

OpenText has implemented the required Intrusion Prevention System (IPS) signatures at an ingress layer to block malicious traffic resulting from a Log4j CVE-2021-44228 vulnerability.
#Tableau reader log4j software#
You should expect future patches from many software companies including OpenText through our standard processes. OpenText is continually reassessing our products and services based on newly available information. If the updates to Log4j came via a patch/fix provided by OpenText, please continue to monitor the product specific knowledge base articles below for updates. In general, if the remediation steps already followed involved replacing the Log4j versions with 2.16 or 2.17, it is recommended repeating these steps using Log4j 2.17.1.
#Tableau reader log4j full#
OpenText is currently utilizing Log4j version 2.17.x in our full remediation strategy.Īs the situation continues to evolve, customers with OpenText products deployed in their environments may also need to go back and adjust already implemented controls and fixes. With each new disclosure, OpenText has adjusted mitigation and remediation responses.

OpenText immediately began to remediate our products. CVE-2021-44228 has a CVSS score of 10, the most critical rating. On December 10th, NIST published information about a vulnerability affecting Log4j, an extremely popular Java logging utility. OpenText is aware of the reported Log4j vulnerabilities.
