<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zero day Vulnerability discovered for Apache Log4j in Qlik Replicate</title>
    <link>https://community.qlik.com/t5/Qlik-Replicate/Zero-day-Vulnerability-discovered-for-Apache-Log4j/m-p/1871318#M1396</link>
    <description>&lt;P&gt;Zero day Vulnerability discovered for Apache Log4j&lt;/P&gt;
&lt;P&gt;Dear Sir/Madam,&lt;/P&gt;
&lt;P&gt;Currently we are using “Attunity Replicate (64-bit) 6.2.0.271” which is lower than affected versions you have stated. Does it mean our versions is not affected by this vulnerability? as we unable to find log4j in Attunity Replica.&lt;/P&gt;
&lt;P&gt;Can we proceed to mitigate the steps indicated in the below link? However, we do not have "endpoint_srv" folder/directory.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869996" target="_blank"&gt;https://community.qlik.com/t5/Knowledge/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869996&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Mitigation - Endpoint Server - Windows&lt;BR /&gt;1. Edit the file &amp;lt;installation-root&amp;gt;\Replicate\endpoint_srv\bin\rependctl.bat &lt;BR /&gt;(&amp;lt;installation-root&amp;gt; typically refers to C:\Program Files\Attunity)&lt;/P&gt;
&lt;P&gt;2. Add the string ‐Dlog4j2.formatMsgNoLookups=true in the highlighted location shown below (last line of script):&lt;/P&gt;
&lt;P&gt;3. Save the file and restart the Replicate Windows service with the command:&lt;/P&gt;
&lt;P&gt;Other details are:&lt;BR /&gt;It's on Windows&lt;BR /&gt;Intranet&lt;BR /&gt;On-Premises&lt;/P&gt;
&lt;P&gt;Could you please advise how do we mitigate the log4j vulnerability issue?&lt;BR /&gt;Appreciate your urgent response for this.&lt;BR /&gt;Thank you&lt;BR /&gt;Jyothi&lt;/P&gt;</description>
    <pubDate>Wed, 15 Dec 2021 09:15:04 GMT</pubDate>
    <dc:creator>P1341017</dc:creator>
    <dc:date>2021-12-15T09:15:04Z</dc:date>
    <item>
      <title>Zero day Vulnerability discovered for Apache Log4j</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Zero-day-Vulnerability-discovered-for-Apache-Log4j/m-p/1871318#M1396</link>
      <description>&lt;P&gt;Zero day Vulnerability discovered for Apache Log4j&lt;/P&gt;
&lt;P&gt;Dear Sir/Madam,&lt;/P&gt;
&lt;P&gt;Currently we are using “Attunity Replicate (64-bit) 6.2.0.271” which is lower than affected versions you have stated. Does it mean our versions is not affected by this vulnerability? as we unable to find log4j in Attunity Replica.&lt;/P&gt;
&lt;P&gt;Can we proceed to mitigate the steps indicated in the below link? However, we do not have "endpoint_srv" folder/directory.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Knowledge/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869996" target="_blank"&gt;https://community.qlik.com/t5/Knowledge/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869996&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Mitigation - Endpoint Server - Windows&lt;BR /&gt;1. Edit the file &amp;lt;installation-root&amp;gt;\Replicate\endpoint_srv\bin\rependctl.bat &lt;BR /&gt;(&amp;lt;installation-root&amp;gt; typically refers to C:\Program Files\Attunity)&lt;/P&gt;
&lt;P&gt;2. Add the string ‐Dlog4j2.formatMsgNoLookups=true in the highlighted location shown below (last line of script):&lt;/P&gt;
&lt;P&gt;3. Save the file and restart the Replicate Windows service with the command:&lt;/P&gt;
&lt;P&gt;Other details are:&lt;BR /&gt;It's on Windows&lt;BR /&gt;Intranet&lt;BR /&gt;On-Premises&lt;/P&gt;
&lt;P&gt;Could you please advise how do we mitigate the log4j vulnerability issue?&lt;BR /&gt;Appreciate your urgent response for this.&lt;BR /&gt;Thank you&lt;BR /&gt;Jyothi&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 09:15:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Zero-day-Vulnerability-discovered-for-Apache-Log4j/m-p/1871318#M1396</guid>
      <dc:creator>P1341017</dc:creator>
      <dc:date>2021-12-15T09:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Zero day Vulnerability discovered for Apache Log4j</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Zero-day-Vulnerability-discovered-for-Apache-Log4j/m-p/1871338#M1398</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/159487"&gt;@P1341017&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;You are right. Replicate 6.2 does not introduce the endpoint server yet. However the old Replicate versions include 5.5/6.2/6.4/6.5 are out of support. The minimize support version is&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;April 2020 (formerly version number 6.6). see&amp;nbsp;&lt;A title="Qlik Replicate Product Lifecycle" href="https://community.qlik.com/t5/Product-Support-Lifecycle/Qlik-Replicate-Product-Lifecycle/ta-p/1837201" target="_blank" rel="noopener"&gt;Qlik Replicate Product Lifecycle&lt;/A&gt;&amp;nbsp;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you are running 6.2 still Please plan to upgrade to supported versions asap.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;BTW, before the upgrade please take care if the source/target database versions (include the server version, and corresponding client driver version) are supported, and also verify if the Replicate OS version is supported as well in&amp;nbsp;&lt;A title="Support Matrix" href="https://help.qlik.com/en-US/replicate/May2021/Content/Replicate/Main/Guides.htm" target="_blank" rel="noopener nofollow noreferrer"&gt;Support Matrix&lt;/A&gt;&amp;nbsp;. Please Check the&amp;nbsp;&lt;A title="Release Notes" href="https://help.qlik.com/en-US/replicate/May2021/Content/Replicate/Main/Guides.htm" target="_blank" rel="noopener nofollow noreferrer"&gt;Release Notes&lt;/A&gt;&amp;nbsp; of each major version for the detailed upgrade instructions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;John.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 09:41:48 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Zero-day-Vulnerability-discovered-for-Apache-Log4j/m-p/1871338#M1398</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2021-12-15T09:41:48Z</dc:date>
    </item>
  </channel>
</rss>

