KHIPU Networks – CVE-2021-43065 Vulnerability Update

Wednesday 15th December, 2021

KHIPU are continuing to work with our strategic manufacturing partners to identify potential issues relating to the recently announced Apache log4j library exploit CVE-2021-44228. We have collated information provided to us by the manufacturers of the products we support to provide you with a quick reference guide to what products/services are affected.

If you need any further clarification or require information on a different supported product, please contact the KHIPU NOC and SOC teams.


The A10 PSIRT team have accessed the CVE-2021-44228 vulnerability and shared the following findings.

  • A10 PSIRT has confirmed that A10 Networks Thunder, vThunder and aGalaxy products do not contain affected Log4j code. Accordingly, these products are not exposed to this vulnerability.
  • A10 Harmony Controller products do contain the affected Log4j code. However, A10 PSIRT has confirmed that these products are not exposed to this vulnerability since an attacker cannot exploit this code”


  • Not affected


Security Advisory ([Aruba-Security-Alerts] CVE-2021-44228 – Apache log4j library vulnerability) has now been released which confirms:

Affected Products:

Unaffected Products:

  • AirWave Management Platform
  • Aruba Central
  • Aruba ClearPass Policy Manager
  • Aruba Instant (IAP)
  • Aruba NetEdit
  • Aruba Location Services
  • Aruba User Experience Insight (UXI)
  • ArubaOS Wi-Fi Controllers and Gateways
  • ArubaOS SD-WAN Controllers and Gateways
  • ArubaOS-CX switches
  • ArubaOS-S switches
  • Aruba VIA Client

Other Aruba products not listed above are also not known to be affected by the vulnerability.


SOLIDserver DDI does not utilise Java components at all and therefore is NOT vulnerable.


It has been determined that FortiNAC is not affected by this vulnerability.


Not Affected


Following an exhaustive audit of our solutions, we found that the vulnerability ‘log4j’ does not affect most recent versions of NIOS 8.4, 8.5 and 8.6, BloxOneDDI, BloxOne Threat Defense or any of our other SaaS offerings.

Please refer the below article for more information on this.


Not affected

Khipu Konnect

Not affected


Affected products:

  • RADIUS server Agent
  • On-Prem MFA Agent


Ordr IT, Data Center Operations and the SCE platform are not impacted by this vulnerability.

The Ordr Systems Control Engine (SCE) can detect systems impacted by Log4j.

  • Our integrated IDS/threat detection engine has already been updated with signatures to detect active exploits of Log4j

Palo Alto Networks

Certain Panorama versions affected, please see below for work arounds and upgrade recommendation’s.


No products affected

KHIPU Support

UK Support: +44 (0)345 272 0910

SA Support: +27 (0)41 393 7601