Important information regarding Log4Shell (Log4j)
2021-12-21
The Log4Shell vulnerability - CVE-2021-44228 - allows remote code execution through the Apache Log4j logging library, specifically versions 2.0–2.14. Log4j 2.0 was released on 2014-07-12, earlier versions are not affected by this exploit.
Log4j is a library used in Java-based applications.
None of the currently supported HMI- or BoX2 products offered by Beijer Electronics are based on Java, and are therefore not affected by CVE-2021-44228.
None of the following Beijer Electronics products are affected:
- acirro+
- BFI frequency inverters
- BSD servo drives
- CloudVPN
- FnIO-G and M Distributed IO
- iX Developer
- Nexto modular PLC
- Nexto Xpress compact controller
- WARP Engineering Studio
None of the currently supported Korenix products are affected by CVE-2021-44228:
- JetNet and JetWave products do not use Java
- JetCon, JetPort, Korenix View and NMS are not affected by CVE-2021-44228
Log4j is a library used in Java-based applications.
None of the currently supported HMI- or BoX2 products offered by Beijer Electronics are based on Java, and are therefore not affected by CVE-2021-44228.
None of the following Beijer Electronics products are affected:
- acirro+
- BFI frequency inverters
- BSD servo drives
- CloudVPN
- FnIO-G and M Distributed IO
- iX Developer
- Nexto modular PLC
- Nexto Xpress compact controller
- WARP Engineering Studio
None of the currently supported Korenix products are affected by CVE-2021-44228:
- JetNet and JetWave products do not use Java
- JetCon, JetPort, Korenix View and NMS are not affected by CVE-2021-44228