{"id":9345,"date":"2021-12-21T11:44:23","date_gmt":"2021-12-21T11:44:23","guid":{"rendered":"http:\/\/192.168.100.222\/?p=9345"},"modified":"2023-04-06T06:16:34","modified_gmt":"2023-04-06T06:16:34","slug":"callisto-is-not-affected-by-log4j-vulnerability","status":"publish","type":"post","link":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/","title":{"rendered":"Callisto is not affected by Log4j vulnerability"},"content":{"rendered":"<p>A vulnerability in the Log4j-core Java library was found in early December 2021, which allows hackers to potentially access servers remotely and execute arbitrary code, in other words: taking control of a server. Within the Java environment, the Log4j software module is extensively used, as it\u2019s one of many building blocks that are used in many organizations to create software nowadays.<br \/>\r\nIt\u2019s a race against time to have everything under control; update your software, check for new vulnerabilities in your organisation\u2026.<\/p>\r\n<h3><strong>How to prevent and what to do?<\/strong><\/h3>\r\n<p>Check the list of vulnerable software and update to the latest version of Log4j. Contact your software vendors. Vendors like CTModule, which fortunately, can confirm that we are not affected by this vulnerability. Additionally, we suggest to following the advice of Apache, which recommends updating to 2.17.1 immediately. You can find the latest Log4j apache security updates at: <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\">https:\/\/logging.apache.org\/log4j\/2.x\/security.html<\/a><\/p>\r\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-9354\" src=\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/log4j-image-300x203.jpg\" alt=\"\" width=\"585\" height=\"396\" srcset=\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/log4j-image-300x203.jpg 300w, https:\/\/www.ctmodule.com\/wp-content\/uploads\/log4j-image-150x101.jpg 150w, https:\/\/www.ctmodule.com\/wp-content\/uploads\/log4j-image-768x519.jpg 768w, https:\/\/www.ctmodule.com\/wp-content\/uploads\/log4j-image-1024x692.jpg 1024w, https:\/\/www.ctmodule.com\/wp-content\/uploads\/log4j-image.jpg 1204w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/>\r\n<p>Source: <a href=\"https:\/\/www.govcert.ch\/blog\/zero-day-exploit-targeting-popular-java-library-log4j\/\">GovCERT.ch<\/a><\/p>\r\n<h3><strong>What next?<\/strong><\/h3>\r\n<p>We know that simply updating Log4j may not resolve issues if your company is already compromised. Therefore, we recommend to continuously investigating activity in your environment, and act in accordance to reduce exposure. Experience tells us not to let our guard down, this is why CTModule will continue to actively monitor the situation and inform our partners about any possible evidence in our systems.<\/p>\r\n<p>This is again a clear wake-up call for regulatory institutions and organizations to stay tuned and keep the security level on the highest priority.<\/p>","protected":false},"excerpt":{"rendered":"<p>A vulnerability in the log4j-core Java library was found in early December 2021, which allows hackers to potentially access servers remotely and execute arbitrary code, in other words: taking control of a server. Within the Java environment, the Log4j software module is extensively used, as it\u2019s one of many building blocks that are used in many organizations to create software nowadays.<\/p>\n","protected":false},"author":4,"featured_media":11186,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Callisto is not affected by Log4j vulnerability &#8211; CTModule<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Callisto is not affected by Log4j vulnerability\" \/>\n<meta property=\"og:description\" content=\"A vulnerability in the log4j-core Java library was found in early December 2021, which allows hackers to potentially access servers remotely and execute arbitrary code, in other words: taking control of a server. Within the Java environment, the Log4j software module is extensively used, as it\u2019s one of many building blocks that are used in many organizations to create software nowadays.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"CTModule\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-21T11:44:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-06T06:16:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1404\" \/>\n\t<meta property=\"og:image:height\" content=\"936\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tania Barbeito\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CtModule\" \/>\n<meta name=\"twitter:site\" content=\"@CtModule\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tania Barbeito\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/\"},\"author\":{\"name\":\"Tania Barbeito\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/#\/schema\/person\/56c75b9308ad2448145bc127b226d7cb\"},\"headline\":\"Callisto is not affected by Log4j vulnerability\",\"datePublished\":\"2021-12-21T11:44:23+00:00\",\"dateModified\":\"2023-04-06T06:16:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/\"},\"wordCount\":261,\"publisher\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png\",\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/\",\"url\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/\",\"name\":\"Callisto is not affected by Log4j vulnerability &#8211; CTModule\",\"isPartOf\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png\",\"datePublished\":\"2021-12-21T11:44:23+00:00\",\"dateModified\":\"2023-04-06T06:16:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png\",\"contentUrl\":\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png\",\"width\":1404,\"height\":936,\"caption\":\"Log4J\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ctmodule.com\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Callisto is not affected by Log4j vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/#website\",\"url\":\"https:\/\/www.ctmodule.com\/en\/\",\"name\":\"CTModule\",\"description\":\"Communication Technology Modules\",\"publisher\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ctmodule.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/#organization\",\"name\":\"CTModule AG\",\"alternateName\":\"CTModule\",\"url\":\"https:\/\/www.ctmodule.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/ctmodule.png\",\"contentUrl\":\"https:\/\/www.ctmodule.com\/wp-content\/uploads\/ctmodule.png\",\"width\":696,\"height\":696,\"caption\":\"CTModule AG\"},\"image\":{\"@id\":\"https:\/\/www.ctmodule.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CtModule\",\"https:\/\/www.linkedin.com\/company\/ctmodule\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ctmodule.com\/en\/#\/schema\/person\/56c75b9308ad2448145bc127b226d7cb\",\"name\":\"Tania Barbeito\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Callisto is not affected by Log4j vulnerability &#8211; CTModule","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/","og_locale":"en_GB","og_type":"article","og_title":"Callisto is not affected by Log4j vulnerability","og_description":"A vulnerability in the log4j-core Java library was found in early December 2021, which allows hackers to potentially access servers remotely and execute arbitrary code, in other words: taking control of a server. Within the Java environment, the Log4j software module is extensively used, as it\u2019s one of many building blocks that are used in many organizations to create software nowadays.","og_url":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/","og_site_name":"CTModule","article_published_time":"2021-12-21T11:44:23+00:00","article_modified_time":"2023-04-06T06:16:34+00:00","og_image":[{"width":1404,"height":936,"url":"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png","type":"image\/png"}],"author":"Tania Barbeito","twitter_card":"summary_large_image","twitter_creator":"@CtModule","twitter_site":"@CtModule","twitter_misc":{"Written by":"Tania Barbeito","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/"},"author":{"name":"Tania Barbeito","@id":"https:\/\/www.ctmodule.com\/en\/#\/schema\/person\/56c75b9308ad2448145bc127b226d7cb"},"headline":"Callisto is not affected by Log4j vulnerability","datePublished":"2021-12-21T11:44:23+00:00","dateModified":"2023-04-06T06:16:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/"},"wordCount":261,"publisher":{"@id":"https:\/\/www.ctmodule.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/","url":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/","name":"Callisto is not affected by Log4j vulnerability &#8211; CTModule","isPartOf":{"@id":"https:\/\/www.ctmodule.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png","datePublished":"2021-12-21T11:44:23+00:00","dateModified":"2023-04-06T06:16:34+00:00","breadcrumb":{"@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#primaryimage","url":"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png","contentUrl":"https:\/\/www.ctmodule.com\/wp-content\/uploads\/AdobeStock_230395689-e1664281045206.png","width":1404,"height":936,"caption":"Log4J"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ctmodule.com\/en\/callisto-is-not-affected-by-log4j-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ctmodule.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Callisto is not affected by Log4j vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.ctmodule.com\/en\/#website","url":"https:\/\/www.ctmodule.com\/en\/","name":"CTModule","description":"Communication Technology Modules","publisher":{"@id":"https:\/\/www.ctmodule.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ctmodule.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ctmodule.com\/en\/#organization","name":"CTModule AG","alternateName":"CTModule","url":"https:\/\/www.ctmodule.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ctmodule.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ctmodule.com\/wp-content\/uploads\/ctmodule.png","contentUrl":"https:\/\/www.ctmodule.com\/wp-content\/uploads\/ctmodule.png","width":696,"height":696,"caption":"CTModule AG"},"image":{"@id":"https:\/\/www.ctmodule.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CtModule","https:\/\/www.linkedin.com\/company\/ctmodule"]},{"@type":"Person","@id":"https:\/\/www.ctmodule.com\/en\/#\/schema\/person\/56c75b9308ad2448145bc127b226d7cb","name":"Tania Barbeito"}]}},"_links":{"self":[{"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/posts\/9345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/comments?post=9345"}],"version-history":[{"count":0,"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/posts\/9345\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/media\/11186"}],"wp:attachment":[{"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/media?parent=9345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/categories?post=9345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ctmodule.com\/en\/wp-json\/wp\/v2\/tags?post=9345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}