Security notices
Security notices​
Camunda publishes security notices after fixes are available.
Notice 13​
Publication date​
July 18th, 2024
Product affected​
Camunda Identity
Impact​
The version of Apache Tomcat
used by Camunda Identity was affected by the following vulnerability:
How to determine if the installation is affected​
You are using Camunda Identity version 8.2.29 or previous.
Solution​
Camunda has provided the following release which contains a fix:
Notice 12​
Publication date​
October 3rd, 2023
Product affected​
Camunda Desktop Modeler
Impact​
The version of libwebp
shipped with Camunda Desktop Modeler was affected by the following vulnerability:
How to determine if the installation is affected​
You are using Camunda Desktop Modeler version 5.15.1 or previous.
Solution​
Camunda has provided the following release which contains a fix:
Notice 11​
Publication date​
April 17, 2023
Product affected​
Tasklist
Impact​
The REST API functionality of Tasklist 8.2.0 and 8.2.1 allows unauthenticated access to the following methods/URLs:
- GET /v1/tasks/{taskId}
- POST /v1/tasks/search
- POST /v1/tasks/{taskId}/variables/search
- POST /v1/forms/{formId}
- POST /v1/variables/{variableId}
Find more information about the methods in our Tasklist REST API documentation.
Therefore, if you use Tasklist 8.2.0 or 8.2.1, and if you have sensible data stored in process variables (accessed by user tasks), this data could have been accessed by users knowing the endpoint of the Tasklist instance without authentication.
How to determine if the installation is affected​
You are using Tasklist version 8.2.0 or 8.2.1.
Solution​
Camunda has provided the following releases which contain a fix
Notice 10​
Publication Date:​
November 10th, 2022
Product affected:​
Tasklist
Impact:​
The Tasklist Docker image contain an OpenSSL version 3.0.2 for which the following CVEs have been published:
At this point, Camunda is not aware of any specific attack vector in Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are Tasklist version (8.0.3 ≥ version ≤ 8.0.7) or ≤ 8.1.2
Solution​
Camunda has provided the following releases which contain a fix
Notice 9​
Publication Date:​
April 11th, 2022
Product affected:​
Zeebe, Operate, Tasklist, IAM
Impact:​
Zeebe, Operate, Tasklist and IAM are using the Spring framework for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2022-22965
At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate, Tasklist or IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using Zeebe, Operate or Tasklist version ≤ 1.2.11 or ≤ 1.3.6
Solution​
Camunda has provided the following releases which contain a fix
Notice 8​
Publication Date:​
December 31th, 2021
Product affected:​
Zeebe, Operate, Tasklist
Impact:​
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44832. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using Zeebe, Operate or Tasklist version ≤ 1.2.8 or ≤ 1.1.9
Solution​
Camunda has provided the following releases which contain a fix
Notice 7​
Publication Date:​
December 31th, 2021
Product affected:​
IAM
Impact:​
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44832. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using IAM version ≤ 1.2.8
Solution​
Camunda has provided the following releases which contain a fix
Notice 6​
Publication Date:​
December 22th, 2021
Product affected:​
Zeebe, Operate, Tasklist
Impact:​
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45105. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using Zeebe, Operate or Tasklist version ≤ 1.2.7 or ≤ 1.1.8
Solution​
Camunda has provided the following releases which contain a fix
Notice 5​
Publication Date:​
December 22th, 2021
Product affected:​
IAM
Impact:​
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45105. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.
IAM bundles logback libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-42550. At this point, Camunda is not aware of any specific attack vector in IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using IAM version ≤ 1.2.7
Solution​
Camunda has provided the following releases which contain a fix
Notice 4​
Publication Date:​
December 17th, 2021
Product affected:​
Zeebe, Operate, Tasklist
Impact:​
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45046. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using Zeebe, Operate or Tasklist version ≤ 1.2.6 or ≤ 1.1.7
Solution​
Camunda has provided the following releases which contain a fix
Notice 3​
Publication Date:​
December 17th, 2021
Product affected:​
IAM
Impact:​
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45046. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.
IAM bundles logback libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-42550. At this point, Camunda is not aware of any specific attack vector in IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using IAM version ≤ 1.2.6
Solution​
Camunda has provided the following releases which contain a fix
Notice 2​
Publication Date:​
December 14th, 2021
Product affected:​
Zeebe, Operate, Tasklist
Impact:​
Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44228. At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using Zeebe, Operate or Tasklist version ≤ 1.2.5 or ≤ 1.1.6
Solution​
Camunda has provided the following releases which contain a fix
Apply the patches mentioned above or set the JVM option -Dlog4j2.formatMsgNoLookups=true
Notice 1​
Publication Date:​
December 14th, 2021
Product affected:​
IAM
Impact:​
IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44228. Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability.
Still, Camunda recommends applying fixes as mentioned in the Solution section below.
How to determine if the installation is affected​
You are using IAM version ≤ 1.2.5
Solution​
Camunda has provided the following releases which contain a fix
Report a vulnerability​
Please report security vulnerabilities to Camunda immediately. Please follow the steps on our Camunda Security page to report a vulnerability.
Additional security information​
For more information about security at Camunda, including our security policy, security issue management, and more, see Camunda.com/security.