Trimble Viewpoint Security Advisories

Log4J Update — 16 December 2021

On Friday December 10th, 2021, Trimble Viewpoint became aware of a Zero Day vulnerability known as CVE-2021-44228 Remote Code Execution: Log4J(2) Context Lookup with LDAP resolution. Based on security scans, we confirmed that this flaw created a vulnerability in only our Spectrum software. The vulnerability does not affect Viewpoint Vista, ProContractor, Jobpac Connect, HR Management, Field Service, Financial Controls, Field Management, Viewpoint Team, Viewpoint For Projects, or Viewpoint Field View since Log4J isn’t present which has been verified by multiple scans with different solutions.

For Spectrum Cloud Customers:

Trimble’s 24x7 Security Operations Center in concert with Viewpoint Cloud Operations and Spectrum Engineering teams took the following immediate mitigation actions:

  1. Updated all Spectrum Web Application Firewalls with current nuisance IP ranges relating to this vulnerability
  2. Updated log4j configuration for all Spectrum environments to disable remote code execution for affected log4j versions
  3. Immediately prepared deployment windows for all 2021R3 cloud hosted customers pending hotfix release approval
  4. Engineering teams began work on updating the impacted Spectrum components to eliminate this vulnerability.
  5. Hosted servers that were already on Spectrum 2021 R3 have been patched with an updated software version.

As a result of all these efforts, the Spectrum Cloud offering shouldn’t be susceptible to the Log4j vulnerability. No further action needs to be taken by hosted customers.

Moving forward, Trimble Viewpoint continues to actively monitor our environments via our 24x7 Security Operations Center. In addition, to keep up to date with new developments, Trimble’s Global CyberSecurity team maintains regular communications with all internal Trimble Divisions and 3rd party vendors and provides new and updated remediation strategies as they become available. We’ve worked very hard to have a mature security posture and have conducted much due diligence by attaining independent 3rd party certifications such as SOC 2 Type 2, ISO 270001, and a pending NIST 800-171 attestation letter.

For Spectrum On-Premise Customers:

Today we have completed an updated installer for Spectrum for On Premise customers with the patched Spectrum version:
https://support.viewpoint.com/s/downloads?boxId=3psigwusa6ula70m7rowi8k0jb2c9g5c

All On Premise customers are strongly encouraged to install this patch as soon as possible. In addition, we recommend updating your firewall rules. All ports on the Spectrum server should be blocked via a firewall with the following exceptions. Note: these are the default ports configured for Spectrum access via the internet, and are not required to be accessible from the internet on systems configured for access only via LAN or VPN connection:

  • 443 (Spectrum)
  • 9943 (Spectrum)
  • 8482 (SDX)
  • 9012 (SDX)

These ports will be redirected if opened (optional - if not opened https:// must always be used in urls):

  • 80 will be redirected → 443
  • 8480 will be redirected → 8482
  • 9010 will be redirected → 9012

Customers needing assistance with the firewall configuration changes should contact their firewall vendor for detailed instructions applicable to their specific firewall solutions.

This is an evolving situation. Should any additional patches or configuration changes be required, hosted servers will be updated automatically by the Viewpoint Cloud Engineering team, and On Premise customers will be notified with information on the required actions.

Spectrum customers with On Premise servers should strongly consider moving to the Trimble Construction One cloud solution to take advantage of the robust and secure hosting environment available.

Security Advisory: Zero Day-Log4j

Trimble Viewpoint has identified the Log4j vulnerability as a potential exposure for Trimble Viewpoint and is executing its vulnerability management process to assess the risk and prioritise remediation. We have engaged engineering resources, third party cybersecurity vendors and software providers. We are continuously refreshing our datasets as we identify potential exposures in our infrastructure and product code.