addr-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-ws-policy-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-rt-wsdl-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-common-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-java2ws-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-validator-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-wsdlto-core-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-wsdlto-databinding-jaxb-3.1.0.jar:/opt/CPrt-R80.40/jars/cxf-tools-wsdlto-frontend-jaxws-3.1.0.jar:/opt/CPrt-R80.40/jars/java_is.jar:/opt/CPrt-R80.40/jars/java_sic.jar:/opt/CPrt-R80.40/jars/jaxb-api-2.2.7.jar:/opt/CPrt-R80.40/jars/jaxb-core-2.2.7.jar:/opt/CPrt-R80.40/jars/jaxb-impl-2.2.7.jar:/opt/CPrt-R80.40/jars/jaxb-xjc-2.2.11.jar:/opt/CPrt-R80.40/jars/neethi-3.0.3.jar:/opt/CPrt-R80.40/jars/rfl_sic.jar:/opt/CPrt-R80.40/jars/smartview-jetty.jar:/opt/CPrt-R80.40/jars/woodstox-core-asl-4.4.1.jar:/opt/CPrt-R80.40/jars/wsdl4j-1.6.3.jar:/opt/CPrt-R80.40/jars/xmlschema-core-2.2.1.jar:-DSTOP.PORT=8079-DSTOP.KEY=smartview-jarstart.jarOPTIONS=Server,resources,websocket/opt/CPrt-R80.40/conf/smartview-jetty.xml/opt/CPrt-R80.40/conf/smartview-service-jetty.xml&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/8724/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-D_RepositoryManager=TRUE-Xdump:directory=/var/log/dump/usermode-Xdump:heap:events=gpf+user-Xdump:tool:none-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh RepositoryManager %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=1,range=1..0,exec=javaCompress.sh RepositoryManager %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,exec=kill -9 %pid-Xaggressive-Xshareclasses:none-Xgc:scvTenureAge=1,noAdaptiveTenure-jarRepositoryManager.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/14275/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-D_CPM=TRUE-Xaot:forceaot-Xmx8192m-Xms192m-Xgcpolicy:optavgpause-Djava.io.tmpdir=/opt/CPsuite-R80.40/fw1/tmp-Xaggressive-Xshareclasses:none-Djava.security.krb5.conf=/opt/CPsuite-R80.40/fw1/conf/krb5.conf-Xjit:exclude={java/lang/invoke/MutableCallSiteDynamicInvokerHandle.invokeExact_thunkArchetype_X*},exclude={java/lang/invoke/GuardWithTestHandle.invokeExact_thunkArchetype_X*},exclude={java/lang/invoke/*.invokeExact_thunkArchetype_X*},exclude={com/checkpoint/management/dleserver/coresvc/internal/SchemaMgrSvcImpl.getClassInfo*},exclude={com/checkpoint/management/object_store/ObjectStoreSessionImpl.findFieldsBySearchQueryEx*}-Xdump:directory=/var/log/dump/usermode-Xdump:heap:events=gpf+user-Xdump:tool:none-Xdump:tool:events=user,priority=1,range=1..0,exec=javaCompress.sh CPMUSER %pid-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh CPM %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=1,range=1..0,exec=javaCompress.sh CPM %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,priority=1,exec=kill -9 %pid-Dfile.encoding=UTF-8-cp/opt/CPshrd-R80.40/jars/solr-solrj-v4_8_1.jar:*com.checkpoint.management.cpm.Cpm-s&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/17841/cmdline&lt;BR /&gt;/bin/su-s/bin/sh-c/opt/CPshrd-R80.40/jre_64/bin/java -Djava.io.tmpdir=/opt/CPsuite-R80.40/fw1/cpextensions/tmp -Dfile.encoding=UTF-8 -Djetty.state=/opt/CPsuite-R80.40/fw1/cpextensions/log/jetty.state -DSTOP.PORT=8087 -DSTOP.KEY=cpextensions_key -Dlog4j.configuration=file:/opt/CPsuite-R80.40/fw1/cpextensions/conf/cpextensions.log4j.properties -DCPEXTENSIONS_WITHIN_MANAGEMENT_SERVER=1 -DRULE_ASSISTANT_CONF_PATH=/opt/CPsuite-R80.40/fw1/cpextensions/conf -DWORKFLOW_CONF_PATH=/opt/CPsuite-R80.40/fw1/cpextensions/conf -DRULE_ASSISTANT_LOG_PATH=/opt/CPsuite-R80.40/fw1/cpextensions/log -DCP_EXTENSIONS_LOG_FILE=/opt/CPsuite-R80.40/fw1/cpextensions/log/cpextensions.elg -jar start.jar OPTIONS=Server,resources /opt/CPsuite-R80.40/fw1/cpextensions/conf/cpextensions-jetty-config.xmlcp_extensions&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/17843/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-Djava.io.tmpdir=/opt/CPsuite-R80.40/fw1/cpextensions/tmp-Dfile.encoding=UTF-8-Djetty.state=/opt/CPsuite-R80.40/fw1/cpextensions/log/jetty.state-DSTOP.PORT=8087-DSTOP.KEY=cpextensions_key-Dlog4j.configuration=file:/opt/CPsuite-R80.40/fw1/cpextensions/conf/cpextensions.log4j.properties-DCPEXTENSIONS_WITHIN_MANAGEMENT_SERVER=1-DRULE_ASSISTANT_CONF_PATH=/opt/CPsuite-R80.40/fw1/cpextensions/conf-DWORKFLOW_CONF_PATH=/opt/CPsuite-R80.40/fw1/cpextensions/conf-DRULE_ASSISTANT_LOG_PATH=/opt/CPsuite-R80.40/fw1/cpextensions/log-DCP_EXTENSIONS_LOG_FILE=/opt/CPsuite-R80.40/fw1/cpextensions/log/cpextensions.elg-jarstart.jarOPTIONS=Server,resources/opt/CPsuite-R80.40/fw1/cpextensions/conf/cpextensions-jetty-config.xml&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# cat /proc/20666/cmdline&lt;BR /&gt;/opt/CPshrd-R80.40/jre_64/bin/java-D_CPM_SOLR=TRUE-Xmx4096m-Xms64m-Xgcpolicy:optavgpause-Djava.io.tmpdir=/opt/CPsuite-R80.40/fw1/tmp-Xaggressive-Xshareclasses:none-Xdump:heap:events=gpf+user-Xdump:directory=/var/log/dump/usermode-Xdump:tool:none-Xdump:tool:events=gpf+abort+traceassert+corruptcache,priority=1,range=1..0,exec=javaCompress.sh CPM_SOLR %pid-Xdump:tool:events=systhrow,filter=java/lang/OutOfMemoryError,priority=1,range=1..0,exec=javaCompress.sh CPM_SOLR %pid-Xdump:tool:events=throw,filter=java/lang/OutOfMemoryError,priority=1,exec=kill -9 %pid-Dsolr.solr.home=/opt/CPsuite-R80.40/fw1/Solr/solr/-DNGM.SOLR.LOG.DIR=/opt/CPsuite-R80.40/fw1/log-Djava.util.logging.config.file=/opt/CPsuite-R80.40/fw1/Solr/etc/logging.properties-DSTART=/opt/CPsuite-R80.40/fw1/Solr/start.config-Djetty.home=/opt/CPsuite-R80.40/fw1/Solr/-DSTOP.KEY=checkpointkey-DSTOP.PORT=8982-Dpath=/opt/CPsuite-R80.40/fw1/cpm-server/java_is.jar:/opt/CPsuite-R80.40/fw1/cpm-server/java_sic.jar:/opt/CPshrd-R80.40/jars/jetty_assist.jar-jar/opt/CPsuite-R80.40/fw1/Solr/start.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]#&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/2595/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 92 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 94 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ps -edalf | grep java&lt;BR /&gt;4 S admin 2595 1 0 80 0 - 1873700 futex_ Sep25 ? 01:10:22 /opt/CPshrd-R80.40/jre_64/bin/java -Xmx4096m -Xms128m -Xshar&lt;BR /&gt;4 S admin 7864 7767 0 80 0 - 1103890 futex_ Sep25 ? 09:49:56 /opt/CPshrd-R80.40/jre_64/bin/java -D_vSEC=TRUE -Xdump:direc&lt;BR /&gt;4 S admin 8195 7627 38 99 19 - 32746342 futex_ Sep25 ? 30-09:10:46 /opt/CPshrd-R80.40/jre_64/bin/java -D_solr=TRUE -Xdump:di&lt;BR /&gt;4 S admin 8213 7627 0 99 19 - 1190465 futex_ Sep25 ? 02:42:14 /opt/CPshrd-R80.40/jre_64/bin/java -D_RFL=TRUE -Xdump:direct&lt;BR /&gt;4 S admin 8238 7627 0 80 0 - 1464978 futex_ Sep25 ? 19:07:42 /opt/CPshrd-R80.40/jre_64/bin/java -D_smartview=TRUE -Xdump:&lt;BR /&gt;4 S admin 8724 7627 0 80 0 - 772185 futex_ Sep25 ? 00:00:41 /opt/CPshrd-R80.40/jre_64/bin/java -D_RepositoryManager=TRUE&lt;BR /&gt;4 S admin 14275 7627 2 80 0 - 3095046 futex_ Sep25 ? 1-21:49:28 /opt/CPshrd-R80.40/jre_64/bin/java -D_CPM=TRUE -Xaot:force&lt;BR /&gt;4 S admin 15413 11940 0 80 0 - 662 pipe_w 11:01 pts/2 00:00:00 grep --color=auto java&lt;BR /&gt;4 S admin 17841 1 0 80 0 - 1671 do_wai Oct06 ? 00:00:00 /bin/su -s /bin/sh -c /opt/CPshrd-R80.40/jre_64/bin/java -Dj&lt;BR /&gt;4 S cp_exte+ 17843 17841 0 80 0 - 856129 futex_ Oct06 ? 01:07:57 /opt/CPshrd-R80.40/jre_64/bin/java -Djava.io.tmpdir=/opt/CPs&lt;BR /&gt;4 S admin 20666 14275 2 80 0 - 2099284 futex_ Sep25 ? 1-18:42:30 /opt/CPshrd-R80.40/jre_64/bin/java -D_CPM_SOLR=TRUE -Xmx40&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/7864/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 194 -&amp;gt; /opt/CPsuite-R80.40/fw1/cpm-server/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 254 -&amp;gt; /opt/CPsuite-R80.40/fw1/cpm-server/log4j-1.2.15.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/8195/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 125 -&amp;gt; /opt/CPrt-R80.40/jars/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 214 -&amp;gt; /opt/CPrt-R80.40/jars/log4j-1.2.15.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 234 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 236 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 273 -&amp;gt; /opt/CPrt-R80.40/tmp/solr-webapp/webapp/WEB-INF/lib/log4j-1.2.16.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 647 -&amp;gt; /opt/CPrt-R80.40/tmp/log_indexer_proxy-webapp/webapp/WEB-INF/lib/log4j-1.2.15.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 651 -&amp;gt; /opt/CPrt-R80.40/tmp/log_indexer_proxy-webapp/webapp/WEB-INF/lib/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/8213/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 167 -&amp;gt; /opt/CPrt-R80.40/jars/log4j-1.2.15.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 70 -&amp;gt; /opt/CPrt-R80.40/jars/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/8238/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 135 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 137 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 231 -&amp;gt; /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8082-smartview.war-_smartview-any-/webapp/WEB-INF/lib/log4j-1.2.15.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 242 -&amp;gt; /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8082-smartview.war-_smartview-any-/webapp/WEB-INF/lib/slf4j-log4j12-1.7.6.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 361 -&amp;gt; /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8084-smartview-service.war-_smartview-any-/webapp/WEB-INF/lib/log4j-1.2.15.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 370 -&amp;gt; /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8084-smartview-service.war-_smartview-any-/webapp/WEB-INF/lib/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/8724/fd/ | grep log4j&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/14275/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 183 -&amp;gt; /opt/CPsuite-R80.40/fw1/cpm-server/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 13 23:30 243 -&amp;gt; /opt/CPsuite-R80.40/fw1/cpm-server/log4j-1.2.15.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/17841/fd/ | grep log4j&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/17843/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 cp_extensions bin 64 Dec 14 10:52 90 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;lr-x------. 1 cp_extensions bin 64 Dec 14 10:52 92 -&amp;gt; /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# ls -l /proc/20666/fd/ | grep log4j&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 129 -&amp;gt; /opt/CPsuite-R80.40/fw1/Solr/solr-webapp/webapp/WEB-INF/lib/log4j-1.2.16.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 81 -&amp;gt; /opt/CPsuite-R80.40/fw1/Solr/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;lr-x------. 1 admin root 64 Dec 14 10:52 83 -&amp;gt; /opt/CPsuite-R80.40/fw1/Solr/lib/ext/slf4j-log4j12-1.7.6.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# lsof | grep log4j&lt;BR /&gt;java 2595 admin 92r REG 253,0 481535 117574685 /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;java 2595 admin 94r REG 253,0 9711 117574687 /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;java 7864 admin 194r REG 253,0 9753 295479 /opt/CPsuite-R80.40/fw1/cpm-server/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;java 7864 admin 254r REG 253,0 391834 295473 /opt/CPsuite-R80.40/fw1/cpm-server/log4j-1.2.15.jar&lt;BR /&gt;java 8195 admin 125r REG 253,0 9753 168344187 /opt/CPrt-R80.40/jars/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;java 8195 admin 214r REG 253,0 391834 168344157 /opt/CPrt-R80.40/jars/log4j-1.2.15.jar&lt;BR /&gt;java 8195 admin 234r REG 253,0 481535 117574685 /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;java 8195 admin 236r REG 253,0 9711 117574687 /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;java 8195 admin 273r REG 253,0 481535 33579560 /opt/CPrt-R80.40/tmp/solr-webapp/webapp/WEB-INF/lib/log4j-1.2.16.jar&lt;BR /&gt;java 8195 admin 647r REG 253,0 396624 34167338 /opt/CPrt-R80.40/tmp/log_indexer_proxy-webapp/webapp/WEB-INF/lib/log4j-1.2.15.jar&lt;BR /&gt;java 8195 admin 651r REG 253,0 10023 34167342 /opt/CPrt-R80.40/tmp/log_indexer_proxy-webapp/webapp/WEB-INF/lib/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;java 8213 admin 70r REG 253,0 9753 168344187 /opt/CPrt-R80.40/jars/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;java 8213 admin 167r REG 253,0 391834 168344157 /opt/CPrt-R80.40/jars/log4j-1.2.15.jar&lt;BR /&gt;java 8238 admin 135r REG 253,0 481535 117574685 /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;java 8238 admin 137r REG 253,0 9711 117574687 /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;java 8238 admin 231r REG 253,0 396624 67270368 /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8082-smartview.war-_smartview-any-/webapp/WEB-INF/lib/log4j-1.2.15.jar&lt;BR /&gt;java 8238 admin 242r REG 253,0 9139 67270380 /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8082-smartview.war-_smartview-any-/webapp/WEB-INF/lib/slf4j-log4j12-1.7.6.jar&lt;BR /&gt;java 8238 admin 361r REG 253,0 396624 185026096 /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8084-smartview-service.war-_smartview-any-/webapp/WEB-INF/lib/log4j-1.2.15.jar&lt;BR /&gt;java 8238 admin 370r REG 253,0 10023 185026105 /opt/CPrt-R80.40/tmp/jetty-127.0.0.1-8084-smartview-service.war-_smartview-any-/webapp/WEB-INF/lib/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;java 14275 admin 183r REG 253,0 9753 295479 /opt/CPsuite-R80.40/fw1/cpm-server/slf4j-log4j12-1.6.1.jar&lt;BR /&gt;java 14275 admin 243r REG 253,0 391834 295473 /opt/CPsuite-R80.40/fw1/cpm-server/log4j-1.2.15.jar&lt;BR /&gt;java 17843 cp_extensions 90r REG 253,0 481535 117574685 /opt/CPshrd-R80.40/jetty/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;java 17843 cp_extensions 92r REG 253,0 9711 117574687 /opt/CPshrd-R80.40/jetty/lib/ext/slf4j-log4j12-1.6.6.jar&lt;BR /&gt;java 20666 admin 81r REG 253,0 481535 201367044 /opt/CPsuite-R80.40/fw1/Solr/lib/ext/log4j-1.2.16.jar&lt;BR /&gt;java 20666 admin 83r REG 253,0 8869 201367046 /opt/CPsuite-R80.40/fw1/Solr/lib/ext/slf4j-log4j12-1.7.6.jar&lt;BR /&gt;java 20666 admin 129r REG 253,0 481535 134561293 /opt/CPsuite-R80.40/fw1/Solr/solr-webapp/webapp/WEB-INF/lib/log4j-1.2.16.jar&lt;BR /&gt;&lt;BR /&gt;[Expert@SMS-Example:0]# lsof | grep log4j-core-2.12.0.jar&lt;/PRE&gt;
&lt;/LI-SPOILER&gt;</description>
    <pubDate>Tue, 14 Dec 2021 10:25:35 GMT</pubDate>
    <dc:creator>Tobias_Moritz</dc:creator>
    <dc:date>2021-12-14T10:25:35Z</dc:date>
    <item>
      <title>CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136003#M24314</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;
&lt;P&gt;I guess most of you have already seen the fresh CVE-2021-44228 - Log4j vulnerability - Log4Shell and thought about the impact it will have in the enterprise application landscape.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-44228&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/" target="_blank" rel="noopener"&gt;https://www.lunasec.io/docs/blog/log4j-zero-day/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Maybe we can use this thread to get a first statement from Check Point regarding their products (and later links to SKs) as well as discuss (probably IPS) mitigations.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 12:54:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136003#M24314</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-12-10T12:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136006#M24315</link>
      <description>&lt;P&gt;Checking&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 12:57:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136006#M24315</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-12-10T12:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136023#M24319</link>
      <description>&lt;P&gt;Is there any update on this ? I have already seen the exploit being used in the wild. When an attack does try to use the exploit inside a http header the ips blade of checkpoint does flag this as a "http headers remote code execution" protection so it might be a good idea to enable this.&lt;BR /&gt;There are a lot of reports of high profile companies that are vulnerable for this exploit&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/YfryTchsGD/Log4jAttackSurface" target="_blank" rel="noopener"&gt;https://github.com/YfryTchsGD/Log4jAttackSurface&lt;/A&gt;&lt;/P&gt;&lt;P&gt;i hope we will get good news from checkpoint asap.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 16:57:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136023#M24319</guid>
      <dc:creator>warheart6</dc:creator>
      <dc:date>2021-12-10T16:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136024#M24320</link>
      <description>&lt;P&gt;It does take time to investigate and come up with a comprehensive response. Please be patient, thanks&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 17:09:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136024#M24320</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-12-10T17:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136025#M24321</link>
      <description>&lt;P&gt;I would assume priority will be looking at patching requirements since log4j is used on Management/Gateways by Solr and postgresql&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 17:13:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136025#M24321</guid>
      <dc:creator>Alex_Lewis</dc:creator>
      <dc:date>2021-12-10T17:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136026#M24322</link>
      <description>&lt;P&gt;I doubt log4j is used on the gateway side (except for standalone deployments)..., but I could be wrong there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit:&amp;nbsp;&lt;SPAN&gt;sk176865 confirms this doubt... It's only used on the management side by management processes. And not vulnerable.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 11:37:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136026#M24322</guid>
      <dc:creator>_Jelle</dc:creator>
      <dc:date>2021-12-11T11:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136028#M24323</link>
      <description>&lt;P&gt;I also doubt it is used on gateway, but the log4j jar files do exist there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 17:49:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136028#M24323</guid>
      <dc:creator>Alex_Lewis</dc:creator>
      <dc:date>2021-12-10T17:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136039#M24325</link>
      <description>&lt;P&gt;1. The IPS signature is available right NOW!&lt;/P&gt;
&lt;P&gt;2. sk176865 is the Check Point response to Apache Log4j Remote Code Execution (CVE-2021-44228) accessible here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:36:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136039#M24325</guid>
      <dc:creator>XavierBens</dc:creator>
      <dc:date>2021-12-10T21:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136040#M24326</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865&amp;amp;partition=General&amp;amp;product=IPS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:44:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136040#M24326</guid>
      <dc:creator>Kevin_Tobin</dc:creator>
      <dc:date>2021-12-10T21:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136041#M24327</link>
      <description>&lt;P&gt;Thanks for getting the protection out so soon. Will this also work for HTTPS connections when there is no HTTPS inspection active on the firewall for this incoming traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:46:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136041#M24327</guid>
      <dc:creator>Ewald_Beekman</dc:creator>
      <dc:date>2021-12-10T21:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136042#M24328</link>
      <description>&lt;P&gt;Does the Apache mitigation (patch and command line option) apply to Checkpoint Software as well?&lt;/P&gt;&lt;P&gt;Is checkpoint sofware itself vounrable?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:50:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136042#M24328</guid>
      <dc:creator>haakonr</dc:creator>
      <dc:date>2021-12-10T21:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136046#M24329</link>
      <description>&lt;P&gt;For me, the most important part is still missing. Starting from R80.40, Endpoint Management seems to use log4j 2.12, which is vulnerable. Depending on your setup (or if you have an EPM as MaaS) that may be vulnerable. Starting with R81 SOLR also uses log4j 2. What's the impact on Check Point's own products?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 23:44:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136046#M24329</guid>
      <dc:creator>Axel_Engeland</dc:creator>
      <dc:date>2021-12-10T23:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136054#M24330</link>
      <description>&lt;P&gt;Before we update the SK with full details, we have to check a number of products/features to ensure they are not vulnerable.&lt;BR /&gt;At least management wise, we are not using log4j in a way that is vulnerable to this exploit.&lt;BR /&gt;That said, we'll upgrade log4j most likely as part of the JHF.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 07:13:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136054#M24330</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-11T07:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136056#M24332</link>
      <description>&lt;P&gt;This ain't going to be fun. Already at home I found 4 instances of log4j and I haven't even started analysing docker containers or appliances.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 08:23:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136056#M24332</guid>
      <dc:creator>Martin_Seeger</dc:creator>
      <dc:date>2021-12-11T08:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136063#M24333</link>
      <description>&lt;P&gt;As far as I see sk176865 is now fully updated and no vulnerabilities have been found. That's a relieve. Thanks for the hard work!&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 10:42:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136063#M24333</guid>
      <dc:creator>Axel_Engeland</dc:creator>
      <dc:date>2021-12-11T10:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136064#M24334</link>
      <description>&lt;P&gt;Hi, thanks for all the hard work. Can you confirm that the IPS protection will work even when the incoming traffic is HTTPS and there is no HTTPS traffic inspection active on the firewall? Or will it only help us with HTTP in that scenario?&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 10:51:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136064#M24334</guid>
      <dc:creator>Ewald_Beekman</dc:creator>
      <dc:date>2021-12-11T10:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136065#M24335</link>
      <description>&lt;P&gt;I think it doesn't work as I tested the example scripts that are on Github and the IPS didn't do anything (we don't have any HTTP hosts around). The question is if the protection applies on the incoming request itself or after the response of the vulnerable system. I couldn't validate that as we haven't found any system that seems to be vulnerable.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 11:07:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136065#M24335</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2021-12-11T11:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136068#M24336</link>
      <description>&lt;P&gt;From&amp;nbsp;&lt;SPAN&gt;sk176865:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;Check Point Products Status&lt;/H3&gt;
&lt;TABLE class="footnote" border="1" width="50%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR class="SubTitle" align="center" bgcolor="#f7f5f5"&gt;
&lt;TD width="55%"&gt;Product&lt;/TD&gt;
&lt;TD width="45%"&gt;Status&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Quantum Security Gateway&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Quantum Security Management&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;CloudGuard&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Infinity Portal&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Harmony Endpoint &amp;amp; Harmony Mobile&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;SMB&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;ThreatCloud&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Not vulnerable&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 14 Dec 2021 09:43:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136068#M24336</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-12-14T09:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136075#M24339</link>
      <description>&lt;P&gt;I would also appreciate a response from Check Point to the question if the IPS signature will work when not using HTTPS traffic inspection.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 15:11:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136075#M24339</guid>
      <dc:creator>PatrickJ</dc:creator>
      <dc:date>2021-12-11T15:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44228 - Log4j vulnerability - Log4Shell</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136082#M24341</link>
      <description>&lt;P&gt;Assuming I'm understanding the attack technique correctly, if the initial exploit is delivered inside an HTTPS connection, that delivery takes place well after the HTTPS negotiation and both sides have started encryption; pretty sure there is going to be no way to detect that stage via IPS unless HTTPS Inspection is enabled.&lt;/P&gt;
&lt;P&gt;However when the vulnerable server is tricked into retrieving the Java class to be injected via JNDI using a ldap://1.2.3.4/ URL that will be in the clear, and perhaps can be detected by the IPS signature if it is configured to do so.&amp;nbsp; Gets more murky if ldaps://1.2.3.4/ is used in the exploit, but I don't think that will work since JNDI will probably not trust the certificate of the attacker's system and the ldaps connection will fail to deliver the injected content.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 22:51:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2021-44228-Log4j-vulnerability-Log4Shell/m-p/136082#M24341</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-12-11T22:51:48Z</dc:date>
    </item>
  </channel>
</rss>

