< Newsroom

QSAN Response to CVE-2021-44228: Apache Log4j Remote Code Execution (87068)

December  16 , 2021

Taipei City, Taiwan – December 16, 2021– The log4j vulnerability is a recently discovered bug in log4j where hackers are capable of sending commands from anywhere to a logger with this exploit to bring a system down from anywhere in the world with a DoS attack. Software that is written in or relies on Java is susceptible to the exploit.

CVE-2021-44228 is determined to not affect any QSAN products as QSAN software utilizes QSAN Web Server for management and is not based off of Java.

Products NOT impacted by CVE-2021-44228

  • XCubeFAS Series
  • XCubeNXT Series
  • XCubeNAS Series
  • XCubeSAN Series
  • XCubeDAS Series

About QSAN
As a forward-looking pioneer in the IT industry that is committed to data protection, QSAN creates simple, safe, reliable, and uninterrupted storage services to businesses of all sizes. Our high cost performance ratio connects the global leaders and help them turn data into creative momentum, build dynamic capabilities for digital transformation, and make flexible strategies to enhance business operations.
Based on the experience over fifteen years, our expert guidance keeps making groundbreaking innovations to assist users in management optimization, key data mastery, and firm competitiveness.
We’ve been developing strong relationships with worldwide partners to empower businesses with instant service deliveries and comprehensive solutions. High-end enterprise-level performance and agile management have proven records by thousands of organizations, which are taken seriously by us through any stage of their careers.
QSAN aims to make a positive impact on data and become the force of our customers’ success because we believe all businesses deserve the best opportunity.

For more information, please visit: www.QSAN.com