Help build the future of open source observability software Open positions

Check out the open source projects we support Downloads

The actually useful free plan

Grafana Cloud Free Tier
check

10k series Prometheus metrics

check

50GB logs, 50GB traces, 50GB profiles

check

500VUk k6 testing

check

20+ Enterprise data source plugins

check

100+ pre-built solutions

Featured webinar

Getting started with grafana LGTM stack

Getting started with managing your metrics, logs, and traces using Grafana

Learn how to unify, correlate, and visualize data with dashboards using Grafana.

Grafana Labs core products not impacted by Log4j CVE-2021-44228 and related vulnerabilities

Grafana Labs core products not impacted by Log4j CVE-2021-44228 and related vulnerabilities

2021-12-14 2 min

Note: We are receiving questions around CVE-2021-45046. This CVE is a follow-up exploit to CVE-2021-44228. As such, the statements below also apply for CVE-2021-45046.

Like many of our peers, we have spent the last few days responding to the Log4j RCE vulnerability, CVE-2021-44228, and the related CVEs that were discovered following disclosure of 44228.  

We are fortunate in our case that we chose not to use Java as a core part of our stack and have minimal dependencies on services and applications that make use of it.

After a rigorous review of our codebase, we are confident that Grafana OSS, Grafana Cloud, and our Enterprise products are not affected.

A small number of demo, experimental, or playground projects (all non-customer impacting) had vulnerable versions of Log4j running, but these were stopped immediately upon discovery until they can be upgraded or decommissioned.  

How Grafana Loki can help

While no substitute for a full SIEM, searching Grafana Loki for app logs containing patterns such as ${jndi:ldap://* can be a great, low-overhead way to start getting visibility into exploitation attempts. Similarly, jndi in general can help find undocumented services that could be running vulnerable versions. As Log4j often prints its own name at startup, a search for the regular expression (?i)log4j can also be helpful in identifying services using Log4j, which you can then assess for potential vulnerabilities.

If you have specific questions or concerns regarding this vulnerability and your Grafana products or services, please email security@grafana.com.