Received: from BN0PR16MB4461.namprd16.prod.outlook.com (2603:10b6:408:157::24)
 by BL0PR16MB2612.namprd16.prod.outlook.com with HTTPS; Tue, 14 Dec 2021
 14:33:18 +0000
Received: from BN0PR16MB4397.namprd16.prod.outlook.com (2603:10b6:408:150::18)
 by BN0PR16MB4461.namprd16.prod.outlook.com (2603:10b6:408:157::24) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4778.16; Tue, 14 Dec
 2021 14:33:17 +0000
Received: from BN0PR16MB4397.namprd16.prod.outlook.com
 ([fe80::9c45:eb84:fdd4:e8f]) by BN0PR16MB4397.namprd16.prod.outlook.com
 ([fe80::9c45:eb84:fdd4:e8f%8]) with mapi id 15.20.4778.018; Tue, 14 Dec 2021
 14:33:16 +0000
From: Rickie George <rgeorge@microix.net>
To: Microix Support <support@microix.net>
Subject: Log4j vulnerability Information
Thread-Topic: Log4j vulnerability Information
Thread-Index: Adfw9eYcU0h4rdkiRu6BlS6rDqHitQ==
Date: Tue, 14 Dec 2021 09:33:16 -0500
Message-ID:
	<BN0PR16MB4397BF1A05A834061900249BAF759@BN0PR16MB4397.namprd16.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Exchange-Organization-AuthAs: Internal
X-MS-Exchange-Organization-AuthMechanism: 04
X-MS-Exchange-Organization-AuthSource: BN0PR16MB4397.namprd16.prod.outlook.com
X-MS-Has-Attach:
X-MS-Exchange-Organization-Network-Message-Id:
	fc67633b-96d3-4fa1-fdac-08d9bf0eab05
X-MS-Exchange-Organization-SCL: -1
X-MS-TNEF-Correlator:
X-MS-Exchange-Organization-RecordReviewCfmType: 0
x-ms-publictraffictype: Email
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=microix.net;
x-ms-office365-filtering-correlation-id: fc67633b-96d3-4fa1-fdac-08d9bf0eab05
x-ms-traffictypediagnostic: BN0PR16MB4461:EE_
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-antispam-report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SKI;H:BN0PR16MB4397.namprd16.prod.outlook.com;PTR:;CAT:NONE;SFS:;DIR:INB;
x-microsoft-antispam: BCL:0;
x-ms-exchange-crosstenant-network-message-id:
	fc67633b-96d3-4fa1-fdac-08d9bf0eab05
x-ms-exchange-crosstenant-originalarrivaltime: 14 Dec 2021 14:33:16.7199 (UTC)
x-ms-exchange-crosstenant-fromentityheader: Hosted
x-ms-exchange-crosstenant-id: 047ca1d7-5314-4422-8db2-9017a42a0ba4
x-ms-exchange-crosstenant-mailboxtype: HOSTED
x-ms-exchange-crosstenant-userprincipalname:
	EStJ+uUPlCrC6e6fB2bFeOxmjdYPWlyZGbvBVCY8qigHudJsyr5FIlYPn4KkutS2tsJleYEGbaJmXvfjjj3ILA==
x-ms-exchange-transport-crosstenantheadersstamped: BN0PR16MB4461
x-ms-exchange-crosstenant-authsource: BN0PR16MB4397.namprd16.prod.outlook.com
x-ms-exchange-crosstenant-authas: Internal
x-ms-exchange-transport-endtoendlatency: 00:00:02.2037217
x-ms-exchange-processed-by-bccfoldering: 15.20.4778.018
X-Microsoft-Antispam-Mailbox-Delivery:
	ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506458)(944626604)(920097)(425001)(930097);
X-Microsoft-Antispam-Message-Info:
	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
Content-Type: text/html; charset="us-ascii"
MIME-Version: 1.0

<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.lead-in-text-callout
	{mso-style-name:lead-in-text-callout;}
p.paywall, li.paywall, div.paywall
	{mso-style-name:paywall;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="paywall">How are Microix products affected by the current vulnerability of Log4j?<o:p></o:p></p>
<p class="paywall">Microix products (Workflow Modules Client, Web Companion, HTML Approval, Web Time) are currently not using the Log4j java libraries and our applications are not compatible to be hosted on Apache servers. Therefore our products should not
 be affected by the Log4j library vulnerability. Additionally, our internal software used by our team to communicate with customers were also confirmed to not be affected as well:<o:p></o:p></p>
<p class="paywall">Simplehelp.com (Remote Connection Software)<br>
Solar Winds (FTP and File Share)<br>
Helpdesk (Jitbit)<br>
DevExpress (UI Components)<o:p></o:p></p>
<p class="paywall">Information about Log4j vulnerability&#8230;<o:p></o:p></p>
<p style="margin-top:0in"><span class="lead-in-text-callout"><b><span style="font-family:&quot;Helvetica&quot;,sans-serif;color:#1A1A1A;text-transform:uppercase;letter-spacing:1.15pt">A VULNERABILITY IN</span></b></span><span style="font-family:&quot;Helvetica&quot;,sans-serif;color:#1A1A1A;letter-spacing:.1pt">&nbsp;a
 widely used logging library has become a full-blown security meltdown, affecting digital systems across the internet. Hackers are already attempting to exploit it, but even as fixes emerge, researchers warn that the flaw could have serious repercussions worldwide.&nbsp;<o:p></o:p></span></p>
<p class="paywall" style="box-sizing: border-box;font-variant-ligatures: normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-webkit-text-stroke-width: 0px;text-decoration-thickness: initial;text-decoration-style: initial;text-decoration-color: initial;word-spacing:0px">
<span style="font-family:&quot;Helvetica&quot;,sans-serif;color:#1A1A1A;letter-spacing:.1pt">The problem lies in Log4j, a ubiquitous, open source Apache logging framework that developers use to keep a record of activity within an application. Security responders are
 scrambling to patch the bug, which can be easily exploited to take control of vulnerable systems remotely. At the same time, hackers are actively scanning the internet for affected systems. Some have already developed tools that automatically attempt to exploit
 the bug, as well as worms that can spread independently from one vulnerable system to another under the right conditions.<o:p></o:p></span></p>
<p class="paywall"><span style="font-family:&quot;Helvetica&quot;,sans-serif;color:#1A1A1A;letter-spacing:.1pt">Source&#8230;</span><a href="https://www.wired.com/story/log4j-flaw-hacking-internet/">A Log4J Vulnerability Has Set the Internet 'On Fire' | WIRED</a><o:p></o:p></p>
<p class="paywall"><o:p>&nbsp;</o:p></p>
<p class="paywall"><span style="font-size:14.5pt;font-family:&quot;Helvetica&quot;,sans-serif;color:#1A1A1A;letter-spacing:.1pt"><o:p>&nbsp;</o:p></span></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>
