Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

UPDATED CRITICAL SECURITY BULLETIN: Trend Micro Deep Discovery Director "Log4Shell" Log4j 2.x Vulnerability (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)

    • Updated:
    • 20 Jan 2022
    • Product/Version:
    • Deep Discovery Director 5.1 SP1
    • Deep Discovery Director 5.1 SP1
    • Deep Discovery Director 5.1 SP1
    • Deep Discovery Director 5.1 SP1
    • Deep Discovery Director 5.2
    • Deep Discovery Director 5.2
    • Deep Discovery Director 5.2
    • Deep Discovery Director 5.2
    • Deep Discovery Director 5.3
    • Deep Discovery Director 5.3
    • Deep Discovery Director 5.3
    • Deep Discovery Director 5.3
    • Platform:
Summary
Release Date: December 23, 2021
Updated:  January 20, 2022
CVE Identifier(s): CVE-2021-44228, CVE-2021-45046, CVE-2021-45105
Platform(s): Appliance
Severity Rating(s): Critical

Based on Trend Micro's analysis, Trend Micro Deep Discovery 5.3 and below are potentially vulnerable to the recently disclosed Log4j 2.x vulnerabilities, known collectively as "Log4Shell"  and has released a Critical Patch to address this.

Please visit Trend Micro's main Security Alert Bulletin for background information on the threat, Trend Micro protections, and status of any other affected product:  https://success.trendmicro.com/solution/000289940.

January 13, 2022 Update:  A newer Critical Patch has been released for version 5.3 (B1228) that replaces and adds additional fixes to the previous version released (B1225). 

January 20, 2022 Update:  A newer Critical Patch has been released for version 5.2 (B1403) that replaces and adds additional fixes to the previous version released (B1400). 

Details
Public

Affected Version(s)

ProductAffected Version(s)PlatformLanguage(s)
Deep Discovery Director (DDD)5.3 and belowApplianceEnglish


Solution

Trend Micro has released the following solutions to address the issue:

ProductUpdated versionNotesPlatformAvailability
Deep Discovery Director5.3 CP B1228*ReadmeApplianceAvailable Now
Deep Discovery Director
5.2 CP B1403**
ReadmeApplianceAvailable Now

*5.3 CP1228 replaces the previous B1225.  Customers may upgrade from any 5.3 build 1225 or below to the latest CP1228.

**5.2 CP1403 replaces the previous B1400.  Customers may upgrade from any 5.2 build 1400 or below to the latest CP1403 or to version 5.3 (recommended).


Please note that all versions of Trend Micro Deep Discovery Director 5.1 SP1 and below have officially reached End-of-Life (EOL) and no patch will be made available.  Customers using older versions of DDD are strongly advised to upgrade to version 5.3 as soon as possible and apply the Critical Patch available above.

These are the minimum recommended version(s) of the patches and/or builds required to address the issue. Trend Micro highly encourages customers to obtain the latest version of the product if there is a newer one available than the one listed in this bulletin.

Customers are encouraged to visit Trend Micro’s Download Center to obtain prerequisite software (such as Service Packs) before applying any of the solutions above.

 

Manual Mitigation Option

There is a temporary manual workaround process that customers may apply if they need additional time to fully patch.

However, please note that this manual workaround process is not a full remediation of the issues due to new attack vectors that were recently found.  This is only a temporary stopgap to help partially mitigate some exploit vectors.

Due to the nature of the workaround, customers who are interested in the process must contact Trend Micro Technical Support for further guidance because an individualized token and upgrade script must be generated on a per-customer level.

 

Other Reference(s)

Premium
Internal
Partner
Rating:
Category:
Upgrade; Update; Migrate
Solution Id:
000290055
Feedback
Did this article help you?

Thank you for your feedback!


*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.