<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869996</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Qlik is providing these mitigation steps as a temporary measure. A patch will be provided and linked here; customers are advised to move to the patch as soon as it is available.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Patches are available. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_self"&gt;Vulnerability Testing - Apache Log4j, reference CVE-2021-44228 (also referred to as Log4Shell)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;for your release and the relevant patch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Upgrade at the earliest.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik Replicate" id="qlikReplicate"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation steps to follow Replicate log4j vulnerability:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Endpoint Server - Windows&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Edit the file&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;\Replicate\endpoint_srv\bin\rependctl.bat&lt;/FONT&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;(&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to&amp;nbsp;&lt;FONT face="courier new,courier"&gt;C:\Program Files\Attunity&lt;/FONT&gt;)&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Add the string &lt;FONT color="#FF0000"&gt;-&lt;/FONT&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp;in the highlighted location shown below (last line of script):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;@echo off&lt;BR /&gt;REM attunity endpoints server configuration/run script&lt;BR /&gt;&lt;BR /&gt;FOR %%A IN ("%~dp0..") DO SET AT_PROD=%%~fA&lt;BR /&gt;&lt;BR /&gt;REM list plugins here&lt;BR /&gt;SET AT_PLUGIN_LIST=-plugins rependsrv&lt;BR /&gt;&lt;BR /&gt;REM set data directory based on the name of this script&lt;BR /&gt;SET AT_DATA_SUFFIX=&lt;BR /&gt;FOR /F "tokens=2 delims=_" %%A IN ("%~n0") DO SET AT_DATA_SUFFIX=%%A&lt;BR /&gt;&lt;BR /&gt;IF "%AT_DATA_SUFFIX%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_DATA=&lt;BR /&gt;) ELSE (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_DATA=-d data_%AT_DATA_SUFFIX%&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;IF EXIST "%AT_PROD%\jvm" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_JAVA=%AT_PROD%\jvm\bin\java.exe&lt;BR /&gt;) ELSE IF EXIST "%AT_PROD%\..\jvm" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_JAVA=%AT_PROD%\..\jvm\bin\java.exe&lt;BR /&gt;) ELSE IF "%JAVA_HOME%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; ECHO ERROR: JAVA Cannot be found&lt;BR /&gt;&amp;nbsp; &amp;nbsp; EXIT /b -1&lt;BR /&gt;) ELSE (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_JAVA=%JAVA_HOME%\bin\java.exe&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;SET AT_EXTERNAL=%AT_PROD%\externals&lt;BR /&gt;SET AT_LIB=%AT_PROD%\lib&lt;BR /&gt;SET AT_MAIN=com.attunity.infrastructure.server.PluginServer&lt;BR /&gt;&lt;BR /&gt;REM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;--------------- Fix Here ------------→&lt;BR /&gt;"%AT_JAVA%" -XX:+UseG1GC&amp;nbsp;&lt;FONT color="#FF0000"&gt;-&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;D&lt;/FONT&gt;log4j2.formatMsgNoLookups=true&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp;-Dfile.encoding=UTF-8 %AT_JVM_OPT% -cp "%AT_EXTERNAL%"/*;"%AT_LIB%"/* %AT_MAIN% %AT_DATA% %AT_PLUGIN_LIST% %*&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;Save the file.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename/move it to ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;\Replicate\endpoint_srv\externals\

$ ren log4j-core-&amp;lt;version#&amp;gt;.jar  ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;Restart the Replicate Windows service with the command:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;
&lt;PRE&gt;$ sc stop AttunityReplicateServer&lt;BR /&gt;&lt;BR /&gt;$ sc start AttunityReplicateServer&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that if you have customized Replicate start scripts or if you are running multiple instances of Replicate on the same machine, you will have to repeat this process for the different environments and perform the equivalent edit on your modified start scripts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Endpoint Server - Linux&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Edit the file&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;/replicate/endpoint_srv/bin/rependctl.sh&lt;/FONT&gt;&amp;nbsp;(&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to&amp;nbsp;&lt;FONT face="courier new,courier"&gt;/opt/attunity&lt;/FONT&gt;)&lt;/LI&gt;
&lt;LI&gt;Add the string &lt;FONT color="#FF0000"&gt;-&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt; &lt;/STRONG&gt;&lt;/FONT&gt;in the highlighted location shown below (last line of script):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;#!/bin/bash&lt;BR /&gt;&lt;BR /&gt;# attunity endpoints server configuration/run script&lt;BR /&gt;&lt;BR /&gt;DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" &amp;gt;/dev/null &amp;amp;&amp;amp; pwd )"&lt;BR /&gt;&lt;BR /&gt;AT_PROD="${DIR}/.."&lt;BR /&gt;&lt;BR /&gt;AT_PLUGIN_LIST="rependsrv"&lt;BR /&gt;&lt;BR /&gt;if [ -d "${AT_PROD}/jvm" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_JAVA="${AT_PROD}/jvm/bin/java"&lt;BR /&gt;elif [ -d "${AT_PROD}/../jvm" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_JAVA="${AT_PROD}/../jvm/bin/java"&lt;BR /&gt;elif [ -z "$JAVA_HOME" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; echo "ERROR: JAVA Cannot be found"&lt;BR /&gt;&amp;nbsp; &amp;nbsp; exit -1&lt;BR /&gt;else&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_JAVA="${JAVA_HOME}/bin/java"&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;AT_EXTERNAL="${AT_PROD}/externals"&lt;BR /&gt;AT_LIB="${AT_PROD}/lib"&lt;BR /&gt;AT_MAIN="com.attunity.infrastructure.server.PluginServer"&lt;BR /&gt;&lt;BR /&gt;if [ -z "$AT_DATA" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_DATA="${AT_PROD}/data"&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;AT_CP="${AT_EXTERNAL}/*:${AT_LIB}/*"&lt;BR /&gt;&lt;BR /&gt;#&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;----------- Fix Here ---------&amp;gt;&lt;BR /&gt;"${AT_JAVA}" -XX:+UseG1GC &lt;FONT color="#FF0000"&gt;-&lt;STRONG&gt;Dlog4j2.formatMsgNoLookups=true&lt;/STRONG&gt;&lt;/FONT&gt; -Dfile.encoding=UTF-8 ${AT_JVM_OPT} -cp "${AT_CP}" "${AT_MAIN}" -d "${AT_DATA}" -plugins "${AT_PLUGIN_LIST}" "${@:1}"&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;Save the file.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename/move it to ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;/replicate/endpoint_srv/externals

$ mv log4j-core-&amp;lt;version#&amp;gt;.jar  ../log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the Replicate service with the command:&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;# service areplicate restart&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that if you have customized Replicate start scripts or if you are running multiple instances of Replicate on the same machine, you will have to repeat this process for the different environments and perform the equivalent edit on your modified start scripts.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Client Samples in Java&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The client samples are intended for demonstration - if they were used to build an application, make sure the application uses the latest version of the log4j component (v2.15) or, alternatively, apply similar mitigation to the ones listed above by adding the system property.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 25 Jan 2022 12:47:50 GMT</pubDate>
    <dc:creator>Jamie_Gregory</dc:creator>
    <dc:date>2022-01-25T12:47:50Z</dc:date>
    <item>
      <title>CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869996</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Qlik is providing these mitigation steps as a temporary measure. A patch will be provided and linked here; customers are advised to move to the patch as soon as it is available.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Patches are available. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_self"&gt;Vulnerability Testing - Apache Log4j, reference CVE-2021-44228 (also referred to as Log4Shell)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;for your release and the relevant patch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Upgrade at the earliest.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik Replicate" id="qlikReplicate"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation steps to follow Replicate log4j vulnerability:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Endpoint Server - Windows&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Edit the file&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;\Replicate\endpoint_srv\bin\rependctl.bat&lt;/FONT&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;(&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to&amp;nbsp;&lt;FONT face="courier new,courier"&gt;C:\Program Files\Attunity&lt;/FONT&gt;)&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Add the string &lt;FONT color="#FF0000"&gt;-&lt;/FONT&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp;in the highlighted location shown below (last line of script):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;@echo off&lt;BR /&gt;REM attunity endpoints server configuration/run script&lt;BR /&gt;&lt;BR /&gt;FOR %%A IN ("%~dp0..") DO SET AT_PROD=%%~fA&lt;BR /&gt;&lt;BR /&gt;REM list plugins here&lt;BR /&gt;SET AT_PLUGIN_LIST=-plugins rependsrv&lt;BR /&gt;&lt;BR /&gt;REM set data directory based on the name of this script&lt;BR /&gt;SET AT_DATA_SUFFIX=&lt;BR /&gt;FOR /F "tokens=2 delims=_" %%A IN ("%~n0") DO SET AT_DATA_SUFFIX=%%A&lt;BR /&gt;&lt;BR /&gt;IF "%AT_DATA_SUFFIX%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_DATA=&lt;BR /&gt;) ELSE (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_DATA=-d data_%AT_DATA_SUFFIX%&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;IF EXIST "%AT_PROD%\jvm" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_JAVA=%AT_PROD%\jvm\bin\java.exe&lt;BR /&gt;) ELSE IF EXIST "%AT_PROD%\..\jvm" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_JAVA=%AT_PROD%\..\jvm\bin\java.exe&lt;BR /&gt;) ELSE IF "%JAVA_HOME%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; ECHO ERROR: JAVA Cannot be found&lt;BR /&gt;&amp;nbsp; &amp;nbsp; EXIT /b -1&lt;BR /&gt;) ELSE (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; SET AT_JAVA=%JAVA_HOME%\bin\java.exe&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;SET AT_EXTERNAL=%AT_PROD%\externals&lt;BR /&gt;SET AT_LIB=%AT_PROD%\lib&lt;BR /&gt;SET AT_MAIN=com.attunity.infrastructure.server.PluginServer&lt;BR /&gt;&lt;BR /&gt;REM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;--------------- Fix Here ------------→&lt;BR /&gt;"%AT_JAVA%" -XX:+UseG1GC&amp;nbsp;&lt;FONT color="#FF0000"&gt;-&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;D&lt;/FONT&gt;log4j2.formatMsgNoLookups=true&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp;-Dfile.encoding=UTF-8 %AT_JVM_OPT% -cp "%AT_EXTERNAL%"/*;"%AT_LIB%"/* %AT_MAIN% %AT_DATA% %AT_PLUGIN_LIST% %*&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;Save the file.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename/move it to ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;\Replicate\endpoint_srv\externals\

$ ren log4j-core-&amp;lt;version#&amp;gt;.jar  ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;Restart the Replicate Windows service with the command:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;
&lt;PRE&gt;$ sc stop AttunityReplicateServer&lt;BR /&gt;&lt;BR /&gt;$ sc start AttunityReplicateServer&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that if you have customized Replicate start scripts or if you are running multiple instances of Replicate on the same machine, you will have to repeat this process for the different environments and perform the equivalent edit on your modified start scripts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Endpoint Server - Linux&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Edit the file&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;/replicate/endpoint_srv/bin/rependctl.sh&lt;/FONT&gt;&amp;nbsp;(&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to&amp;nbsp;&lt;FONT face="courier new,courier"&gt;/opt/attunity&lt;/FONT&gt;)&lt;/LI&gt;
&lt;LI&gt;Add the string &lt;FONT color="#FF0000"&gt;-&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt; &lt;/STRONG&gt;&lt;/FONT&gt;in the highlighted location shown below (last line of script):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;#!/bin/bash&lt;BR /&gt;&lt;BR /&gt;# attunity endpoints server configuration/run script&lt;BR /&gt;&lt;BR /&gt;DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" &amp;gt;/dev/null &amp;amp;&amp;amp; pwd )"&lt;BR /&gt;&lt;BR /&gt;AT_PROD="${DIR}/.."&lt;BR /&gt;&lt;BR /&gt;AT_PLUGIN_LIST="rependsrv"&lt;BR /&gt;&lt;BR /&gt;if [ -d "${AT_PROD}/jvm" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_JAVA="${AT_PROD}/jvm/bin/java"&lt;BR /&gt;elif [ -d "${AT_PROD}/../jvm" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_JAVA="${AT_PROD}/../jvm/bin/java"&lt;BR /&gt;elif [ -z "$JAVA_HOME" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; echo "ERROR: JAVA Cannot be found"&lt;BR /&gt;&amp;nbsp; &amp;nbsp; exit -1&lt;BR /&gt;else&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_JAVA="${JAVA_HOME}/bin/java"&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;AT_EXTERNAL="${AT_PROD}/externals"&lt;BR /&gt;AT_LIB="${AT_PROD}/lib"&lt;BR /&gt;AT_MAIN="com.attunity.infrastructure.server.PluginServer"&lt;BR /&gt;&lt;BR /&gt;if [ -z "$AT_DATA" ]; then&lt;BR /&gt;&amp;nbsp; &amp;nbsp; AT_DATA="${AT_PROD}/data"&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;AT_CP="${AT_EXTERNAL}/*:${AT_LIB}/*"&lt;BR /&gt;&lt;BR /&gt;#&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;----------- Fix Here ---------&amp;gt;&lt;BR /&gt;"${AT_JAVA}" -XX:+UseG1GC &lt;FONT color="#FF0000"&gt;-&lt;STRONG&gt;Dlog4j2.formatMsgNoLookups=true&lt;/STRONG&gt;&lt;/FONT&gt; -Dfile.encoding=UTF-8 ${AT_JVM_OPT} -cp "${AT_CP}" "${AT_MAIN}" -d "${AT_DATA}" -plugins "${AT_PLUGIN_LIST}" "${@:1}"&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;Save the file.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN style="font-family: inherit;"&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename/move it to ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;/replicate/endpoint_srv/externals

$ mv log4j-core-&amp;lt;version#&amp;gt;.jar  ../log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the Replicate service with the command:&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;# service areplicate restart&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that if you have customized Replicate start scripts or if you are running multiple instances of Replicate on the same machine, you will have to repeat this process for the different environments and perform the equivalent edit on your modified start scripts.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Client Samples in Java&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The client samples are intended for demonstration - if they were used to build an application, make sure the application uses the latest version of the log4j component (v2.15) or, alternatively, apply similar mitigation to the ones listed above by adding the system property.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 25 Jan 2022 12:47:50 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869996</guid>
      <dc:creator>Jamie_Gregory</dc:creator>
      <dc:date>2022-01-25T12:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870035#M5017</link>
      <description>&lt;P&gt;Is the Linux fix for this page correct? It looks like the Windows scripting is being used for the Linux version of the script.&lt;/P&gt;
&lt;P&gt;Shouldn't "%AT_JAVA%" be "${AT_JAVA}"?&lt;/P&gt;
&lt;P&gt;Best!&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Dana&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 21:37:44 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870035#M5017</guid>
      <dc:creator>dcamacho</dc:creator>
      <dc:date>2021-12-13T21:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870063#M5018</link>
      <description>&lt;P&gt;Yes, the Linux "fix" is incorrect. I just added&amp;nbsp;&lt;STRONG&gt;‐Dlog4j2.formatMsgNoLookups=true to the line in the existing file.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 22:01:49 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870063#M5018</guid>
      <dc:creator>jfife</dc:creator>
      <dc:date>2021-12-13T22:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870067#M5019</link>
      <description>&lt;P&gt;Okay, that makes more sense to me.&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Dana&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 22:05:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870067#M5019</guid>
      <dc:creator>dcamacho</dc:creator>
      <dc:date>2021-12-13T22:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870160#M5026</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;Please pay special attention that the first character (in red) is incorrect:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;SPAN&gt;#&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;--------------- Fix Here ------------→&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;"%AT_JAVA%" -XX:+UseG1GC&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;‐Dlog4j2.formatMsgNoLookups=true&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;-Dfile.encoding=UTF-8&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it should be an hyphen. So far the first line is WRONG (it's in &lt;A title="Unicode" href="https://www.fileformat.info/info/unicode/char/2010/index.htm" target="_blank" rel="noopener"&gt;Unicode&lt;/A&gt;&amp;nbsp;), The second line is correct (it's ASCII Hyphen):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="john_wang_0-1639466253652.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68532iE814D5A53562FFE4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="john_wang_0-1639466253652.png" alt="john_wang_0-1639466253652.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;While you add the parameter, please manually change the first char to hyphen in Linux editor (or DO NOT copy it from page but input the string manually). Otherwise the Endpoint Server cannot be startup anymore with error in "repsrv.log":&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;00414190: 2021-12-14T15:05:06 [AT_GLOBAL       ]I:  Attunity Replicate Server Log (V2021.5.0.1082 qlik.localdomain Linux 4.18.0-193.6.3.el8_2.x86_64 #1 SMP Wed Jun 10 11:09:32 UTC 2020 x86_64 64-bit, Revision:495b508a49b7f88b137640419bb7ced42be10909, PID: 414189) started at Tue Dec 14 15:05:06 2021  (at_logger.c:2652)
00414190: 2021-12-14T15:05:06 [AT_GLOBAL       ]I:  Licensed to Qlik, evaluation license (107 days remaining), all sources, all targets, all hosts  (at_logger.c:2655)
00414190: 2021-12-14T15:05:06 [AT_GLOBAL       ]I:  Logging of database data is disabled  (at_logger.c:2665)
00414190: 2021-12-14T15:05:06 [UTILITIES       ]I:  Scheduler configuration has been loaded.  (scheduler.c:386)
00414190: 2021-12-14T15:05:06 [AT_GLOBAL       ]E:  Failed to set Endpoint Server admin password [1024713]  (ar_endpoint_servers_mgr.c:866)
00414190: 2021-12-14T15:05:06 [AT_GLOBAL       ]E:  Failed to prepare the bundled endpoint server [1024713]  (ar_endpoint_servers_mgr.c:437)&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;John.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 07:28:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870160#M5026</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2021-12-14T07:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870323#M5035</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I added this string in one of my qlik replicate server v6.6.0.177 but now when I'm starting the service again its not getting started.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone please help me on this.?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Antony S&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 11:44:28 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870323#M5035</guid>
      <dc:creator>Antony_05</dc:creator>
      <dc:date>2021-12-14T11:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870329#M5036</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/150848"&gt;@Antony_05&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Can you check my previous comment to see if it helps?&lt;/P&gt;
&lt;P&gt;BTW, please check "repsrv.log" to get further information about the failure.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;John.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 11:53:44 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870329#M5036</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2021-12-14T11:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870342#M5039</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/115309"&gt;@john_wang&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I just used the same string as you previously mentioned in a comment and I saved it in ANSI format, after that I stopped the service using the same comment mentioned. But we I tried starting it again I got an error like the instance is running.&lt;/P&gt;
&lt;P&gt;So I tried again after some time and now the start is running but the service is not getting started and when I'm trying to stop it shows the following error.&lt;/P&gt;
&lt;P&gt;ERROR: "&lt;/P&gt;
&lt;P&gt;[SC] OpenService FAILED 1060:&lt;/P&gt;
&lt;P&gt;The specified service does not exist as an installed service.&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;
&lt;P&gt;Please help me on this.? Also please let me know where to find the repsrv.log file&lt;/P&gt;
&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Antony S&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:06:52 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870342#M5039</guid>
      <dc:creator>Antony_05</dc:creator>
      <dc:date>2021-12-14T12:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870348#M5040</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/150848"&gt;@Antony_05&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Well, you are running Replicate on Windows.&lt;/P&gt;
&lt;P&gt;Please use the Windows Service Manager to start/stop the services. It's easier for you to know if the Service is running or not.&lt;/P&gt;
&lt;P&gt;BTW, the "repsrv.log" default location is&amp;nbsp;&lt;SPAN&gt;&amp;lt;installation-root&amp;gt;\Replicate\data\logs. For example "C:\Program Files\Attunity\Replicate\data\logs".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;John.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:14:00 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870348#M5040</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2021-12-14T12:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870354#M5041</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/115309"&gt;@john_wang&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I just restarted the machine and now the service is running fine. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Antony S&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:17:23 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870354#M5041</guid>
      <dc:creator>Antony_05</dc:creator>
      <dc:date>2021-12-14T12:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870368#M5042</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/150848"&gt;@Antony_05&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Glad to hear that.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;John.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:43:15 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870368#M5042</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2021-12-14T12:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871174#M5071</link>
      <description>&lt;P&gt;There are new updates on this issue stating &lt;BR /&gt;"LOG4J_FORMAT_MSG_NO_LOOKUPS=true as a mitigation for CVE-2021-44228: While this does help, an app *MAY* still be vulnerable, depending on how it uses log4j."&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can Qlik confirm if that's the case with Replicate V7 and if they're planning to release the patch or another temp fix to resolve this completely?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;References:&lt;BR /&gt;&lt;A href="https://twitter.com/wdormann/status/1470804255552557064" target="_blank"&gt;https://twitter.com/wdormann/status/1470804255552557064&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;“Note that previous mitigations involving configuration such as to set the system property `log4j2.noFormatMsgLookup` to `true` do NOT mitigate this specific vulnerability.”&lt;BR /&gt;- from &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" target="_blank"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 21:20:17 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871174#M5071</guid>
      <dc:creator>parimalpatel</dc:creator>
      <dc:date>2021-12-14T21:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871305#M5072</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Is there any more update to the new information where the proposed action is not mitigating the vulnerability?&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/1661"&gt;@Jamie_Gregory&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 08:51:33 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871305#M5072</guid>
      <dc:creator>subuddir</dc:creator>
      <dc:date>2021-12-15T08:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871306#M5073</link>
      <description>&lt;P&gt;In the mean time another Log4j vulnerability is discovered: &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" target="_blank"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046&lt;/A&gt;.&lt;BR /&gt;How is this going to be addressed?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 08:52:06 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871306#M5073</guid>
      <dc:creator>QR_user</dc:creator>
      <dc:date>2021-12-15T08:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871313#M5074</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The latest from Apache that one of the previous mitigation steps (setting of JVM parameter "‐Dlog4j2.formatMsgNoLookups=True”) is now discredited.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link" tabindex="-1" href="https://logging.apache.org/log4j/2.x/security.html" target="_blank" rel="noopener noreferrer" data-stringify-link="https://logging.apache.org/log4j/2.x/security.html" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please provide update on how this affect you mitigation steps.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Marcin&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 09:07:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871313#M5074</guid>
      <dc:creator>MarcinB</dc:creator>
      <dc:date>2021-12-15T09:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871608#M5082</link>
      <description>&lt;P&gt;Is there an estimate as to when a patch will be released?&amp;nbsp; &amp;nbsp;Our Enterprise IT is asking for an update.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I have been bumbling my way through the support site... where do I find the latest version of Replicate?&amp;nbsp; We're on November 2020 (7.0.0.267), and I would like to get us to a newer version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 17:43:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871608#M5082</guid>
      <dc:creator>bryce_leinan</dc:creator>
      <dc:date>2021-12-15T17:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871699#M5083</link>
      <description>&lt;P&gt;John_wang, I can confirm your post about the leading dash character in Linux (specifically CentOS 7). In vim, that is not the hyphen character for sure.&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 23:07:59 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871699#M5083</guid>
      <dc:creator>alex_thornbury</dc:creator>
      <dc:date>2021-12-15T23:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871769#M5085</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/128978"&gt;@bryce_leinan&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;You can access Qlik Download site directly &lt;A tabindex="-1" title="https://us-d.demo.qlik.com/download/" href="https://us-d.demo.qlik.com/download/?_ga=2.42246373.1324501734.1638751406-1410952926.1630060485" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link Software Download | Qlik.com"&gt;Software Download | Qlik.com&lt;/A&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and there is final patch delivery plan:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/bc-p/1870084#M2036" target="_blank"&gt;https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/bc-p/1870084#M2036&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;John.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 06:36:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871769#M5085</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2021-12-16T06:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871770#M5086</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/131639"&gt;@alex_thornbury&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;thanks for your update.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;John.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 06:36:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871770#M5086</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2021-12-16T06:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Replicate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1872179#M5100</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/115309"&gt;@john_wang&lt;/a&gt;&amp;nbsp;- unfortunately, the only thing I see is Qlik View... this was supposed to get fixed a year ago on my account, but it never was.&amp;nbsp; I'll put in another ticket.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="qlik_download.JPG" style="width: 977px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68750i2A5CFC15AB646670/image-size/large?v=v2&amp;amp;px=999" role="button" title="qlik_download.JPG" alt="qlik_download.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 16:26:46 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1872179#M5100</guid>
      <dc:creator>bryce_leinan</dc:creator>
      <dc:date>2021-12-16T16:26:46Z</dc:date>
    </item>
  </channel>
</rss>

