TDG is actively responding to Log4j vulnerability.
TDG’s top priority remains the security of our clients and products. TDG is actively responding to the reported remote code execution vulnerability in the Log4j.
We are investigating and taking action for TDG as an enterprise, TDG products and TDG services that may be potentially impacted, and will continually publish information to help customers detect, investigate and mitigate attacks, if any, to their TDG products and services.
In TDG products (BrowseEmAll, Ecosh, Izzy, MultiBrowser, fiFist, Selenium Academy) there is no indication that they have vulnerabilities on Log4j. But we continue to analyse, with so much active industry research on Log4j, mitigation and remediation recommendations will evolve. We are actively assessing the latest Log4j developments and will share updates accordingly.