SugarCRM Information Regarding Log4j Vulnerability

Like many software companies around the world, SugarCRM recently became aware of a critical vulnerability in the Log4j software developed by Apache Software Foundation, which is generally used in web server applications. The zero-day attack exploiting Log4j software versions 2.0 to 2.14.1 is being referred to as CVE-2021-44228 or "Log4Shell." We quickly identified and remediated our affected systems by December 13, 2021. Based on our investigation, we have not detected that our web-based services were negatively affected by the exploit.

The SugarCRM Security Team continues to monitor the situation and we are ready to react appropriately to any intelligence about this vulnerability. In addition, measures designed to detect and prevent any attempted activity related to this vulnerability have been implemented by our organization. We will continue to keep our customers informed by way of email, if necessary.

On Premises customers should evaluate any technology stacks running SugarCRM products to ensure no vulnerabilities exist. Customers are encouraged to upgrade Elastic Search to at least the remediated version 7.16.1.

For further information about the vulnerability please visit these links, or search for CVE 2021-44228:

The SugarCRM Security Team

Parents
  • Several software components inside of the SugarCRM cloud platform were vulnerable to the log4j vulnerability, however, no client or public facing systems were vulnerable. To be clear, the SugarCRM platform did NOT have any publicly facing infrastructure that was vulnerable, and immediate and continuous monitoring of the environment has shown no attempts or compromises of previously vulnerable software components.

    All known configurations, patches, and remediations were in place by December 13th, and all continuously released log4j patches or remediations are tested and put in place as they become available from 3rd parties.

Comment
  • Several software components inside of the SugarCRM cloud platform were vulnerable to the log4j vulnerability, however, no client or public facing systems were vulnerable. To be clear, the SugarCRM platform did NOT have any publicly facing infrastructure that was vulnerable, and immediate and continuous monitoring of the environment has shown no attempts or compromises of previously vulnerable software components.

    All known configurations, patches, and remediations were in place by December 13th, and all continuously released log4j patches or remediations are tested and put in place as they become available from 3rd parties.

Children
No Data