Log4j (CVE-2021-44228) Vulnerability in ZENworks


A critical vulnerability (Log4shell - CVE-2021-44228 / CVE-2021-45046 / CVE-2021-45105) have been identified in Log4j, a logging library used with-in ZENworks and hundred of thousand applications across the globe. An exploitation of these vulnerability allows a malicious user to remotely execute code on a vulnerable device. Micro Focus is taking immediate steps to mitigate it across its products. A statement out lining the response is available here.

Micro Focus has identified that these vulnerabilities affects only specific versions of ZENworks products - ZENworks 2020 Update 1 & ZENworks 2020 Update 2. It does NOT affects any other ZENworks versions like ZENworks 2017.x.  It also affects ZENworks Reporting 7.8 version. Additionally, we have determined that this vulnerability does NOT affects ZENworks Service Desk or Micro Focus Desktop Container product.

This vulnerability can be mitigated by making some file changes and setting up of some environment variables across devices. The fix for this vulnerability for ZENworks Products is now available and is detailed here. Given the severity of vulnerability, Micro Focus recommends immediate fixing of this vulnerability.

Updated - 24th Dec -2021

A consolidated patch/FTF for ZENworks, fixing all the Log4j vulnerabilities is now available.

  • This FTF is applicable regardless of the original mitigation steps.
  • If you have already applied the steps in the original mitigation steps, this FTF must still be applied on the devices.
  • Steps applied from original mitigation steps need not be reverted. 
  • In case the original mitigation steps have not been applied, you can apply the FTF and ignore the mitigation steps.


Asset Management
Configuration Management
Endpoint SM
Full Disk Encryption
Patch Management
Support Tip
Comment List
Related Discussions