MicroFocus has nearly 49 of it’s products impacted by this Critical Zero Day Vulnerability. Nearly almost all of the flagship products like AccuRev, ALM, Fortify has been impacted by this issue. For some of the products MicroFocus has come out with mitigation and workarounds instead of actual patches. The below products are vulnerable so go through the below product click on Security Bulletin link for the Corresponding MicroFocus..
MicroFocus Product | Version | Status | Mitigation |
---|---|---|---|
Access Manager | All | Vulnerable | KM000002997 |
Accurev | All | Vulnerable | KM000003040 |
AccuRev | All | Vulnerable | KM000003040 |
Advanced Authentication | All | Vulnerable | KM000003047 |
ALM Global Search | All | Vulnerable | KM000003208 |
ALM Octane | All | Vulnerable | KM000003192 |
ALM Octane Synchronizer | All | Vulnerable | KM000003139 |
ALM Quality Insight | All | Vulnerable | KM000003207 |
ALM Solutions Connector | All | Vulnerable | KM000003194 |
ALM/Quality Center | All | Vulnerable | KM000003164 |
ArcSight | All | Vulnerable | KM000003049 |
ArcSight Collectors | All | Vulnerable | KM000003123 |
ArcSight Smart Connector | All | Vulnerable | KM000003117 |
Atlas Planning & Tracking Suite | All | Vulnerable | KM000003062 |
AutoPass license server | All | Vulnerable | KM000003074 |
Data Protector | All | Vulnerable | KM000003050 |
Dimensions CM | All | Vulnerable | KM000003051 |
Fortify Audit Assistant | All | Vulnerable | KM000003153 |
GroupWise | All | Vulnerable | KM000003013 |
GroupWise Messenger | All | Vulnerable | KM000003014 |
Host Access for the Cloud and | All | Vulnerable | KM000003184 |
Host Access Management | All | Vulnerable | KM000003184 |
LoadRunner | All | Vulnerable | KM000003005 |
LoadRunner Cloud | All | Vulnerable | KM000003046 |
LoadRunner Enterprise | All | Vulnerable | KM000003042 |
Micro Focus APM | All | Vulnerable | KM000003133 |
Micro Focus containerized CMS | All | Vulnerable | KM000003086 |
Micro Focus containerized HCM | All | Vulnerable | KM000003095 |
Micro Focus Data Protector | All | Vulnerable | KM000003052 |
Micro Focus DCA | All | Vulnerable | KM000003107 |
Micro Focus Diagnostics | All | Vulnerable | KM000003156 |
Micro Focus DMA | All | Vulnerable | KM000003099 |
Micro Focus HCMX product | All | Vulnerable | KM000003115 |
Micro Focus OO/RPA | All | Vulnerable | KM000003093 |
Micro Focus SMA-SM (Mixed Mode) | All | Vulnerable | KM000003087 |
Micro Focus SMAX and AMX | All | Vulnerable | KM000003088 |
Operations Bridge Analytics | All | Vulnerable | KM000003109 |
Reflection for the Web | All | Vulnerable | KM000003187 |
Reflection for the Web | All | Vulnerable | KM000003187 |
Retain Unified Archiving | All | Vulnerable | KM000003021 |
Security Services | All | Vulnerable | KM000003184 |
Sentinel | All | Vulnerable | KM000003122 |
Server Automation Reporting | All | Vulnerable | KM000003097 |
Service Manager | All | Vulnerable | KM000003078 |
Service Virtualization | All | Vulnerable | KM000003072 |
Star Team | All | Vulnerable | KM000003065 |
Vertica Potential | All | Vulnerable | KM000003059 |
Vertica Server. | All | Vulnerable | KM000003183 |
Zen Networks | All | Vulnerable | KM000003058 |
Rest of the MicroFocus products have not been impacted and some of them still continue to be under Investigation for this Vulnerability. As far as the affected vulnerability, please go through the Mitigation and Workarounds proposed by MicroFocus and some of them may involve replacing actual log4jar on the servers where these applications are hosted.