WIN-911 Statement on Apache Log4j / Log4Shell / CVE-2021-44228 Vulnerability 


An exploit for the open source “Log4j” logging service emerged on the morning of Friday December 10th, 2021. This vulnerability, known as “Log4Shell”, represents a critical security risk for affected software.


The WIN-911 R&D team has been actively investigating the situation since that time to determine if there is any risk to our products and notification platform.  We can confirm there is no vulnerability risk from “Log4j” to customers, in our products; WIN-911 v7, v4, 2021, and WIN-911 Mobile are unaffected (along with WIN-911 v1, v2, v3, Announcer, Operator Workspace, Contacts Utility, Schedule Utility, Roles Utility, Activate, Standby, IsActive, Uninstaller, SCU, BARU, Mobile Hub, and the v7 Importer).


Additional information and background details regarding Log4Shell available, 

Log4Shell - Wikipedia


WIN-911 is committed to the security and reliability of our platform for our Customers and Partners. 


If you have any questions or concerns, please reach out to us through our support portal, Solutions : WIN-911 Support (win911.com), or through email;  sales@win911.com