The Instructure Community will enter a read-only state on November 22, 2025 as we prepare to migrate to our new Community platform in early December.
Read our blog post for more info about this change.
Hi Instructure team,
How vulnerable are Canvas and associated Instructure platforms to the LOG4J vulnerability? Is any assessment underway?
Without diving in too deep, I figured I'd ask the question since I don't see anything posted here yet.
Thank you!
Solved! Go to Solution.
Here's the official statement: Instructure & the Apache Log4j2 Information.
We're going to lock this thread now; if anyone has additional questions, please post them directly to the above-linked blog post.
Thanks!
I'm also hoping to find some answers on this. We host our own canvas instance with an Apache server. Need to know if we will have to update our canvas instance or Apache, I know Apache uses Log4J.
Thanks for asking, @atcarver . Here's the tl;dr: We are in the process of identifying and patching any log4j issues within our environment. Canvas LMS was not affected.
We will soon post a standalone public response similar to this one:
On December 9th, a Critical Day 0 vulnerability was disclosed by Apache that affects Apache Log4j2 (CVE-2021-44228). As a member of the Instructure family we wanted to update you on what we have done to protect against this vulnerability.
What is the Apache Log 4j2 JNDI Vulnerability?
From the NIST National Vulnerability Database: “Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default.”
What has Instructure done to remediate this?
Instructure continues working to patch any Instructure services that use or interface with the vulnerable component Log4j2. We have reviewed all instances of Log4j2 in Instructure products and have implemented mitigations or upgrades to the services on December 10, 2021. We are not aware of any successful exploits of the vulnerability and the underlying patched/mitigated services did not process raw user requests or logs. Log4J2 is not a core component of the Canvas LMS system.
For more information, please review CVE-2021-44228 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228) and the Apache Log4j2 (https://logging.apache.org/log4j/2.x/index.html) post.
Here's the official statement: Instructure & the Apache Log4j2 Information.
We're going to lock this thread now; if anyone has additional questions, please post them directly to the above-linked blog post.
Thanks!
Community helpTo interact with Panda Bot, our automated chatbot, you need to sign up or log in:
Sign inTo interact with Panda Bot, our automated chatbot, you need to sign up or log in:
Sign in
This discussion post is outdated and has been archived. Please use the Community question forums and official documentation for the most current and accurate information.