17 Dec 2021

Pilz hardware not affected by "Log4Shell" vulnerability in software library Log4j Vulnerability is highly unlikely to be exploited in Pilz Software products

Dear Madam or Sir,

On December 10th, 2021, the BSI (the German Federal Office for Information Security) published a cyber security alert on the so-called "Log4Shell" vulnerability in the software library Log4j. Log4j is used in many Java applications.

From the BSI alert:

"An IT security vendor blog [LUN2021] reports on vulnerability CVE-2021-44228 [MIT2021] in log4j versions 2.0 through 2.14.1, which may allow attackers to execute their own program code on the target system and thus compromise the server."


Further information is available at:


https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance (in English)

Pilz's analysis revealed the following:

  • Pilz hardware components do not use Java and thus no log4j. Therefore, these components are not affected.
  • Pilz Software products partially use log4j versions 2.0 to 2.14.1 (current vulnerability CVE-2021-44228). Analyses to date have shown that it is highly unlikely that the vulnerability can be exploitedIf, contrary to expectations, there is a risk, we will publish a security advisory.

  • In some Pilz Software products, log4j version 1.2.x is used. The exploitation of the vulnerability in this version (CVE 2021-4104) requires, among other things, a specific configuration. However, this configuration is not used in Pilz Software products.

We hope this information is helpful to you. If you have any further questions, please contact our technical support: support@pilz.com.

With best regards

Pilz GmbH & Co. KG


Pilz South East Asia Pte. Ltd.
25 International Business Park, #04-56 German Centre
Singapore 609916

Telephone: +65 6839 292-0
E-Mail: sales@pilz.sg

Was this article helpful?