On December 17th, Apache disclosed yet another vulnerability suggesting that the previously updated Log4j2 version of 2.16 is also vulnerable by way of a Denial of Service attack with the impact of causing resource exhaustion on the target application. Apache has since released a newer version (2.17) of Log4j2.
Yext has been monitoring the external situation since, and is currently NOT aware of any PoCs or exploits in circulation that suggests any practical impact towards the services running 2.16.0. Based on our internal risk triage on the disclosed bug, we have assigned a severity of Moderate risk, and will be working on the remediation based on the timelines mentioned in our vulnerability management policy .i.e. 90 days from the time the bug has been acknowledged. Although the timeline says 90 days, we will make our best effort to expedite the patching process and will keep you posted.
In the meantime, as mentioned in the blog, other mitigating and monitoring controls are in full effect to proactively detect any malicious or suspicious traffic directed at Yext.
Please note, there is NO impact or risk posed to Yext or its customers at this time.Yext response teams are staying on top of this topic as the situation evolves and will continue to provide updates as we become aware of them.