All high security products from Rohde & Schwarz Cybersecurity are not affected by the Log4j vulnerability.

All products of the categories network encryption*1, endpoint security*2 and data protection for cloud environments (R&S®Trusted Gate) are not affected by the Log4j vulnerability because this function is not used.

R&S®Web Application Firewall and R&S®Cloud Protector use components that use the vulnerable Log4j versions. Fixes are provided as quickly as possible and all customers are informed directly.

All customers have already been informed directly about the configuration of R&S®Web Application Firewall and R&S®Cloud Protector security engines to block JNDI injections.

If you have any questions, please contact our technical support.

*1 R&S®SITLine, R&S®Trusted VPN

*2 R&S®Trusted VPN Client, R&S®Trusted Disk, R&S®Browser in the Box, R&S®Trusted Mobile

Contact Us

Do you have questions or need additional information? Simply fill out this form and we will get right back to you.

Marketing permission

I want to receive information from Rohde & Schwarz via

What does this mean in detail?

I agree that Rohde & Schwarz GmbH & Co. KG and the Rohde & Schwarz entity or subsidiary company mentioned in the imprint of this website, may contact me via the chosen channel (email or postal mail) for marketing and advertising purposes (e.g. information on special offers and discount promotions) related to, but not limited to, products and solutions in the fields of test and measurement, secure communications, monitoring and network testing, broadcast and media, and cybersecurity.

Your rights

This declaration of consent may be withdrawn at any time by sending an email with the subject "Unsubscribe" to news@rohde-schwarz.com. Additionally, a link to unsubscribe from future email advertisements is contained in each email sent. Further details on the use of personal data and the withdrawal procedure are set out in the Statement of Privacy.

Your request has been sent successfully. We will contact you shortly.
An error has occurred, please try again later.