Upon receiving reports of the Spring4Shell software vulnerability, the Nexthink Security team analyzed to determine any potential impacts on our systems.
The Spring Framework is an application framework and inversion of the control container for the Java platform.
On March 31, 2022, a critical vulnerability (CVE-2022-22965) impacting the Spring Framework was reported, resulting in patches from the vendor.
This vulnerability is being widely exploited in the wild.
Are Collector and the client-side components affected?
Collector and the client-side components (Finder, Data Enricher, Event Connector and Chatbot SDK) do not use the affected library.
Is the Nexthink Experience platform affected?
The cloud-based components do not use the library in the affected configuration.
Are the Nexthink corporate network and supply chain affected?
Our Security team also performed a vulnerability assessment with our third-party vendors to ensure that this vulnerability does not impact the services they provide us with.
How is Nexthink protecting its product against vulnerabilities?
Our Engineering Security policy and Vulnerability Management policy (which can be shared under NDA) describe high-level principles we apply to detect, mitigate and patch these vulnerabilities. The secure software development lifecycle is an integral part of our security program. Nexthink implemented several security controls to detect vulnerabilities from the early design stages to the release of the product and cloud offering. It includes, but is not limited to, design reviews, penetration tests of different components, vulnerability scans, third-party library assessments and code reviews.