Skip to main content

Security Vulnerability Incident

  • October 1, 2024
  • 1 reply
  • 0 views

ScienceLogic was founded with a mission to develop intelligent, scalable technology solutions that provide IT professionals with a unified view across diverse systems, enabling rapid insights and proactive issue prevention.
 
ScienceLogic has identified a zero-day remote code execution vulnerability within a third-party utility that is delivered with the SL1 package. We assess this as a CRITICAL severity vulnerability and have confirmed that the vulnerability has been exploited in one instance.
 
Therefore, we recommend immediately that you follow the remediation steps described below. We are committed to assisting to our customers and partners with any processes or concerns.
 
What Happened:
ScienceLogic recently released a patch for a vulnerability that affected all versions of ScienceLogic SL1, including extended architecture.
 
A zero-day remote code execution in a third-party utility module which is used by SL1 was identified. The relevant functionality exhibiting this issue is present on DE, CDB, AP, and AiO appliances (including all HA/DR appliances), but not collectors.
 
Restorepoint, PowerFlow, and Skylar AI (including Skylar Automated Root Cause Analysis formerly known as Zebrium) are not impacted by this vulnerability.
 
What We Did:
ScienceLogic has patched all ScienceLogic hosted SaaS SL1 systems. At this time, there is no further action needed from SaaS customers.
 
All on-premises customers are strongly encouraged to apply the patch update for your SL1 version immediately via the Knowledge Base article.
 
For more details, please refer to this Knowledge Base article available for Support Portal registered customers. If you have any questions or concerns, please don't hesitate to contact your Customer Engagement Manager.

1 reply

  • Author
  • Community Manager
  • October 23, 2024

As part of standard procedures, the Cybersecurity and Infrastructure Security Agency (CISA) has published CVE-2024-9537, which states, “ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x."

For more details, please refer to this Knowledge Base article available for Support Portal registered customers. If you have any questions or concerns, please don't hesitate to contact your Customer Engagement Manager.