<div dir="ltr">
<div>
On the 10th of December 2021 a vulnerability (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228" target="_blank">CVE-2021-44228</a>)
in a popular Java-based logging utility log4j was published. Since
then, we have received some customer queries about Radiator’s
vulnerability.<br>
<br>
Radiator does not utilise Java or log4j as a component of our
software and is therefore not vulnerable to the log4j vulnerability.<br>
<br>
While closely following the situation, research, and responses
around the vulnerability, we have identified that RADIUS protocol
and infrastructure can be used to deliver the exploit to more
vulnerable services such as Java-based backend services, AAA
information sources and centralised logging systems. We have
documented this delivery method principle into a separate blog post
found here:<br>
<br>
<a href="https://blog.radiatorsoftware.com/2021/12/radius-servers-and-log4j-vulnerability.html" target="_blank">https://blog.radiatorsoftware.com/2021/12/radius-servers-and-log4j-vulnerability.html</a><br>
<br>
We will continue monitoring the issue closely and announce if issues
affecting Radiator or Radiator services are found.<br>
<pre cols="72">--
Daniela Loya Ramos
Sales, Radiator Software Oy
<a href="http://www.radiatorsoftware.com" target="_blank">www.radiatorsoftware.com</a></pre>
</div>
</div>