Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
Qlik has been diligently reviewing and testing our product suite since we’ve become aware of the Apache Log4j vulnerability mid-December. We want to ensure Qlik users that your security is our upmost priority. We have addressed multiple vulnerabilities through a series of product patches for supported affected versions and we recommend you update to the most recent releases available, shown in the chart below.
Log4j versions before v2.16 presented the highest threat and all exposed Qlik products have provided patches with at least v2.16 and will all be updated to v2.17.1 or later under the regular release schedule as we are not vulnerable to the CVEs related to 2.17.0
We’d like to direct you to our FAQ document to review should you have any further questions, and we encourage you to comment with any additional questions.
The following products are not affected:
The following products are under review:
The following products are affected. Qlik has provided patches linked here; customers are advised to install the patches at their earliest convenience.
Downloads can be accessed by visiting our new Downloads page on Qlik Community when signed in with your Qlik ID , then selecting the product then the latest release.
Affected Product Version |
CVE-2021-44228 |
CVE-2021-45046 |
CVE-2021-45105 |
CVE-2021-44832 |
Recommended Action |
Log4J Version included in patch |
Compose 2021.8 |
Vulnerable, solved by patch |
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable |
Install 2021.8 SR01 |
Up to 2.16.0 |
Compose 2021.5 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 2021.5 SR01 |
Up to 2.16.0 |
Compose 2021.2 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 2021.2 SR01 |
Up to 2.16.0 |
C4DW 7.0 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 7.0 2021 SR04 |
Up to 2.16.0 |
C4DW 6.6.1 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 6.6.1 SR03 |
Up to 2.16.0 |
C4DW 6.6 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 6.6.0 SR06 |
Up to 2.16.0
|
C4DL 6.6 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 6.6.0 SR09 |
Up to 2.16.0
|
Replicate 2021.11 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install version published 22 Dec 2021 |
Up to 2.16.0
|
Replicate 2021.5 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 2021.5 SR 05 |
Up to 2.16.0
|
Replicate 7.0 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 7.0.0 SR05 |
Up to 2.16.0
|
Replicate 6.6 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 6.6.0 SR06 |
Up to 2.16.0
|
QEM 2021.11 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install version published 22 Dec 2021 |
Up to 2.16.0
|
QEM 2021.5 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 2021.5 SR05 |
Up to 2.16.0
|
QEM 7.0 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 7.0.0 SR05 |
Up to 2.16.0
|
QEM 6.6 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not vulnerable
|
Not vulnerable
|
Install 6.6.0 SR03 |
Up to 2.16.0
|
Catalog 4.12.0, 4.12.1 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not Vulnerable, JDBC Appender not configured |
Install 4.12.2 |
Up to 2.17.0
|
Catalog 4.11.0, 4.11.1 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not Vulnerable, JDBC Appender not configured |
Install 4.11.2 |
Up to 2.17.0
|
Catalog 4.10.0, 4.10.1, 4.10.2 |
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Vulnerable, solved by patch
|
Not Vulnerable, JDBC Appender not configured |
Install 4.10.3 |
Up to 2.17.0
|
GeoAnalytics Server - 4.32.3 and 4.23.4 |
Vulnerable, solved by patch | Vulnerable, solved by patch | Vulnerable, solved by patch | Vulnerable, solved by patch |
Install 4.32.5 |
Up to 2.17.1 |
GeoAnalytics Server - 4.27.3 - 4.19.1 |
Vulnerable, solved by patch | Vulnerable, solved by patch | Vulnerable, solved by patch | Vulnerable, solved by patch |
Install 4.27.4 – 4.19.2 |
Up to 2.17.1 |
GeoAnalytics Plus - 5.31.1 and 5.31.2 |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Install 5.31.3 |
Up to 2.17.1 |
GeoAnalytics Plus - 5.30.1-5.29.4 |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Install 5.30.2 – 5.29.5 |
Up to 2.17.1 |
GeoAnalytics Plus - 5.28.2-5.27.5 |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Install 5.28.3 – 5.27.6 |
Up to 2.17.1 |
GeoAnalytics Plus - 5.26.5 |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Vulnerable, solved by patch |
Install 5.26.6 |
Up to 2.17.1 |
Please keep in mind that Qlik's on-premise (or client-managed) data integration products are intended to only be accessed on an internal network; therefore any potential impacts of CVE-2021-44228 should be mitigated by your internal network and access controls.
For information on supported versions, please visit the Product Support Lifecycle
Please subscribe to our Support Updates blog for continued updates.
Thank you for choosing Qlik,
Qlik Global Support
Change Log:
Dec. 13, 2021 12:15pm EST: Updated to specify which versions applied to not affected products; added changelog.
Dec. 13, 2021 3:15pm EST: Updated to specify which versions are affected with steps to mitigate and which products we are still evaluating.
Dec. 14, 2021 2:10pm EST: Added Qlik Catalog, Blendr, and Qlik Data Transfer to reviewed list. Added mitigation steps for Qlik Catalog.
Dec. 16, 2021 1:15pm EST: Updated Catalog version details in Patch schedule.
Dec. 20, 2021 1:15pm EST: Updated top post for status of CVE-2021-45105 and language around Catalog to be 'Hotfix' with full version patches in early Jan. 2022 in published.
Dec. 21, 2021 3:45pm EST: Updated Catalog to be 'Service Releases' with full version 2.17 published to downloads page.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.