<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>meviy Europe - Blog - MISUMI</provider_name><provider_url>https://de.meviy.misumi-ec.com/info/en/</provider_url><title>Status of Response to Apache Log4j Vulnerability (CVE-2021-44228) | meviy Europe - Blog - MISUMI</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="BYZwX2CNsB"&gt;&lt;a href="https://de.meviy.misumi-ec.com/info/en/service-release-en/19643/"&gt;Status of Response to Apache Log4j Vulnerability (CVE-2021-44228)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://de.meviy.misumi-ec.com/info/en/service-release-en/19643/embed/#?secret=BYZwX2CNsB" width="600" height="338" title="&#x201C;Status of Response to Apache Log4j Vulnerability (CVE-2021-44228)&#x201D; &#x2014; meviy Europe - Blog - MISUMI" data-secret="BYZwX2CNsB" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://de.meviy.misumi-ec.com/info/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>We would like to inform you of the status of our investigation and response to the vulnerability of Apache Log4j*, which was released on December 9, 2021. For the service meviy all vulnerabilities related to the Log4j vulnerability have been addressed! Investigation information and countermeasures: &#x2022; The meviy server application does not use the targeted library &#x2022; As a countermeasure, WAF rules to block attacks against the log4j vulnerability were applied on December 13 &#x2022; Some middleware that does not perform external communication uses log4j, and an update to the relevant middleware was implemented on December 21 We will continue to collect information on this vulnerability and implement countermeasures as [&hellip;]</description></oembed>
