<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Impact of log4j zero day vulnerability in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177290#M19301</link>
    <description>&lt;P&gt;Hi Suresh,&lt;/P&gt;&lt;P&gt;Anton has mentioned the other components are not affected:&lt;BR /&gt;"We have updated all components of our cloud services where a risk could not be ruled out and our cloud services are currently not exposed to the vulnerability. We have equally ruled out any potential risk for the Dynatrace Managed cluster and&amp;nbsp;OneAgent."&lt;BR /&gt;Will that help your security team?&lt;BR /&gt;If they have any more questions, I'd recommend to use the in-product chat or contacting Support.&lt;/P&gt;</description>
    <pubDate>Sat, 11 Dec 2021 22:16:41 GMT</pubDate>
    <dc:creator>ben_wrightson</dc:creator>
    <dc:date>2021-12-11T22:16:41Z</dc:date>
    <item>
      <title>Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177236#M19279</link>
      <description>&lt;P&gt;Today a high severity zero day vulnerability impacting the very popular log4j package has been published:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.randori.com/blog/cve-2021-44228/" target="_blank" rel="noopener"&gt;https://www.randori.com/blog/cve-2021-44228/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/" target="_blank" rel="noopener"&gt;https://www.lunasec.io/docs/blog/log4j-zero-day/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would be interested to know if any Dynatrace components are known to be affected and if so, how exactly, what's the risk of compromise and if there is anything that can be done from a user/customer perspective to help minimize the risk of exploits.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've already approached support but haven't received any response yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any feedback is appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 12:10:16 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177236#M19279</guid>
      <dc:creator>Enrico_F</dc:creator>
      <dc:date>2021-12-10T12:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177238#M19280</link>
      <description>&lt;P&gt;My own digging on our managed cluster nodes (1.226) has revealed this:&lt;/P&gt;&lt;PRE&gt;$ ls -l /opt/dynatrace-managed/elasticsearch/lib | grep log4j&lt;BR /&gt;-rw-r--r--. 1 dynatrace dynatrace 264060 May 11 2020 log4j-api-2.11.1.jar&lt;BR /&gt;-rw-r--r--. 1 dynatrace dynatrace 1607947 May 11 2020 log4j-core-2.11.1.jar&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;So it seems the bundled ES component might be affected...&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 12:07:17 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177238#M19280</guid>
      <dc:creator>Enrico_F</dc:creator>
      <dc:date>2021-12-10T12:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259#M19282</link>
      <description>&lt;P&gt;Hi Enrico,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our team is aware and actively investigating this issue. We've released the following statement:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Dynatrace is currently investigating potential exposure of the Log4Shell (CVE-2021-44228) vulnerability. Dynatrace is treating this as a critical vulnerability and follows its incident response procedures. In case Dynatrace identifies an exposure of this vulnerability to our customers, we are going to proactively inform affected customers within the next 72 hours.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 16:39:18 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259#M19282</guid>
      <dc:creator>ben_davidson</dc:creator>
      <dc:date>2021-12-10T16:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177268#M19285</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/7040"&gt;@Enrico_F&lt;/a&gt;&amp;nbsp;. Waiting on confirmation for SaaS Customers. I'll post any news we get.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 20:48:35 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177268#M19285</guid>
      <dc:creator>ChadTurner</dc:creator>
      <dc:date>2021-12-10T20:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177269#M19286</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it possible to use Dynatrace to find all servers/services that use &lt;SPAN&gt;log4j?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:16:45 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177269#M19286</guid>
      <dc:creator>melorymonie</dc:creator>
      <dc:date>2021-12-10T21:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177270#M19287</link>
      <description>&lt;P&gt;We found that only Synthetic use it.&amp;nbsp; So if you have an activegate with synthetics on it will have Log4J.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:40:54 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177270#M19287</guid>
      <dc:creator>deon_allen</dc:creator>
      <dc:date>2021-12-10T21:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177273#M19288</link>
      <description>&lt;P&gt;we are using&amp;nbsp;Activegate for our&amp;nbsp;Synthetic Monitoring , will our Activegate and other systems were also get impacted and also we are using SaaS tenant.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 03:04:31 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177273#M19288</guid>
      <dc:creator>kb00563121</dc:creator>
      <dc:date>2021-12-11T03:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177276#M19289</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Does anyone have any updates on this?&lt;BR /&gt;Synthetics have log4j2, but what I can't tell is the version that it is running.&amp;nbsp; -- anyone else ?&lt;/P&gt;&lt;P&gt;Would be good to know what Active Gate versions are affected..&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 05:28:30 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177276#M19289</guid>
      <dc:creator>jonathanp</dc:creator>
      <dc:date>2021-12-11T05:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177278#M19290</link>
      <description>&lt;P&gt;The new Application Security offering should be able to point this out in your applications.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 15:48:22 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177278#M19290</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2021-12-11T15:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177279#M19291</link>
      <description>&lt;P&gt;I have not confirmed, yes or no, that Synthetic Activegates are affected.&lt;/P&gt;&lt;P&gt;But looking at the description of the vulnerability, it will only happen if an attacker can inject some malicious code in synthetic measurements being done. I would say that most of the private synthetic use cases that I can imagine are not easily attackable.&lt;/P&gt;&lt;P&gt;For anyone involved, probably one of the best security measures would be cancelling LDAP traffic, or other JNDI related endpoints, out of the organization, in firewalls.&amp;nbsp;Well, that should be something in place by default. It doesn't protect though against internal attackers.&amp;nbsp; There are other mitigations possible, as referenced in &lt;A href="https://logging.apache.org/log4j/2.x/security.html" target="_blank" rel="noopener"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 16:01:26 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177279#M19291</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2021-12-11T16:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177280#M19292</link>
      <description>&lt;P&gt;If the sha256 hash is the one below, it most certainly is:&lt;/P&gt;&lt;P&gt;d4485176aea67cc85f5ccc45bb66166f8bfc715ae4a695f0d870a1f8d848cc3d log4j-core-2.11.1.jar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source: &lt;A href="https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes/blob/main/sha256sums.txt" target="_blank"&gt;https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes/blob/main/sha256sums.txt&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 16:12:18 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177280#M19292</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2021-12-11T16:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177281#M19293</link>
      <description>&lt;P&gt;We have been scanned multiple times from different clients. There are also multiple log4j components in dynatrace managed.&lt;/P&gt;&lt;P&gt;Would be nice to get some feed back one whether the different important flags are set, and whether DT Managed is vulnerable.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 20:21:42 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177281#M19293</guid>
      <dc:creator>tarjei</dc:creator>
      <dc:date>2021-12-11T20:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177283#M19294</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Dear valued customer,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;We want to inform you that in response to the recently published vulnerability of log4j (CVE-2021-44228) the Dynatrace team has rigorously reviewed any potential exposure and risks arising from the vulnerability.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;We have updated all components of our cloud services where a risk could not be ruled out and our cloud services are currently not exposed to the vulnerability. We have equally ruled out any potential risk for the Dynatrace Managed cluster and&amp;nbsp;OneAgent.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;While investigations are still ongoing, we have, out of an abundance of caution, provided updates for the Synthetic Chromium&amp;nbsp;component&amp;nbsp;(used only in&amp;nbsp;ActiveGates&amp;nbsp;running Private Synthetic tests) with an updated version of log4j which is not affected by this vulnerability.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By default, this upgrade is applied automatically. In case the auto update functionality for&amp;nbsp;ActiveGates&amp;nbsp;has been disabled, we recommend customers manually trigger the upgrade. The following Synthetic Chromium versions use the updated log4j version:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;1.229.49.20211210-165018&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="2" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;1.227.31.20211210-164955&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="3" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;1.225.29.20211210-164930&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" aria-setsize="-1" data-aria-posinset="4" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;1.223.30.20211210-164926&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What&amp;nbsp;do I do if I have questions?&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you&amp;nbsp;have&amp;nbsp;any questions, please&amp;nbsp;reach out&amp;nbsp;to us using our in-product&amp;nbsp;assistance&amp;nbsp;from within your Dynatrace environment&amp;nbsp;or open a Ticket in our Support-Portal.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;Sincerely,&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Dynatrace ONE&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 20:37:14 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177283#M19294</guid>
      <dc:creator>anton_goosen</dc:creator>
      <dc:date>2021-12-11T20:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177284#M19295</link>
      <description>&lt;P&gt;Where did you get this? I have not gotten this.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 20:41:41 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177284#M19295</guid>
      <dc:creator>tarjei</dc:creator>
      <dc:date>2021-12-11T20:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177285#M19296</link>
      <description>&lt;P&gt;Hi, Could someone confirm whether any other component than Synthetic monitoring/Synthetic enabled with Activegate is also impacted because of this issue? Our security team is concerned about ongoing vulnerability. Appreciate if someone from Dynatrace confirm whether Dynatrace SaaS and/or Dynatrace Managed are impacted. Thanks, Suresh.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 20:43:56 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177285#M19296</guid>
      <dc:creator>sureshKumarK</dc:creator>
      <dc:date>2021-12-11T20:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177286#M19297</link>
      <description>&lt;P&gt;Hey Tarjei, Dynatrace targeted this message to customers which actively use Private Synthetic locations. Let me know if there is anything else I can help you with.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 21:06:58 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177286#M19297</guid>
      <dc:creator>stefan_lexow</dc:creator>
      <dc:date>2021-12-11T21:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177287#M19298</link>
      <description>&lt;P&gt;We use and manage private synthetic for at least 10 different customers, so I find it a bit strange that this has not reached us?&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 21:09:44 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177287#M19298</guid>
      <dc:creator>tarjei</dc:creator>
      <dc:date>2021-12-11T21:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177288#M19299</link>
      <description>&lt;P&gt;Hey Tarjei, can you confirm that you are signed up as an "emergency contact" for these clusters as documented here?&lt;BR /&gt;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/user-management-and-sso/configure-emergency-contacts-saas/" target="_blank"&gt;https://www.dynatrace.com/support/help/how-to-use-dynatrace/user-management-and-sso/configure-emergency-contacts-saas/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 21:30:03 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177288#M19299</guid>
      <dc:creator>stefan_lexow</dc:creator>
      <dc:date>2021-12-11T21:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177289#M19300</link>
      <description>&lt;P&gt;Hi Stefan. I can confirm that I'm emergency contact on one of our clusters and no email has been received.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;/Thomas&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 22:14:32 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177289#M19300</guid>
      <dc:creator>Henmar</dc:creator>
      <dc:date>2021-12-11T22:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Impact of log4j zero day vulnerability</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177290#M19301</link>
      <description>&lt;P&gt;Hi Suresh,&lt;/P&gt;&lt;P&gt;Anton has mentioned the other components are not affected:&lt;BR /&gt;"We have updated all components of our cloud services where a risk could not be ruled out and our cloud services are currently not exposed to the vulnerability. We have equally ruled out any potential risk for the Dynatrace Managed cluster and&amp;nbsp;OneAgent."&lt;BR /&gt;Will that help your security team?&lt;BR /&gt;If they have any more questions, I'd recommend to use the in-product chat or contacting Support.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 22:16:41 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177290#M19301</guid>
      <dc:creator>ben_wrightson</dc:creator>
      <dc:date>2021-12-11T22:16:41Z</dc:date>
    </item>
  </channel>
</rss>

