Proficy Scheduler is unaffected by the Spring4Shell vulnerability

We have conducted an internal security investigation to assess if Proficy Scheduler is affected by the Spring4Shell vulnerability. The conclusion is that no Proficy Scheduler module or component between Proficy Scheduler v4.2 – Proficy Scheduler v7.2+ is affected (we have not investigated versions older than v4.2).

The detailed results from our internal security investigation are the following

  • The only Proficy Scheduler product using Spring is Multiuser Server 7.0 and Multiuser Server 7.2
  • The exploit requires use of Java 9 and higher to be exploited.
    • The Proficy Scheduler 7.0 server uses Java 8 and is thus not affected by this exploit
    • The Proficy Scheduler 7.2 server or newer uses Java 11+. This server version uses Spring Boot v2.6.6 or newer where the Spring4Shell vulnerability is fixed.
  • The exploit requires a Servlet container packaged as WAR to be exploited. The Proficy Scheduler 7.0 and 7.2+ server is packaged as a JAR and is thus not affected by this exploit

Our conclusion is that Proficy Scheduler customers will not have to take additional actions to secure their Proficy Scheduler installation in relation to the Spring4Shell vulnerability.

Feedback

Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Post Comment