Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Log4 versions used in Powerchute vulnerable?

APC UPS Data Center & Enterprise Solutions Forum

Schneider, APC support forum to share knowledge about installation and configuration for Data Center and Business Power UPSs, Accessories, Software, Services.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results forΒ 
ShowΒ Β onlyΒ  | Search instead forΒ 
Did you mean:Β 
  • Home
  • Schneider Electric Community
  • APC UPS, Critical Power, Cooling and Racks
  • APC UPS Data Center & Enterprise Solutions Forum
  • Log4 versions used in Powerchute vulnerable?
Options
  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Bookmark
  • Subscribe
  • Mute
  • Printer Friendly Page
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Experts
User Count
BillP
Administrator BillP Administrator
5060
voidstar_apc
Janeway voidstar_apc
196
Erasmus_apc
Sisko Erasmus_apc
112
TheNotoriousKMP_apc
Sisko TheNotoriousKMP_apc
108
View All

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Solved Go to Solution
Back to APC UPS Data Center & Enterprise Solutions Forum
Solved
absoblogginlutely
Ensign absoblogginlutely
Ensign

Posted: β€Ž2021-12-11 12:04 PM

3 Likes
39
37128
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-11 12:04 PM

Log4 versions used in Powerchute vulnerable?

It looks like the log4j files included in Powerchute may be vulnerable to the log4shell vulnerability

C:\Program Files\APC\PowerChute>dir *log*.jar /b/s/l
c:\program files\apc\powerchute\group1\lib\commons-logging-1.1.1.jar
c:\program files\apc\powerchute\group1\lib\log4j-api-2.10.0.jar
c:\program files\apc\powerchute\group1\lib\log4j-core-2.10.0.jar
c:\program files\apc\powerchute\group1\lib\log4j-slf4j-impl-2.10.0.jar

 

Can anybody confirm and provide any necessary patches/instructions to update

It would also be good to add an official statement to the reddit post at https://www.reddit.com/r/msp/comments/rdba36/critical_rce_vulnerability_is_affecting_java/

Labels
  • Labels:
  • UPS Management Devices & PowerChute Software
  • Tags:
  • CVE-2021-44228
  • english
  • log4j
  • security
Reply

Link copied. Please paste this link to share this article on your social media post.

  • All forum topics
  • Previous Topic
  • Next Topic

Accepted Solutions
BillP
Administrator BillP Administrator
Administrator

Posted: β€Ž2021-12-15 06:28 AM . Last Modified: β€Ž2021-12-16 03:42 PM

In response to Pat
1 Like
25
31339
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 06:28 AM . Last Modified: β€Ž2021-12-16 03:42 PM

Updating this post with SE security bulletin.

 

To mitigate Apache Log4j Vulnerability (Log4Shell) in PowerChute follow the instruction is linked security bulletin. 

 

https://www.se.com/ww/en/download/document/SESB-2021-347-01/

See Answer In Context

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

Replies 39
tqueenan
tqueenan
Cadet

Posted: β€Ž2021-12-12 01:12 PM

0 Likes
0
37028
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-12 01:12 PM

I too can confirm.

 

PowerChute Business Edition 10.0.2.301

 

C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib\log4j-core-2.11.1.jar
C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib\log4j-core-2.11.1.jar

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

Pat
Crewman Pat
Crewman

Posted: β€Ž2021-12-13 12:24 AM

0 Likes
2
36789
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-13 12:24 AM

Can someone provide more info about this.

Fixes, Statements, Patches etc.. ?

 

Or does someone know if something like this is possible and where:

-Dlog4j2.formatMsgNoLookups=true
  • Tags:
  • english
  • LOG4JS
  • vulnerability
Reply

Link copied. Please paste this link to share this article on your social media post.

mbmiura
mbmiura
Cadet

Posted: β€Ž2021-12-13 09:28 AM

In response to Pat
0 Likes
1
35538
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-13 09:28 AM

Powerchute Remote Shutdown 4.3 contains affected versions as well:

/opt/APC/PowerChute/group1/lib/log4j-core-2.10.0.jar
/opt/APC/PowerChute/group1/lib/log4j-api-2.10.0.jar
/opt/APC/PowerChute/group1/lib/log4j-slf4j-impl-2.10.0.jar
/opt/APC/PowerChute/group1/log4j2.xml

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

HenryA
HenryA
Cadet

Posted: β€Ž2021-12-13 10:17 AM

0 Likes
0
35462
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-13 10:17 AM

It's probably worth fire-walling port 6547 regardless.  At least that's the port for Business Edition 9.5, not sure about other versions.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

mbmiura
mbmiura
Cadet

Posted: β€Ž2021-12-14 07:35 AM

In response to mbmiura
0 Likes
0
33484
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-14 07:35 AM

As my version was between 2.0 and 2.10, I removed the JndiLookup.class from the jar

 

zip -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

Pat
Crewman Pat
Crewman

Posted: β€Ž2021-12-14 09:15 AM

0 Likes
29
33232
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-14 09:15 AM

According to this:

https://github.com/NCSC-NL/log4shell/blob/main/software/README.md

 

If you Upgrade to 10.0.4 you should be fine. πŸ‘

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

NSDit
NSDit
Cadet

Posted: β€Ž2021-12-14 09:29 AM

In response to Pat
0 Likes
28
33215
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-14 09:29 AM

Where do you see anything saying 10.0.4 is ok on the link your provided?

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

Pat
Crewman Pat
Crewman

Posted: β€Ž2021-12-14 02:36 PM

In response to NSDit
0 Likes
27
32781
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-14 02:36 PM

APCPowerChute Business EditionUnknow to 10.0.2.301Vulnerable

 

Hm yeah maybe youre right...

I was a bit to fast but here i guess it says from version Unknown to 10.0.2.301 is vulnerable.

So i thought version 10.0.4 should be fine.

 

Tomorrow i try to install the new version on one of our test Servers and i will look for the Log4 Version.

I keep you up to date.

 

BTW:

I already have opened a ticket but the support is kind a missunderstanding the problem...

They just said thanks for sending us the info.

Someone else told em allready that they got hacked and he said to me theyr security team is allready on it πŸ˜…

 

I was asking them to give a solution or at least a clear statement, i not giving a hint for a hacking attack...

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

BillP
Administrator BillP Administrator
Administrator

Posted: β€Ž2021-12-15 06:28 AM . Last Modified: β€Ž2021-12-16 03:42 PM

In response to Pat
1 Like
25
31340
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 06:28 AM . Last Modified: β€Ž2021-12-16 03:42 PM

Updating this post with SE security bulletin.

 

To mitigate Apache Log4j Vulnerability (Log4Shell) in PowerChute follow the instruction is linked security bulletin. 

 

https://www.se.com/ww/en/download/document/SESB-2021-347-01/

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

absoblogginlutely
Ensign absoblogginlutely
Ensign

Posted: β€Ž2021-12-15 06:50 AM

In response to BillP
0 Likes
1
31258
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 06:50 AM

Thanks Bill, 

Thats the conclusion I came to yesterday when running some tests.

Are there plans to update Powerchute to include version 16 of Log4j?

 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

Pat
Crewman Pat
Crewman

Posted: β€Ž2021-12-15 07:01 AM . Last Modified: β€Ž2021-12-15 07:03 AM

In response to Pat
0 Likes
0
31227
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 07:01 AM . Last Modified: β€Ž2021-12-15 07:03 AM

I tested it and installed it on one of our test servers.

 

To shorten it up: It is not safe!

We are here on a newer log4j but still vulnerable.

Version 2.14.1

 

I guess best option is rly to just block the FW port or do that 7zip thing. -.-

 

BTW:

Still no answer from the support...

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

LarryK
Lt. Commander LarryK
Lt. Commander

Posted: β€Ž2021-12-15 07:05 AM

In response to BillP
1 Like
2
31205
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 07:05 AM

Bill,

 

I appreciate that you followed up so quickly on this matter, but I need some additional help.

 

The 7zip download is based in a data center Finland, which is Geo-IP blocked from all my client sites.  There is - and has been - no reason for any internet traffic to route there.

 

Second, this statement telling everyone to install and use a third-party software program on a Windows Server.  That's not something my clients will necessarily agree to.


So I'm caught between punching a hole through a client's firewall and using unsanctioned software to remove a problem - or asking, very politely, to have APC provide a less awkward solution.


Thanks!

Larry

 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

absoblogginlutely
Ensign absoblogginlutely
Ensign

Posted: β€Ž2021-12-15 07:58 AM

In response to LarryK
0 Likes
0
30967
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 07:58 AM

@LarryK Nearly all the remediations/patches for log4j require you to remove the class file from the jar file (which is a zip file) so you are going to need some sort of zip program on your machines to remedy the rest of your applications- not just Powerchute.

 

I would suggest downloading 7zip or hosting it internally so your clients can access. You mention client sites, so you are probably doing this via a RMM tool so you should be able to host the file on your server and then download via your rmm tool.

 

The alternative is to rename the file to .zip, extract the jar file using Explorer,  delete the class file and then zip the files back up again using explorer.

 

Of course the other solution is  to wait for a new version to come out. This will of course require a download at which point you are again downloading 3rd party software from the internet.

 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

Rvphilip
Rvphilip
Cadet

Posted: β€Ž2021-12-15 11:17 AM

0 Likes
0
30435
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 11:17 AM

I am using version 10.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4. is this vulnerable as well?

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

gsoyars
Crewman gsoyars
Crewman

Posted: β€Ž2021-12-15 12:05 PM

In response to BillP
0 Likes
10
30334
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 12:05 PM

I ran your instructions: 

 

         "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.11.1.jar JndiLookup.class -r 

 

and it seemed to process correctly.  But when I re-run Github's Log4f-finder.exe program, it still reports this file as a vulnerability.  Is that expected?

 

Results of Log4f-finder scan:

 

VULNERABLE: C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib\log4j-core-2.11.1.jar -> org\apache\logging\log4j\core\net\JndiManager.class [04fdd701809d17465c17c7e603b1b202: log4j 2.9.0 - 2.11.2]

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

gsoyars
Crewman gsoyars
Crewman

Posted: β€Ž2021-12-15 12:23 PM

In response to gsoyars
0 Likes
0
30282
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 12:23 PM

As a follow-up, I then updated to PC Business Edition 10.0.4, ran Log4f-finder.exe and it listed log4j-core-2.14.1.jar as vulnerable.  So I updated that JAR file, but Log4f-finder still says it's vulnerable.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

absoblogginlutely
Ensign absoblogginlutely
Ensign

Posted: β€Ž2021-12-15 12:30 PM

In response to gsoyars
1 Like
8
30260
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 12:30 PM

Based on https://blog.checkpoint.com/2021/12/11/protecting-against-cve-2021-44228-apache-log4j2-versions-2-14....

 

You need to remove the jndilookup.class and jndimanager.class file and not just JndiLookup.class to patch the vulnerability.

 

The other option (that i've not tested) would be to download 2.16 from https://www.apache.org/dyn/closer.lua/logging/log4j/2.16.0/apache-log4j-2.16.0-bin.zip

Extract and then copy log4j-core-2.16.0.jar into the C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib directory

delete log4j-core-2.14.1.jar from this directory.

 

My understanding is that the version number in the files doesn't matter to Java (but I could be wrong on this).

 

 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

gsoyars
Crewman gsoyars
Crewman

Posted: β€Ž2021-12-15 12:41 PM

In response to absoblogginlutely
0 Likes
3
30236
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 12:41 PM

Thanks!

 

Yep, after I also ran  "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiManager.class -r  , then Log4f-finder did not find any vulnerabilities.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

LarryK
Lt. Commander LarryK
Lt. Commander

Posted: β€Ž2021-12-15 12:41 PM

In response to absoblogginlutely
0 Likes
3
30234
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 12:41 PM

I like the full jar file replacement much more than the cut-and-paste approach.

 

I would test this, but I'm currently on hold with APC tech support for a problem I'm experiencing with PCNS following a server reboot this past weekend (its no longer talking to the NMC...).

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

absoblogginlutely
Ensign absoblogginlutely
Ensign

Posted: β€Ž2021-12-15 12:43 PM

In response to LarryK
1 Like
2
30225
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 12:43 PM

This sounds like a great time to test this as it can't get any worse right?

πŸ™‚

 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

LarryK
Lt. Commander LarryK
Lt. Commander

Posted: β€Ž2021-12-15 12:47 PM

In response to absoblogginlutely
0 Likes
1
30218
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 12:47 PM

Seriously...

 

What's the worse that could happen?  Support suggests reinstalling PCNS...

 

Once I get done with another remote support session with another vendor.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

gsoyars
Crewman gsoyars
Crewman

Posted: β€Ž2021-12-15 01:07 PM

In response to gsoyars
0 Likes
2
30189
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 01:07 PM

Just as another follow-up, on another server, I only ran  "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiManager.class -r  , then Log4f-finder did not report any vulnerabilities.    So I'm not sure if that means you don't have to update the JndiLookup.class , but I still did for good measure.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

LarryK
Lt. Commander LarryK
Lt. Commander

Posted: β€Ž2021-12-15 01:08 PM

In response to LarryK
0 Likes
0
30187
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 01:08 PM

While logical, simply exchanging the 2.16 for 2.13 did not work.

When starting PCNS after the replacement, the service fails to start - no error message.


Was definitely worth a shot.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

absoblogginlutely
Ensign absoblogginlutely
Ensign

Posted: β€Ž2021-12-15 01:13 PM

In response to gsoyars
0 Likes
1
30173
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 01:13 PM

Thats odd as removing JndiLookup.class is explicity mentioned at https://logging.apache.org/log4j/2.x/security.html on how to fix the issue.

 

Larry, - that's a shame 😞

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

RobLatour
Crewman RobLatour
Crewman

Posted: β€Ž2021-12-15 05:22 PM . Last Modified: β€Ž2021-12-16 09:19 AM

In response to absoblogginlutely
2 Likes
0
29700
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-15 05:22 PM . Last Modified: β€Ž2021-12-16 09:19 AM

I sent in a support request on the 12th but haven't heard back yet.

 

Did however also read this: 

https://isc.sans.edu/diary/rss/28134

 

Regardless, for better or worse, this is what I have done - not sure what evil it may cause - but anyway:

 

1. upgraded to the newest version of the Powerchute software

 

2. download the latest (v2.16) log4j file from here: https://logging.apache.org/log4j/2.x/download.html

 

3. extracted the three corresponding files that are used by pbe agent, namely:

log4-api-2.16.0.jar

log4-core-2.16.0.jar

log4-slf4j-2.16.0.jar

 

4. renamed them:

log4-api-2.14.1.jar

log4-core-2.14.1.jar

log4-slf4j-2.14.1.jar

 

5. stopped the apc pbe agent service

 

6. copied the renamed files from step 4 above to

C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib

 

7. started the apc pbe agent service

 

8. signed on, everything appeared to be working ok

 

Just sharing, don't know if you want to do this yourself - or if it would be of any help.

 

 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

BillP
Administrator BillP Administrator
Administrator

Posted: β€Ž2021-12-16 04:56 AM

In response to absoblogginlutely
1 Like
0
28166
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-16 04:56 AM

@absoblogginlutely 

 

Yes. The next releases of PCBE and PCNS will have updated log4j2. I'll post when I have release dates. 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

BillP
Administrator BillP Administrator
Administrator

Posted: β€Ž2021-12-16 05:04 AM

In response to LarryK
1 Like
0
28142
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-16 05:04 AM

@LarryK 

 

Noted. SE is working on an official document. I posted this as mentioned to offer a solution quickly. 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

MartinVelisek
MartinVelisek
Cadet

Posted: β€Ž2021-12-16 11:44 AM

In response to BillP
0 Likes
2
26751
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-16 11:44 AM

Hi,

I have installed version 10.0.4 of Powerchute Business Edition and in C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib, there is log4j-core-2.14.1.jar.

I dont understand this NOTE: For v10.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4 replace the text in bold with log4j-core-2.11.1.jar and for v9.5 replace this with log4j-core-2.2.jar.

What command should I run?

I think, that for PBE version 10.0.4 it should be: "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiLookup.class -r

Thank you and excuse my English πŸ™‚

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

gsoyars
Crewman gsoyars
Crewman

Posted: β€Ž2021-12-16 12:02 PM

In response to MartinVelisek
0 Likes
1
26714
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-16 12:02 PM

Hi Martin,

 

Yes, I also found that note confusing.  I think you are correct in your conclusion.  That's exactly what I ran after upgrading to v10.0.4.   

 

But I believe they are missing another statement that needs to be run to fully mitigate the vulnerability, so I believe you also need to run this:  "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiManager.class -r

 

If you use Github's Fox-it Log4j-finder.exe program (https://github.com/fox-it/log4j-finder ),  it will keep reporting a vulnerability on that JAR file until you also fix the JndiManager.class section.

 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

MartinVelisek
MartinVelisek
Cadet

Posted: β€Ž2021-12-16 12:59 PM

In response to gsoyars
0 Likes
0
26597
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-16 12:59 PM

Hi gsoyars,

 

     exactly as you wrote. I used Log4j-finder.exe, too  and the same result as you 😞 

 

Overall, the solution is still quite confusing.....

I hope, they will update PBE as soon as possible.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

NRamirez
NRamirez
Cadet

Posted: β€Ž2021-12-20 09:21 AM

In response to BillP
0 Likes
0
22339
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-20 09:21 AM

I was able to finally run this on our Linux PCNS device, however Tenable still reports this as being vulnerable do it being on an outdated 2.10 version of log4j. 

 

If I did not receive any errors when running the commands should I be concerned about this? 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

cbacct
cbacct
Cadet

Posted: β€Ž2021-12-22 05:33 AM

0 Likes
2
19703
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-22 05:33 AM

Powershell script which fixes issue with current version of Business Edition and Network shutdown.

https://github.com/chaimblack/CyberSecurity/tree/main/Log4Shell

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

LarryK
Lt. Commander LarryK
Lt. Commander

Posted: β€Ž2021-12-22 07:28 AM

In response to cbacct
0 Likes
0
19538
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-22 07:28 AM

This is the simplistic solution I was looking for (albeit a week after I took some very manual steps to remediate).

Good to have for other, possibly less nefarious, problems in the future.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

RobLatour
Crewman RobLatour
Crewman

Posted: β€Ž2021-12-22 08:12 AM

In response to cbacct
0 Likes
0
19452
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-22 08:12 AM

+1

Thanks for posting CBacct

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

bb9193
bb9193
Cadet

Posted: β€Ž2021-12-28 06:07 PM

In response to BillP
0 Likes
0
16926
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2021-12-28 06:07 PM

I am also seeing after running the commands posted by APC that log4j-core-2.11.1.jar is still being flagged as vulnerable.  These steps appear to be incomplete.

 

APC, please advise.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

bb9193
bb9193
Cadet

Posted: β€Ž2022-01-03 05:55 AM

In response to BillP
0 Likes
3
16041
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2022-01-03 05:55 AM

This solution in incomplete.  Please advise.

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

BillP
Administrator BillP Administrator
Administrator

Posted: β€Ž2022-01-04 04:45 AM

In response to bb9193
0 Likes
2
15528
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2022-01-04 04:45 AM

Hi,

 

We have posted an FAQ that includes scripts to correct the vulnerability.

https://www.se.com/ww/en/faqs/FAQ000229596/

 

You may see that PowerChute is flagged as vulnerable after running the scripts. It is being flagged because the version number has not been updated. 

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

LarryK
Lt. Commander LarryK
Lt. Commander

Posted: β€Ž2022-01-04 06:29 AM

In response to BillP
0 Likes
1
15435
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2022-01-04 06:29 AM

Seeking clarification of this statement:

 

Change directory to the location where you extracted the files and move to the Windows folder,

 

Opening an elevated Command prompt (which is explained in detail) places you in C:\Windows\system32.

 

The first part of the sentence says to "cd" to the folder with the extracted download.  But I don't know what you mean by "move to the Windows folder".  Do you mean to "cd" back to the starting location?


Thanks!

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

BillP
Administrator BillP Administrator
Administrator

Posted: β€Ž2022-01-07 06:53 AM

In response to LarryK
0 Likes
0
14183
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: β€Ž2022-01-07 06:53 AM

@LarryK 

 

Change directory to the location type run_mitigation.cmd and press return to execute the log4jMitigation.ps1 file.

 

I will ask the tech writers to remove 

 "and move to the Windows folder,"

  • Tags:
  • english
Reply

Link copied. Please paste this link to share this article on your social media post.

Preview Exit Preview

never-displayed

You must be signed in to add attachments

never-displayed

Β 
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings Β© 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of