Soracom Product Updates logo

Product Updates

Soracom is IoT connectivity with powerful APIs that enable you to build world class applications

Subscribe to Updates
  • 日本語

Labels

  • All Posts
  • Feature
  • Improvements
  • Devices
  • Announcement
  • Beta
  • Deprecation
  • End of Support

Jump to Month

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
Announcement
3 years ago

Notice regarding Apache Log4j Vulnerability(CVE-2021-44228)

As announced by multiple security authorities on December 9, 2021, the Apache Log4j Library Vulnerability (CVE-2021-44228) is a critical security issue that could allow a vulnerable system to be compromised by an attacker. The following is a summary of the impact of this vulnerability on the Soracom platform and actions taken by Soracom to prevent system compromise:

  • We have confirmed that all necessary security patches needed to fix the vulnerability have been applied to the Soracom system components affected by this vulnerability.
  • We have additionally performed an internal audit of system components to determine if any breach or exploit has occurred, and have confirmed that none of Soracom's systems, such as customer data, have been compromised.

At this time, all systems are operating normally, and there is no need for Soracom customers to perform any actions in response to this vulnerability.

If you have any questions or concerns regarding this vulnerability, please feel free to contact the Soracom support team at your earliest convenience.