17 Dec 2021

Pilz hardware not affected by "Log4Shell" vulnerability in software library Log4j Vulnerability is highly unlikely to be exploited in Pilz Software products

Dear Madam or Sir,

On December 10th, 2021, the BSI (the German Federal Office for Information Security) published a cyber security alert on the so-called "Log4Shell" vulnerability in the software library Log4j. Log4j is used in many Java applications.

From the BSI alert:

"An IT security vendor blog [LUN2021] reports on vulnerability CVE-2021-44228 [MIT2021] in log4j versions 2.0 through 2.14.1, which may allow attackers to execute their own program code on the target system and thus compromise the server."


Further information is available at:


https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance (in English)

Pilz's analysis revealed the following:

  • Pilz hardware components do not use Java and thus no log4j. Therefore, these components are not affected.
  • Pilz Software products partially use log4j versions 2.0 to 2.14.1 (current vulnerability CVE-2021-44228). Analyses to date have shown that it is highly unlikely that the vulnerability can be exploitedIf, contrary to expectations, there is a risk, we will publish a security advisory.

  • In some Pilz Software products, log4j version 1.2.x is used. The exploitation of the vulnerability in this version (CVE 2021-4104) requires, among other things, a specific configuration. However, this configuration is not used in Pilz Software products.

We hope this information is helpful to you. If you have any further questions, please contact our technical support: support@pilz.com.

With best regards

Pilz GmbH & Co. KG

Head office

Pilz Australia Safe Automation
Unit 1, 12-14 Miles Street
Mulgrave, Melbourne, Victoria 3170

Telephone: +61 3 9560 0621 / 1300 723 334
E-Mail: safety@pilz.com.au

Was this article helpful?