<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[New Relic security bulletins]]></title><description><![CDATA[New Relic security bulletins]]></description><link>https://docs.newrelic.com</link><generator>RSS for Node</generator><lastBuildDate>Fri, 06 Mar 2026 15:55:31 GMT</lastBuildDate><atom:link href="https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Security Bulletin NR17-01]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxNy0wMQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr17-01</link><pubDate>Wed, 09 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for New Relic&apos;s Node.js agent eliminates a vulnerability that allows potential sensitive information disclosure via query parameters from the referer header.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; January 12, 2017&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR17-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Node.js agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;1.25.4&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/nodejs-release-notes&quot;&gt;1.36.1&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Node.js agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/nodejs-release-notes&quot;&gt;2.3.1-beta&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic&apos;s Node.js agent collects the request headers during an error trace to help determine the root cause of problems. The referer header is the URI that identifies the address of the webpage that linked to the resource being requested. It is possible that the referer URI may contain sensitive information in the request query parameters. New Relic has found that the query parameters are not properly stripped during the error trace. This update fixes this by stripping the query parameters from the referer in the request header before sending this data to New Relic.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Best practices recommend not using query parameters to pass sensitive data.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;New Relic has not identified any workarounds for this vulnerability.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/nodejs-release-notes&quot;&gt;Node.js agent release notes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Node.js agent.</description></item><item><title><![CDATA[Notification of Apollo.io security incident]]></title><guid isPermaLink="false">Tm90aWZpY2F0aW9uIG9mIEFwb2xsby5pbyBzZWN1cml0eSBpbmNpZGVudA==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/notification-apolloio-security-incident</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;div&gt;&lt;p&gt;&lt;strong&gt;October 9, 2018&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;This is a summary of the 2018 security breach of the systems of Apollo.io and New Relic&apos;s response.&lt;/p&gt;
&lt;h2&gt;Security officer statement [#statement]&lt;/h2&gt;
&lt;p&gt;Over the weekend, New Relic was alerted by a sales productivity tool vendor, Apollo.io, about a security breach of their systems, which contained business-card-like customer contact information such as name, email address, phone number, company name, and job title. We are actively investigating this issue, and at this time we believe that a subset of our customers’ and prospects’ contact info may have been included.&lt;/p&gt;
&lt;p&gt;New Relic did not sell the data to Apollo.io, but shared it solely as part of using the vendor service, which means that New Relic was the “data controller” of the impacted information and Apollo our “data processor” as defined by the General Data Protection Regulation 2016/679 (“GDPR”). No customer data from the New Relic product platform (for which New Relic acts as “data processor”) was ever linked with Apollo.io’s services or was impacted.&lt;/p&gt;
&lt;p&gt;At New Relic, the security and privacy of our customers’ data is paramount, and we practice strict information security policies for engaging any third-party vendor. We are continuously evaluating our policies and processes across all vendors.&lt;/p&gt;
&lt;p&gt;Please follow &lt;a href=&quot;https://discuss.newrelic.com/c/security-notifications&quot;&gt;discuss.newrelic.com/c/security-notifications&lt;/a&gt; for additional information on this incident.&lt;/p&gt;
&lt;p&gt;- Shaun Gordon, VP, Chief Security Officer, New Relic&lt;/p&gt;
&lt;h2&gt;Summary of incident [#nr-action]&lt;/h2&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;Who is affected?&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;We are currently investigating who is impacted, but we believe that the vendor’s breach was limited to business contact information.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;What happened?&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;New Relic was recently notified by Apollo.io that personal data that we shared with them in accordance with our Privacy Policy was exposed by a breach. We then started our investigation to learn more about the scope of the data involved. Our privacy policy is described further at: &lt;a href=&quot;https://newrelic.com/termsandconditions/privacy&quot;&gt;newrelic.com/termsandconditions/privacy&lt;/a&gt;. New Relic did not sell the data to Apollo, but shared it solely to assist in providing services to New Relic.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;What data was compromised?&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;We are continuing our investigation, but we believe that customer or potential customer email addresses, company names, business contact information, and the names of the customers to whom those emails relate were potentially exposed.&lt;/p&gt;
&lt;p&gt;We believe that no financial account information (such as credit card numbers, bank account numbers, etc.), government issued identification numbers (such as social security numbers or passport numbers) or sensitive categories of personal data as defined under GDPR (such as medical information, religious preference, etc.) was exposed.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;What action did New Relic take?&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;We have reached out to Apollo.io requesting additional information and are continuing to investigate internally.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;What further actions will New Relic take?&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;Based on our continuing investigation, we will provide further information as appropriate.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;Do you need to notify EU data protection authorities of this incident?&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;No. As explained above, New Relic is the “data controller” of the contact information that was exposed as a result of this incident. Accordingly, and in keeping with our responsibilities as a “data controller” under the GDPR, we will submit a notice to our lead data protection authority. We will not disclose any customer information as part of this notice.&lt;/p&gt;
&lt;h2&gt;Update and resolution [#update-resolution]&lt;/h2&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;November 5, 2018&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;Apollo.io, a sales intelligence vendor, was notified about a security breach of their systems by an external security researcher. The data involved contained business-card-like contact information such as name, email address, phone number, company name, and job title. After investigation of this issue, we determined that a specific set of New Relic customer and prospect contact info had been included but we have found no evidence of misuse. Per our request, all data from New Relic obtained by Apollo.io has been purged from their systems.&lt;/p&gt;
&lt;p&gt;New Relic did not sell the data to Apollo.io, but shared it solely as part of using the vendor service, which means that New Relic was the “data controller” of the impacted information and Apollo.io our “data processor” as defined by the General Data Protection Regulation 2016/679 (“GDPR”). No customer data from the New Relic product platform (for which New Relic acts as “data processor”) was ever linked with Apollo.io 30’s services or was impacted.&lt;/p&gt;
&lt;p&gt;At New Relic, the security and privacy of our customers’ data is paramount, and we practice strict information security policies for engaging any third-party vendor. We are continuously evaluating our policies and processes across all vendors.&lt;/p&gt;
&lt;h2&gt;Our commitment to our customers [#commitment]&lt;/h2&gt;
&lt;p&gt;At New Relic, the security and privacy of our customers is paramount, and we practice strict information security policies for engaging any third-party vendor.&lt;/p&gt;
&lt;p&gt;We value our relationship with you. If you have any additional questions, we encourage customers to contact us at &lt;a href=&quot;https://support.newrelic.com/&quot;&gt;support.newrelic.com&lt;/a&gt;. For more information about our privacy policy, visit &lt;a href=&quot;https://newrelic.com/termsandconditions/privacy&quot;&gt;newrelic.com/termsandconditions/privacy&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>A summary of the 2018 security breach of the systems of Apollo.io and New Relic&apos;s response.</description></item><item><title><![CDATA[Security Bulletin NR17-02 ]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxNy0wMiA=</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr17-02</link><pubDate>Wed, 09 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for New Relic&apos;s .NET agent fixes a vulnerability that made it possible for the agent to send sensitive information to New Relic during an error trace by capturing query parameters from the referer header.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; January 12, 2017&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR17-02&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#h2_code]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;5.11 - 5.23&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Only when Async is enabled&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes/net-agent-6650&quot;&gt;6.6&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;6.0 - 6.5&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes/net-agent-6650&quot;&gt;6.6&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic&apos;s .NET agent collects the request headers during an error trace to help determine the root cause of problems. The referer header is the URI that identifies the address of the webpage that linked to the resource being requested. It is possible that the referer URI may contain sensitive information in the request query parameters. New Relic has found that the query parameters are not properly stripped during the error trace. This update fixes this by stripping the query parameters from the referer in the request header before sending this data to New Relic.&lt;/p&gt;
&lt;h3&gt;Mitigating factors&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Async is disabled by default in .NET agent versions 5.11.0 - 5.23.0.&lt;/li&gt;
&lt;li&gt;Best practices recommend not using query parameters to pass sensitive data.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;New Relic has not identified any workarounds for this vulnerability.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes&quot;&gt;.NET agent release notes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;New Relic security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability for version of New Relic .NET agent.</description></item><item><title><![CDATA[Security Bulletin NR17-04]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxNy0wNA==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr17-04</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for New Relic&apos;s .NET agent fixes a vulnerability where the agent could unintentionally capture service request parameters from WCF applications.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; May 4, 2017&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR17-04&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;6.8.172.0 (and greater)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;With WCF&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes&quot;&gt;6.11.613.0&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic’s .NET Agent version &lt;div&gt;&lt;strong&gt;6.8.172.0&lt;/strong&gt;&lt;/div&gt; added visibility into Error Analytics. By default the agent will capture error events, and with WCF applications this is captured as event type &lt;div&gt;&lt;strong&gt;TransactionError&lt;/strong&gt;&lt;/div&gt;. New Relic has found that the &lt;div&gt;**service.request.**&lt;/div&gt;* attributes may contain sensitive information that should not be sent to New Relic. A fix has been made to disable the collection of these parameters during the error collection. Customers are encouraged to upgrade to the latest version of the .NET agent.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Only .NET agents with Error Analytics and WCF applications are affected.&lt;/li&gt;
&lt;li&gt;All service request attributes are disabled in High-security mode.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;Users who are affected and unable to upgrade may choose to manually configure the .NET agent to not capture service request parameters. Users can exclude &lt;div&gt;**service.request.**&lt;/div&gt;* attributes from the &lt;div&gt;&lt;strong&gt;errorCollector&lt;/strong&gt;&lt;/div&gt; stanza in their newrelic.config file.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;&amp;#x3C;attributes enabled=&quot;true&quot;&gt;
     &amp;#x3C;exclude &gt; service.request.*&amp;#x3C;/exclude&gt;
 &amp;#x3C;/attributes&gt;
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;For details please refer to our &lt;a href=&quot;/docs/agents/net-agent/installation-configuration/net-agent-configuration#error_collector&quot;&gt;.NET agent Error Collector configuration&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation-configuration/upgrade-net-agent&quot;&gt;Upgrade the .NET agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation-configuration/net-agent-configuration#error_collector&quot;&gt;.NET agent Error Collector configuration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://msdn.microsoft.com/en-us/library/dd456779(v=vs.110).aspx&quot;&gt;MSDN: Windows Communication Foundation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Node.js agent.</description></item><item><title><![CDATA[Security Bulletin NR17-03]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxNy0wMw==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr17-03</link><pubDate>Wed, 09 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for New Relic&apos;s Ruby agent fixes a vulnerability where the agent could unintentionally capture raw aggregate queries with MongoDB. New Relic recommends updating to the latest remediated version.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; February 9, 2017&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR17-03&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Low&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Ruby agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;3.13.1 (and greater)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;With MongoDB driver 2.1 (and greater)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/ruby-release-notes/ruby-agent-3181330&quot;&gt;3.18.1&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic’s Ruby agent version 3.13.1 added visibility to MongoDB queries with version 2.1 and greater of the MongoDB driver for Ruby. The agent&apos;s default setting for &lt;div&gt;&lt;strong&gt;mongo.obfuscate_queries&lt;/strong&gt;&lt;/div&gt; is true. This should cause the agent to obfuscate the values in Mongo queries before sending this information to New Relic. However, when using the aggregate pipeline with this version of the driver, the aggregate queries were not properly obfuscated.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Only customers who use version 2.1 and greater of the Ruby Driver for MongoDB are affected&lt;/li&gt;
&lt;li&gt;Aggregate queries generally do not contain sensitive information&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;Users who are affected and are unable to upgrade may choose to configure the Ruby agent to not capture mongoDB queries. Users can set &lt;div&gt;&lt;strong&gt;mongo.capture_queries&lt;/strong&gt;&lt;/div&gt; to false to prevent the agent from sending any information about the query.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://docs.mongodb.com/manual/core/aggregation-pipeline/&quot;&gt;MongoDB aggregate pipeline&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/ruby-agent/configuration/ruby-agent-configuration#mongo&quot;&gt;Ruby agent Mongo configuration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/ruby-agent/installation/ruby-agent-installation&quot;&gt;Ruby agent installation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;New Relic Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Node.js agent.</description></item><item><title><![CDATA[Security Bulletin NR17-06]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxNy0wNg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr17-06</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for New Relic&apos;s .NET agent fixes a vulnerability where the agent could unintentionally capture query parameters from external HTTP requests during a transaction trace.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Dec 18, 2017&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR17-06&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;5.11.0 - 6.19.330&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Transaction Trace&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes&quot;&gt;6.20.166.0&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic’s .NET agent captures a transaction trace to get detailed information about a single transaction including function calls, database calls, and external calls. By default, the agent should not collect the details of external calls (HTTP requests). Previous versions of the agent will collect the external http request parameters which may contain sensitive information. This release fixes the default behavior of the .NET agent to not collect the request parameters of external HTTP requests.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Query parameters used in external HTTP requests made using &lt;a href=&quot;https://msdn.microsoft.com/en-us/library/system.net.http.httpclient.aspx&quot;&gt;HttpClient&lt;/a&gt;, &lt;a href=&quot;https://msdn.microsoft.com/en-us/library/system.net.webrequest.aspx&quot;&gt;WebRequest&lt;/a&gt;, or other library that uses these calls.&lt;/li&gt;
&lt;li&gt;Transaction Trace enabled (default setting)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;Disable &lt;a href=&quot;/docs/agents/net-agent/configuration/net-agent-configuration#transaction_tracer&quot;&gt;transaction trace&lt;/a&gt; in the .NET agent configuration.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Upgrade the .NET agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic .NET agent.</description></item><item><title><![CDATA[Security Bulletin NR17-05]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxNy0wNQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr17-05</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for New Relic&apos;s Java agent fixes a vulnerability where the agent could unintentionally capture full SQL queries when SQL obfuscation is enabled.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; May 30, 2017&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR17-05&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Java agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;3.0.0-3.39.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;With SQL obfuscation&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/java-release-notes&quot;&gt;3.39.1&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic’s Java agent can be configured to obfuscate SQL query information. This setting is forced when &lt;a href=&quot;/docs/agents/manage-apm-agents/configuration/high-security-mode&quot;&gt;high-security mode&lt;/a&gt; is enabled. New Relic has found that, when an exception is thrown during the query, full SQL query information may still be captured as part of the error trace when SQL obfuscation is enabled. A fix has been made to disable the collection of this information during error collection. Customers are encouraged to upgrade to the &lt;a href=&quot;/docs/release-notes/agent-release-notes/java-release-notes&quot;&gt;latest version of the Java agent&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Only Java agents using SQL obfuscation are affected.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;New Relic has not identified any workarounds for this vulnerability.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/java-agent/installation/upgrade-java-agent&quot;&gt;Upgrade the Java agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic JavA agent.</description></item><item><title><![CDATA[Security Bulletin NR18-02]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wMg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-02</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Python agent to to improve SQL obfuscation with SQLite.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Jan 9, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-02&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Python agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;SQLite Obfuscation&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/python-release-notes&quot;&gt;2.100.0.84&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;The New Relic Python agent should obfuscate SQL query parameters. This fixes an issue in SQLite transaction tracing. If the query parameters were passed with double quoted strings, the agent was not properly obfuscating these parameters.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Generally, all SQL query parameter strings should be string literals and passed in single quotes. However, the Python SQLite API allows developers to use double quoted strings in some cases.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;If you are unable to upgrade the agent, you may be able to take the following actions to ensure you do not send any SQLite query parameters.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use single quote string literals with SQLite.&lt;/li&gt;
&lt;li&gt;Disable SQL collection by configuring &lt;a href=&quot;/docs/agents/python-agent/configuration/python-agent-configuration#txn-tracer-settings&quot;&gt;transaction_tracer.record_sql&lt;/a&gt; to &lt;code&gt;off&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/python-agent/installation-configuration/upgrade-python-agent&quot;&gt;Upgrade the Python agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Python agent.</description></item><item><title><![CDATA[Security Bulletin NR18-01]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wMQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-01</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Python agent to prevent a developer from accidentally capturing custom API parameters in High-security mode.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Jan 9, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Python agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;High-security mode&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/python-release-notes&quot;&gt;2.100.0.84&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;An internal audit of the &lt;a href=&quot;/docs/agents/python-agent/configuration/python-agent-configuration#high_security&quot;&gt;Python High-security mode&lt;/a&gt; revealed that the agent could send additional data to New Relic by customizing message params with the tracing APIs. Custom parameters may be sent to New Relic if a developer is passing additional parameters using either the function trace API or the message trace API. These should be disabled when High-security mode is enabled.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;This only affects customers that have enabled High-security mode with the Python agent and a developer is adding additional information to the tracing API.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;If you are unable to upgrade the agent, you may be able to take the following action to ensure you do not send any additional data in High-security mode.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Remove any custom params to the &lt;a href=&quot;/docs/agents/python-agent/python-agent-api/function_trace&quot;&gt;function trace API&lt;/a&gt; or the &lt;a href=&quot;/docs/agents/python-agent/python-agent-api/message-trace&quot;&gt;message trace API&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/python-agent/installation-configuration/upgrade-python-agent&quot;&gt;Upgrade the Python agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;New Relic Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Python agent.</description></item><item><title><![CDATA[Security Bulletin NR18-03]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wMw==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-03</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;Patch Kernel for Meltdown CPU Vulnerability&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Jan 12, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-03&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Synthetics Private Location&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Version 1.5.2 or lower&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;1.5.3&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;Private location images with synthetic monitoring have been updated with patches to protect against the Meltdown CPU vulnerability. Patches to address Spectre have yet to be released by Ubuntu.&lt;/p&gt;
&lt;p&gt;Additionally, customers can run in-place upgrades by accessing their private location and running:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;sudo apt-get update
sudo apt-get dist-upgrade
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;and subsequently rebooting their machine.&lt;/p&gt;
&lt;p&gt;Additional Information: &lt;a href=&quot;https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown&quot;&gt;Ubuntu Advisory&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Private locations run inside a customer’s data center and will be monitoring internal, trusted web applications.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;No known workarounds exist.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/synthetics/new-relic-synthetics/private-locations/private-locations-overview-monitor-internal-sites-add-new-locations&quot;&gt;Upgrade synthetic monitoring private location&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;New Relic Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for synthetic monitoring and private minion.</description></item><item><title><![CDATA[COVID-19]]></title><guid isPermaLink="false">Q09WSUQtMTk=</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/covid-19</link><pubDate>Thu, 14 Jan 2021 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;This document describes New Relic’s current operating plan and our commitment to keeping our products and services running for our customers.&lt;/p&gt;
&lt;h2&gt;New Relic COVID-19 Business Continuity Response and Actions [#statement]&lt;/h2&gt;
&lt;p&gt;In light of the current events related to COVID-19, we would like to update you regarding actions taken both to preserve the health and well-being of our staff and to address potential impact to the delivery of the software and services New Relic provides. We would also like to inform you of our approach to keeping ahead of any impact to both our own and our customer’s business. We greatly appreciate the trust you give to us for enabling the performance of your own applications and services.&lt;/p&gt;
&lt;p&gt;As a company with SaaS based roots, our people are well accustomed to the technology and practices that underlie the operation of a cloud native platform. Our services are delivered over the internet and in many cases rely on environments or systems under customer control. New Relic’s Site-Engineering teams have taken steps to enhance and refine monitoring for both uptime and a smooth customer experience. We do this with real-time data and deep visibility to make sure our products stay up and can be supported.&lt;/p&gt;
&lt;h2&gt;Helping our community [#community]&lt;/h2&gt;
&lt;p&gt;Businesses are suddenly having to scale more quickly than ever: grocery stores, medical websites, video conferencing tools, online education apps, media outlets, streaming video platforms, exercise apps, and more. Many companies are experiencing unforeseen pressure on their online services and systems, and some with only a portion of their usual staff. New Relic’s applications and services have been critical to helping companies go through their “biggest days ever.” That&apos;s why New Relic exists.&lt;/p&gt;
&lt;p&gt;So we are stepping up to help in a variety of ways. For example, we’ve &lt;a href=&quot;https://blog.newrelic.com/product-news/new-relic-covid-19-relief-program/&quot;&gt;announced the expansion of our existing nonprofit product donation program&lt;/a&gt; to allow any organization engaged in COVID-19 relief to use New Relic’s platform free of charge for 90 days, which can be extended based on the crisis duration.&lt;/p&gt;
&lt;h2&gt;Taking care of our people and our business [#business]&lt;/h2&gt;
&lt;p&gt;In order to mitigate and maintain minimal impact on employees, the New Relic Crisis Management team has implemented various policies and actions. Among the actions taken, we have suspended travel for all employees until we determine risk has significantly been reduced. We&apos;ve also moved all meetings and planned internal conferences to completely virtual formats. We’ve temporarily closed our offices globally and have implemented a “work-from-home policy”, in line with our business continuity plans to ensure the continued operation of all aspects of our business including business support and product delivery.&lt;/p&gt;
&lt;p&gt;Given our global presence, New Relic has a robust program in place to enable our workforce to work remotely with security and access to the services necessary to support our business and our customers. We’ve enhanced the capability for our engineers, already on-call and comfortable working remotely, by ramping up VPN capacity so they can continue on a fully remote basis.&lt;/p&gt;
&lt;p&gt;We reaffirm our commitment to the continued delivery of the capabilities our customers rely on for keeping their own systems performing. We’re making sure that customers can get support they need when they need it. We are partnering closely with customers to ensure they are prepared for managing their performance during these times.&lt;/p&gt;
&lt;h2&gt;COVID-19 resources [#resources]&lt;/h2&gt;
&lt;p&gt;We will continue to post relevant updates on this page. You can also read more at:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Read more about New Relic’s &lt;a href=&quot;https://blog.newrelic.com/product-news/new-relic-covid-19-relief-program/&quot;&gt;COVID-19 relief program&lt;/a&gt; for non-profits.&lt;/li&gt;
&lt;li&gt;You can also read &lt;a href=&quot;https://blog.newrelic.com/product-news/message-to-new-relic-customers-covid-19-support/&quot;&gt;Lew Cirne&apos;s recent blog post&lt;/a&gt; about the proactive steps we&apos;re taking to support you and your business during this time.&lt;/li&gt;
&lt;li&gt;If you have additional questions, contact us through your account executive or through &lt;a href=&quot;https://support.newrelic.com&quot;&gt;New Relic Support&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Information from New Relic&apos;s Crisis Management Team about COVID-19 (also known as novel coronavirus).</description></item><item><title><![CDATA[Security Bulletin NR18-06]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wNg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-06</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Node.js agent corrects an issues where the agent may capture all transaction attributes.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Mar 5, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-06&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Node.js agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/nodejs-release-notes/node-agent-280&quot;&gt;2.8.0&lt;/a&gt;, &lt;a href=&quot;/docs/release-notes/agent-release-notes/nodejs-release-notes/node-agent-290&quot;&gt;2.9.0&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/nodejs-release-notes&quot;&gt;2.9.1&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;The agent may capture all transaction attributes, even with High-security mode enabled on the account. This may include sensitive data attached to that transaction.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;New Relic has not identified any workarounds for this vulnerability.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/nodejs-agent/installation-configuration/upgrade-nodejs-agent&quot;&gt;Upgrade the Node.js agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Published: Thu, 10 Dec 2020 00:00:00 +0000.</description></item><item><title><![CDATA[Security Bulletin NR18-04]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wNA==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-04</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the .NET agent to prevent the capture of error messages during an error trace or error event when high-security mode is enabled.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Jan 22, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-04&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Error Trace&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes&quot;&gt;7.0.2.0&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic’s .NET error collection captures information about uncaught exceptions and sends them to New Relic. If High-security mode is enabled, the agent should not capture details of the error messages. This release fixes the agent for error traces and error events so that the error message is not sent to New Relic when High-security mode is enabled.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;This is a special feature of &lt;a href=&quot;/docs/agents/net-agent/configuration/net-agent-configuration#high_security_mode&quot;&gt;High-security mode&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;Disable &lt;a href=&quot;/docs/agents/net-agent/configuration/net-agent-configuration#error_collector&quot;&gt;error collection&lt;/a&gt; in the agent configuration or &lt;a href=&quot;/docs/agents/net-agent/configuration/net-agent-configuration#error-ignoreErrors&quot;&gt;ignore specific exceptions&lt;/a&gt; in the configuration.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Upgrade the .NET agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic .NET agent.</description></item><item><title><![CDATA[Security Bulletin NR18-05]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wNQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-05</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Infrastructure agent to prevent capturing command line parameters.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Feb 8, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-05&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Infrastructure agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;1.0.822 - 1.0.872&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Error trace&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/infrastructure-release-notes/infrastructure-agent-release-notes&quot;&gt;1.0.888&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic’s Infrastructure agent collects information about running processes, including process command lines. The default configuration setting &lt;code&gt;strip_command_line: true&lt;/code&gt; should prevent additional command line parameters from being sent to New Relic. With some command line options, the agent will capture the additional command line parameters even with that setting enabled.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Generally, sensitive data will not be part of the command line options.&lt;/li&gt;
&lt;li&gt;On Linux systems, the command line parameters will only be collected if the command line arguments (flags) have paths with a path separator element (&lt;code&gt;/&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;On Windows systems, the command line parameters will only be collected if the command line has switches starting with &lt;code&gt;/&lt;/code&gt; or &lt;code&gt;-&lt;/code&gt; and contain path separator elements (&lt;code&gt;\&lt;/code&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;The only solution for this issue is to &lt;a href=&quot;/docs/infrastructure/new-relic-infrastructure/installation/update-infrastructure-agent&quot;&gt;update the Infrastructure agent&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/infrastructure/new-relic-infrastructure/installation/update-infrastructure-agent&quot;&gt;Update the Infrastructure agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Infrastructure agent.</description></item><item><title><![CDATA[Security Bulletin NR18-07]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wNw==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-07</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Java, Python, and .NET agents corrects an issue where the agent may report DB query results to New Relic or re-issue an SQL statement.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Mar 7, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-07&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Remediated version&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Java agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/java-release-notes/java-agent-3261&quot;&gt;3.26.1&lt;/a&gt; to &lt;a href=&quot;/docs/release-notes/agent-release-notes/java-release-notes/java-agent-3470&quot;&gt;3.47.0&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;SQL query&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/java-release-notes&quot;&gt;3.47.1&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Python agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/python-release-notes/python-agent-110192&quot;&gt;1.1.0.192&lt;/a&gt; to &lt;a href=&quot;/docs/release-notes/agent-release-notes/python-release-notes/python-agent-2106087&quot;&gt;2.106.0.87&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;SQL query&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/python-release-notes/python-agent-2106188&quot;&gt;2.106.1.88&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes/net-agent-251120&quot;&gt;2.5.112.0&lt;/a&gt; to &lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes/net-agent-62100&quot;&gt;6.21.0.0&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes/net-agent-7020&quot;&gt;7.0.2.0&lt;/a&gt; to &lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes/net-agent-712290&quot;&gt;7.1.229&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;SQL query with MySQL&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/python-release-notes&quot;&gt;8.0 or 6.22 (For .NET Framework 3.5)&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;New Relic agents run explain plans for &lt;a href=&quot;/docs/apm/applications-menu/monitoring/viewing-slow-query-details&quot;&gt;Slow Transaction Traces&lt;/a&gt; and Slow SQL Queries. Previous versions of the agents would run an explain plan on the SQL query by prepending the query with &lt;code&gt;explain&lt;/code&gt;. This may cause an issue when there are multiple statements separated by semicolons in a single query. The first statement in the string returns its explain plan, but any subsequent statement after that may execute as a general SQL statement. Depending on the language, library, and database, the agent may return the results of the additional statements to New Relic. It is also possible that the additional statements could execute an additional &lt;code&gt;INSERT&lt;/code&gt; or &lt;code&gt;UPDATE&lt;/code&gt; command. With this security update, New Relic agents will no longer run explain plans on any query that contains a semicolon as a statement separator.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Many SQL libraries and language frameworks prevent various forms of executing multiple statements with &lt;code&gt;explain&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Explain plans are off for newer versions of the .NET agent.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;Disable &lt;code&gt;explain&lt;/code&gt; plans with transaction tracer in the agent configuration:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/java-agent/configuration/java-agent-configuration-config-file#h2-Transaction-tracer&quot;&gt;&lt;code&gt;transaction_tracer&lt;/code&gt;&lt;/a&gt; for Java&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/configuration/net-agent-configuration#transaction_tracer&quot;&gt;&lt;code&gt;transactiontracer&lt;/code&gt;&lt;/a&gt; for .NET&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/python-agent/configuration/python-agent-configuration#txn-tracer-settings&quot;&gt;&lt;code&gt;transaction_tracer&lt;/code&gt;&lt;/a&gt; for Python&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Upgrade the .NET agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/java-agent/installation/upgrade-java-agent&quot;&gt;Upgrade the Java agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/python-agent/installation-configuration/upgrade-python-agent&quot;&gt;Upgrade the Python agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Java, Python, and .NET agents.</description></item><item><title><![CDATA[Security Bulletin NR18-08]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wOA==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-08</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Node.js agent fixes a vulnerability in the &lt;code&gt;https-proxy-agent&lt;/code&gt; module.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; Apr 12, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-08&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Low&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Node.js agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;All&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/nodejs-release-notes&quot;&gt;4.0.0&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;The New Relic Node.js agent uses &lt;code&gt;https-proxy-agent&lt;/code&gt; as an option to send data to the &lt;a href=&quot;/docs/using-new-relic/welcome-new-relic/getting-started/glossary#collector&quot;&gt;New Relic collector&lt;/a&gt; via an HTTP or HTTPS proxy server. The Node.js agent used a version of this module which was vulnerable to Uninitialized Memory Exposure and Denial of Service. This fix updates the module to a version that is not vulnerable.&lt;/p&gt;
&lt;h2&gt;Mitigating Circumstances [#workarounds]&lt;/h2&gt;
&lt;p&gt;Triggering this security vulnerability requires control of the agent proxy authentication configuration.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://snyk.io/vuln/npm:https-proxy-agent:20180402&quot;&gt;Snyk: &lt;code&gt;https-proxy-agent&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://hackerone.com/reports/319532&quot;&gt;HackerOne Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;New Relic has not identified any workarounds for this vulnerability.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/nodejs-agent/installation-configuration/upgrade-nodejs-agent&quot;&gt;Upgrade the Node.js agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Published: Thu, 10 Dec 2020 00:00:00 +0000.</description></item><item><title><![CDATA[Security Bulletin NR18-10]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0xMA==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-10</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Windows Infrastructure agent corrects an issue where a hard-coded file path may allow a malicious user to override the agent configuration.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; June 18, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-10&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Windows Infrastructure agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;From 1.0.682 to 1.0.912&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;1.0.934&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;The New Relic Windows Infrastructure agent looks in specific locations for configuration files. A Unix-only file path was included in the Windows agent which could allow a malicious user to override the configuration file. With this security update, the Windows Infrastructure agent will no longer look in a Unix-specific location.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;This vulnerability only exists on Windows systems.&lt;/li&gt;
&lt;li&gt;This vulnerability requires existing access to the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Upgrade the .NET agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/java-agent/installation/upgrade-java-agent&quot;&gt;Upgrade the Java agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/python-agent/installation-configuration/upgrade-python-agent&quot;&gt;Upgrade the Python agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Java, Python, and .NET agents.</description></item><item><title><![CDATA[Security Bulletin NR18-09]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0wOQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-09</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Java agent corrects an issue where the agent may not properly obfuscate all SQL query information when &lt;code&gt;record_sql&lt;/code&gt; is set to &lt;code&gt;off&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; May 2, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-09&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Low&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected versions&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated Version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Java agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;All&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/release-notes/agent-release-notes/java-release-notes&quot;&gt;4.1.0&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;The New Relic Java agent runs explain plans for &lt;a href=&quot;/docs/apm/applications-menu/monitoring/viewing-slow-query-details&quot;&gt;slow transaction traces&lt;/a&gt; and slow SQL queries. When a customer has set &lt;code&gt;record_sql&lt;/code&gt; to &lt;code&gt;off&lt;/code&gt;, is running PostgreSQL, and has an explain plan run, the agent may not properly obfuscate all information in the query.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;Disable &lt;code&gt;explain&lt;/code&gt; plans with &lt;code&gt;transaction_tracer&lt;/code&gt; in the &lt;a href=&quot;/docs/agents/java-agent/configuration/java-agent-configuration-config-file#h2-Transaction-tracer&quot;&gt;Java agent configuration&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/java-agent/installation/upgrade-java-agent&quot;&gt;Upgrade the Java agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Java, Python, and .NET agents.</description></item><item><title><![CDATA[Security Bulletin NR18-11]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0xMQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-11</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the Windows Infrastructure agent corrects an issue where the agent may execute privileged binaries in the system path.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; October 8, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-11&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Windows Infrastructure agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;From 1.0.829 to 1.0.1002&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;1.0.1015&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;The New Relic Windows Infrastructure agent may execute system commands as part of its normal operation. In affected versions of the Windows Infrastructure agent, a malicious user with permission to change the system PATH could potentially abuse this functionality to run arbitrary binaries with elevated privileges.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;This vulnerability only exists on Windows systems.&lt;/li&gt;
&lt;li&gt;This vulnerability requires existing access to the system and permission to modify the system PATH.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;/docs/infrastructure/new-relic-infrastructure/installation/update-infrastructure-agent&quot;&gt;Upgrade to the latest New Relic Windows Infrastructure agent.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;For more help [#more_help]&lt;/h2&gt;
&lt;p&gt;Additional documentation resources include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/infrastructure/new-relic-infrastructure/installation/update-infrastructure-agent&quot;&gt;Upgrade the Infrastructure agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Upgrade the .NET agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/java-agent/installation/upgrade-java-agent&quot;&gt;Upgrade the Java agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/python-agent/installation-configuration/upgrade-python-agent&quot;&gt;Upgrade the Python agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/security&quot;&gt;NR Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded><description>Security vulnerability update for New Relic Java, Python, and .NET agents.</description></item><item><title><![CDATA[Security Bulletin NR18-12]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOC0xMg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr18-12</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the New Relic Infrastructure agent for Windows corrects an issue where the agent may follow unprivileged hard links or junction folders.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; November 28, 2018&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR18-12&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Low&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Windows Infrastructure agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C;1.0.1052&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;1.0.1052&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;The New Relic Windows Infrastructure agent writes to various files as part of its normal operation. An unprivileged user may be able to use Windows hard link or folder junction policies to point to files in privileged locations. This could cause the agent to create or append data to privileged files.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;This vulnerability only exists on Windows systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;/docs/infrastructure/new-relic-infrastructure/installation/update-infrastructure-agent&quot;&gt;Update to the latest New Relic Infrastructure agent for Windows.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic Infrastructure agent for Windows</description></item><item><title><![CDATA[Security Bulletin NR19-01]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOS0wMQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr19-01</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the .NET agent corrects an issue where query strings may be captured when using OpenRasta instrumentation.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; January 9, 2019&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR19-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C;8.12.216.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;8.12.216.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;When using OpenRasta instrumentation, the full URL may be captured on instrumented requests. This may result in query strings being collected which can contain sensitive information&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;This vulnerability only exists when using OpenRasta instrumentation.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Update to the latest New Relic .NET agent.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Disable OpenRasta instrumentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic .NET agent.</description></item><item><title><![CDATA[Security Bulletin NR19-02]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOS0wMg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr19-02</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;Request parameters are added as segment attributes, even when the agent is configured with High-security mode or Configurable Security Policies. This may result in unexpected data being collected.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; April 1, 2019&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR19-02&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Node.js agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;3.0.0-5.6.2&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;5.6.3&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;By design, request parameters are added as segment attributes. Request parameters should be ignored when the agent is configured with High-security mode or the &lt;code&gt;attributes_include&lt;/code&gt; Configurable Security Policy.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;Only affects agents configured with High-security mode or the &lt;code&gt;attributes_include&lt;/code&gt; Configurable Security Policy.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Set &lt;code&gt;attributed.enabled&lt;/code&gt; to &lt;code&gt;false&lt;/code&gt; to prevent all attributes from being collected.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/nodejs-agent/installation-configuration/upgrade-nodejs-agent&quot;&gt;Update to the latest New Relic Node.js agent.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic .NET agent.</description></item><item><title><![CDATA[Security Bulletin NR19-05]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOS0wNQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr19-05</link><pubDate>Thu, 14 Jan 2021 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the .NET agent corrects an issue where metric names are not properly identified for SQL queries with parameters that have been manually constructed.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; August 26, 2019&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR19-05&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; 8.18.241.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;8.18.241.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; 6.24.0.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;6.24.0.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;When manually constructing SQL queries that execute stored procedures with parameters, a missing space before the first value may cause the agent to incorrectly identify the metric name. This may result in sensitive data being included in metric names.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;This vulnerability only affects applications that manually assemble SQL queries with parameters, without using parameterized queries. It’s recommended that applications use parameterized queries to help avoid introducing SQL injection vulnerabilities.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Utilize parameterized queries, this also helps to prevent &lt;a href=&quot;https://docs.microsoft.com/en-us/sql/relational-databases/security/sql-injection&quot;&gt;SQL injection vulnerabilities&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Update to the latest New Relic .NET agent.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic .NET agent.</description></item><item><title><![CDATA[Security Bulletin NR19-03]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOS0wMw==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr19-03</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the .NET agent corrects an issue where certain character combinations may prevent query obfuscation when instrumenting Microsoft SQL Server.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; April 22, 2019&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR19-03&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; 8.15.455.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;8.15.455.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; 6.23.0.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;6.23.0.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;When configured to obfuscate SQL queries, the .NET agent will pass all queries through an obfuscation function. Due to the way Microsoft SQL Server sanitizes queries, certain character combinations may be generated that could cause this obfuscation to fail.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;This vulnerability only exists when instrumenting Microsoft SQL Server and query obfuscation is enabled.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Disable database instrumentation.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Update to the latest New Relic .NET agent.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic .NET agent.</description></item><item><title><![CDATA[Security Bulletin NR20-01]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIyMC0wMQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr20-01</link><pubDate>Thu, 14 Jan 2021 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for the .NET agent corrects an issue where full SQL queries may be sent to the agent log.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; January 16, 2020&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR20-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/apm/agents/net-agent/configuration/net-agent-configuration/&quot;&gt;.NET Core agent&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;5.16.71.0 - 8.21.34.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;8.23.107.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;a href=&quot;/docs/agents/net-agent/getting-started/compatibility-requirements-net-framework-agent&quot;&gt;.NET Framework agent&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;5.16.71.0 - 8.21.34.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;6.25.0.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;In order to generate explain plans, a copy of the SQL query is created and the query is reissued with a request for the execution plan. If the explain plan fails, the agent may log the full SQL statement which could include the parameter values.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;The agent will only log this information when set to the &lt;code&gt;DEBUG&lt;/code&gt; or &lt;code&gt;FINEST&lt;/code&gt; logging levels.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Ensure that logging level is not set to &lt;code&gt;DEBUG&lt;/code&gt; or &lt;code&gt;FINEST&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Disable capturing of explain plans.&lt;/li&gt;
&lt;li&gt;Ensure that file location of log files is secured.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/net-agent/installation/update-net-agent&quot;&gt;Update to the latest New Relic .NET agent.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and your data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see our documentation about &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic .NET agent,  January 16, 2020</description></item><item><title><![CDATA[Security Bulletin NR19-04]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIxOS0wNA==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr19-04</link><pubDate>Thu, 14 Jan 2021 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update for private minions corrects an issue where the minion may generate local log files containing sensitive data.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; July 22, 2019&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR19-04&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Rating:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following minion versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Notes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Containerized private minions&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; 2.2.6&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.2.6&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;VM private minions (legacy)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;All&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Containerized private minions 2.2.6&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;Synthetic monitoring&apos;s private minions create logs automatically to aid in debugging. In earlier minion versions, these logs could contain sensitive data such as secure credentials being used in synthetic scripts. These logs are stored locally on the minion, but this information is now filtered out.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;/docs/synthetics/new-relic-synthetics/private-locations/install-containerized-private-minions-cpms#install-update&quot;&gt;Update to the latest containerized private minions.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;Reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Published: Thu, 14 Jan 2021 00:00:00 +0000.</description></item><item><title><![CDATA[Security Bulletin NR21-02]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIyMS0wMg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-02</link><pubDate>Mon, 26 Apr 2021 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update to the Java agent reconfigured the YAML parser to include a SafeConstructor, which removes the ability to have limited user controlled code executed.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; April 26th, 2021&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR21-02&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Low&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Java agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; 6.4.2&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;6.5.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;A specified notation, when parsed through an unsafe &lt;code&gt;Yaml.load()&lt;/code&gt; call, will create a new Java object and invoke its constructor, potentially leading to code execution. An attacker would have to have access to the agent’s host to edit the &lt;code&gt;newrelic.yml&lt;/code&gt; file to include a crafted payload that would execute arbitrary code once the agent starts up.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;This vulnerability requires an attacker already having access to the host in order to modify the &lt;code&gt;newrelic.yml&lt;/code&gt; config file on a victim’s machine, which in itself is a mitigating factor. However, there are additional steps that you can take to either completely patch this issue or harden your systems against it:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Update your Java agent to patch this vulnerability&lt;/li&gt;
&lt;li&gt;Revoke write privileges to your &lt;code&gt;newrelic.yml&lt;/code&gt; file&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/java-agent/installation/update-java-agent/&quot;&gt;Update to the latest New Relic Java agent.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and your data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see our documentation about &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic Java agent, April 26, 2021</description></item><item><title><![CDATA[Security Bulletin NR20-02]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIyMC0wMg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr20-02</link><pubDate>Thu, 14 Jan 2021 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;If the Node.js agent is configured to exclude the &lt;code&gt;request.uri&lt;/code&gt; attribute, it will still capture the URI in transaction traces. This can be problematic for certain customers in environments where sensitive information is included in the URI.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; August 20, 2020&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR20-02&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Node.js agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; 6.12.1&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;6.12.1&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;Even when users configure the Node.js agent to exclude the &lt;code&gt;request.uri&lt;/code&gt; attribute, the agent will still capture the URI in transaction traces. This allows authenticated account users to view the URI anywhere transaction trace details can be viewed via New Relic One or queries. This includes (but is not limited to) the &lt;div&gt;&lt;strong&gt;Transaction traces&lt;/strong&gt;&lt;/div&gt; section of the &lt;div&gt;&lt;strong&gt;Transactions&lt;/strong&gt;&lt;/div&gt; page, the &lt;div&gt;&lt;strong&gt;Transaction trace details&lt;/strong&gt;&lt;/div&gt;, and the query builder in the UI.&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;This will only affect Node.js agents configured to exclude the &lt;code&gt;request.uri&lt;/code&gt; attribute.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/agents/nodejs-agent/installation-configuration/update-nodejs-agent&quot;&gt;Update to the latest New Relic Node.js agent.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and your data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see our documentation about &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for New Relic Node.js agent, August 20, 2020</description></item><item><title><![CDATA[Security Bulletin NR21-01]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIyMS0wMQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-01</link><pubDate>Mon, 22 Mar 2021 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;A security update to the browser agent will detect &lt;code&gt;file://&lt;/code&gt; URI schemes and stop any further execution and data collection if found.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; March 9th, 2021&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR21-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Medium&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;The following New Relic agent versions are affected:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Name&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Remediated version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Browser agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&amp;#x3C; v1205&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;v1208&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;Browsers can render local files on a host machine by using the &lt;code&gt;file://&lt;/code&gt; URI scheme outlined in RFC 8089. During the agent&apos;s harvest cycle , this &lt;code&gt;file://&lt;/code&gt; URI will be recorded as the pageURL datapoint. This may result in the collection of potentially sensitive data included in the local file path, such as directory path for the saved webpage and any name or company information in the directory path. More information regarding the &lt;code&gt;file://&lt;/code&gt; URI can be found in the &lt;a href=&quot;https://tools.ietf.org/html/rfc8089&quot;&gt;RFC 8089&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Mitigating factors [#factors]&lt;/h3&gt;
&lt;p&gt;A person must both download a webpage with the browser agent configured and open the file in a browser. HTML files loaded without the &lt;code&gt;file://&lt;/code&gt; URI scheme are not affected.&lt;/p&gt;
&lt;h2&gt;Workarounds&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/browser/new-relic-browser/installation/update-browser-agent&quot;&gt;Update to the latest &lt;div&gt;&lt;/div&gt; agent.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and your data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see our documentation about &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Security vulnerability update for browser monitoring agent, March 09, 2021</description></item><item><title><![CDATA[Apache Log4j Critical Vulnerability CVE-2021-44228 - Java]]></title><guid isPermaLink="false">QXBhY2hlIExvZzRqIENyaXRpY2FsIFZ1bG5lcmFiaWxpdHkgQ1ZFLTIwMjEtNDQyMjggLSBKYXZh</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-03</link><pubDate>Fri, 10 Dec 2021 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;&lt;div&gt;&lt;strong&gt;Versions affected:&lt;/strong&gt;&lt;/div&gt; All agent versions between (a) 4.12.0 and 6.5.1; and (b) 7.0.0 and 7.4.1&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Fix versions:&lt;/strong&gt;&lt;/div&gt; 6.5.2, 6.5.3, 6.5.4, 7.4.2, 7.4.3 and 7.5.0&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR21-03&lt;/p&gt;
&lt;p&gt;We have determined that the new vulnerability identified (CVE-2021-44832) does NOT affect New Relic&apos;s Java agent, unless an additional attack vector would allow write permissions to the host system. Nonetheless, newer versions of the New Relic Java agent will use the latest Apache versions of log4j (currently versions 2.17.1 (Java 8) and 2.12.4 (Java 7), which patches CVE-2021-44832).&lt;/p&gt;
&lt;p&gt;We have also determined that New Relic&apos;s Java agent is NOT vulnerable to either CVE-2021-45046 or CVE-2021-45105. This is because the agent&apos;s use of log4j sits behind a wrapper interface that does not use or support Thread Context Map input data, a required aspect of the vulnerability. However, we recommend updating to &lt;em&gt;at least&lt;/em&gt; the 6.5.2 or 7.4.2 release to ensure comprehensive protection against CVE-2021-44228.&lt;/p&gt;
&lt;p&gt;As new versions of log4j become available, we will continue to release new versions of the agent.&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;New Relic Java agent version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Apache log4j version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;6.5.1&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.15.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;6.5.2&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.12.2&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;6.5.3&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.12.3&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;6.5.4&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.12.4&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;7.4.1&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.15.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;7.4.2&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.16.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;7.4.3&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.17.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;7.5.0+&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.17.1&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;New Relic has released new versions of the Java agent to address critical vulnerabilities in the open source log4j framework that could allow a malicious actor to exfiltrate data or execute arbitrary code using log messages or log message parameters.&lt;/p&gt;
&lt;p&gt;New Relic will update this Security Bulletin and our customer guidance as new information becomes available.&lt;/p&gt;
&lt;h2&gt;Action items [#action]&lt;/h2&gt;
&lt;p&gt;To remediate CVE 2021-44228 in the New Relic Java agent, we recommend customers upgrade to agent release 6.5.2 or higher (requires Java 7 or higher) or 7.4.2 or higher (requires Java 8 or higher) as soon as possible.&lt;/p&gt;
&lt;p&gt;If you have already upgraded to agent versions 6.5.2 or 7.4.2, you are protected against CVE 2021-44228 and do not have to upgrade again at this time. We have determined that New Relic&apos;s Java agent is NOT susceptible to either CVE-2021-45046 or CVE-2021-45105, as the agents use of log4j sits behind a wrapper interface that does not use or support Thread Context Map input data, a required aspect of the vulnerability. We recommend updating to at least the 6.5.2 or 7.4.2 release to ensure comprehensive protection against CVE-2021-44228.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;If you are on a version of the agent earlier than 6.5.2 or 7.4.2, or cannot upgrade your agent version, we strongly recommend you disable agent logging.&lt;/p&gt;&lt;/div&gt;
&lt;h3&gt;How to disable the Java agent logging [#disable]&lt;/h3&gt;
&lt;p&gt;You can set your Java agent logging level to &lt;code&gt;OFF&lt;/code&gt; to remediate CVE-2021-44228. To do this, use any of the following options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Modify your local agent configuration file (search for the &lt;code&gt;log_level&lt;/code&gt; parameter) (no restart is required)&lt;/li&gt;
&lt;li&gt;Define the &lt;code&gt;newrelic.config.log_level=OFF&lt;/code&gt; system property (restart required)&lt;/li&gt;
&lt;li&gt;Set the &lt;code&gt;NEW_RELIC_LOG_LEVEL=OFF&lt;/code&gt; environment variable  (restart required)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can verify that agent logging has been disabled by checking the agent log file. You should not see any new messages being written.&lt;/p&gt;
&lt;p&gt;Disabling the Java agent logging does not affect the functionality of the agent, and there will be no degradation in observability.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Note:&lt;/strong&gt;&lt;/div&gt; This workaround is recommended only as a temporary solution until you can update your agent version.&lt;/p&gt;
&lt;p&gt;We will share more information, and additional steps for remediation, if the situation changes.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;If you use log4j directly in your applications, be sure to carefully review the &lt;a href=&quot;https://logging.apache.org/log4j/2.x/security.html&quot;&gt;Apache Log4j Security Vulnerabilities&lt;/a&gt;. This page provides remediation details for you to consider.&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h3&gt;Containerized private minions [#CPM]&lt;/h3&gt;
&lt;p&gt;The above step will remediate your New Relic Java agent only. You may also need to update your New Relic Containerized Private Minion. Please refer to &lt;a href=&quot;/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-04/&quot;&gt;NR21-04&lt;/a&gt; for more information.&lt;/p&gt;
&lt;h2&gt;Technical vulnerability information [#technical-info]&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228&quot;&gt;CVE-2021-44228 CVSS 10.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046&quot;&gt;CVE-2021-45046 CVSS 9.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105&quot;&gt;CVE-2021-45105 CVSS 7.5&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832&quot;&gt;CVE-2021-44832 CVSS 6.6&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/blog/nerdlog/security-guidance-for-log4j&quot;&gt;Security guidance for New Relic customers related to Apache Log4j vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/blog/how-to-relic/new-relic-log4j-detection&quot;&gt;How to help identify systems with vulnerable log4j versions using New Relic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://logging.apache.org/log4j/2.x/security.html&quot;&gt;Apache log4j Security Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://discuss.newrelic.com/t/log4j-zero-day-vulnerability-and-the-new-relic-java-agent/170322&quot;&gt;New Relic Support Forum&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Frequently asked questions [#faq]&lt;/h2&gt;
&lt;div&gt;&lt;div&gt;&lt;p&gt;Please implement the &lt;a href=&quot;#action&quot;&gt;recommended workaround in this bulletin&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Agent version information is displayed within the &lt;div&gt;&lt;strong&gt;Environment&lt;/strong&gt;&lt;/div&gt; page within your New Relic One dashboard. See our &lt;a href=&quot;/docs/apm/agents/manage-apm-agents/troubleshooting/get-environment-data-about-your-apm-app&quot;&gt;docs page&lt;/a&gt; for more information.&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Most of our customers are using agent versions 6.x or 7.x and we encourage customers to use newer versions of our agent to ensure they have the best experience. If you are not able to upgrade your agent version, please implement the workaround outlined above.&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;If you have already upgraded to agent versions 6.5.1 or 7.4.1, we recommend also disabling agent logging, as the fix for CVE-2021-44228 was incomplete in log4j v2.15.0. We recommend updating to at least the Java agent 6.5.2 or 7.4.2 release to ensure comprehensive protection against this critical vulnerability.  While we have released a newer Java agent with log4j 2.17.1 (Java 8) and 2.12.4 (Java 7), we have determined that updating to 6.5.3+ or 7.4.3+ is not critical as New Relic&apos;s Java agent is not susceptible to either CVE-2021-45046 or CVE-2021-45105.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Publication history [#pub-history]&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;March 3, 2022: NR21-03 Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Updated references to Java agent versions 6.5.4 &amp;#x26; 7.5.0&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 29, 2021: NR21-03 Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Updated to reflect agent findings on CVE-2021-44832&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 22, 2021: NR21-03 Major Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;New fix versions 6.5.3 and 7.4.3 available to address CVE-2021-44228, CVE-2021-45046, and CVE-2021-45105.&lt;/li&gt;
&lt;li&gt;Addition of exploitability risk assessments for each vulnerability, to aid customers in making remediation decisions.&lt;/li&gt;
&lt;li&gt;Addition of content regarding lack of functionality impact for customers that disable agent logging.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 17, 2021: NR21-03 Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Change in severity and technical description of CVE-2021-45046&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 16, 2021: NR21-03 Major Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;New fix version 6.5.2 available to address both CVE-2021-44228 and CVE-2021-45046.&lt;/li&gt;
&lt;li&gt;Change in guidance regarding sufficiency of log4j version 2.15.0 to protect against exploitation of CVE-2021-44228.&lt;/li&gt;
&lt;li&gt;Change in recommended workaround.&lt;/li&gt;
&lt;li&gt;Update of NIST technical description of CVE-2021-44228.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 14, 2021: NR21-03 Major Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;New fix version 7.4.2 available to address both CVE-2021-44228 and CVE-2021-45046.&lt;/li&gt;
&lt;li&gt;Updated to include an additional workaround option.&lt;/li&gt;
&lt;li&gt;Updated to provide clarity between New Relic Java agent updates and the best practices customers should take to secure their applications.&lt;/li&gt;
&lt;li&gt;Added technical vulnerability descriptions and CVSS scores from the National Institute of Standards and Technology (NIST).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 13, 2021: NR21-03 updated to include more explicit workaround guidance and FAQs&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 10, 2021: NR21-03 published&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and your data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see our documentation about &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Apache Log4j CVE-2021-44228, Security Bulletin NR21-03 (Java)</description></item><item><title><![CDATA[Containerized Private Minion Removes Log4j Version 1.2.17 subdependency]]></title><guid isPermaLink="false">Q29udGFpbmVyaXplZCBQcml2YXRlIE1pbmlvbiBSZW1vdmVzIExvZzRqIFZlcnNpb24gMS4yLjE3IHN1YmRlcGVuZGVuY3k=</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr22-01</link><pubDate>Fri, 14 Jan 2022 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;&lt;div&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/div&gt; 3.0.59 and earlier&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Fixed In:&lt;/strong&gt;&lt;/div&gt; 3.0.60&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability Identifier:&lt;/strong&gt;&lt;/div&gt; NR22-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Summary [#summary]&lt;/h2&gt;
&lt;p&gt;New Relic released Containerized Private Minion (CPM) version 3.0.60 to specifically remove subdependencies on log4j version 1.2.17.&lt;/p&gt;
&lt;p&gt;New Relic has determined that log4j version 1.2.17 was included in subdependencies of our build package for Containerized Private Minions prior to version 3.0.60. Log4j version 1.x has outstanding high and critical CVEs of &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2021-4104&quot;&gt;CVE-2021-4104&lt;/a&gt; and &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2019-17571&quot;&gt;CVE-2019-17571&lt;/a&gt; and no longer receives support from Apache Foundation to address these issues.&lt;/p&gt;
&lt;h2&gt;Action Items [#action]&lt;/h2&gt;
&lt;p&gt;We strongly recommend customers upgrade all their Containerized Private Minions to &lt;a href=&quot;/docs/release-notes/synthetics-release-notes/containerized-private-minions-release-notes/containerized-private-minion-cpm-3060&quot;&gt;version 3.0.60&lt;/a&gt; or later as soon as possible. This version has fully excluded all use of log4j version 1.x from dependencies. You may update your CPM through Helm Charts version 1.0.48.&lt;/p&gt;
&lt;p&gt;This step will help remediate the log4j vulnerability in your New Relic Containerized Private Minion (CPM) only. For additional security guidance regarding log4j in other New Relic products, please review New Relic&apos;s Security Bulletins on our &lt;a href=&quot;/docs/security/security-privacy/information-security/security-bulletins/&quot;&gt;documentation page&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;Customers using log4j directly in their applications should carefully review the &lt;a href=&quot;https://logging.apache.org/log4j/2.x/security.html&quot;&gt;Apache Log4j Security Vulnerabilities page&lt;/a&gt; for remediation details that should be considered.&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h2&gt;Technical Links [#technical]&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/synthetics/synthetic-monitoring/private-locations/install-containerized-private-minions-cpms/#install&quot;&gt;Install or update CPM versions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2021-4104&quot;&gt;CVE-2021-4104&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2019-17571&quot;&gt;CVE-2019-17571&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Frequently Asked Questions [#faq]&lt;/h2&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;I&apos;ve updated to Containerized Private Minion (CPM) version 3.0.58 already, do I need to update to version 3.0.60?&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;Yes, New Relic strongly recommends updating at this time to address critical vulnerabilities in log4j subdependencies identified in the Containerized Private Minion build package. Apache Foundation has issued a recommendation to deprecate all use of log4j version 1.x due to the project being out of support and having outstanding vulnerabilities. CPM 3.0.60 and later versions are the only CPM versions available without any use of log4j version 1.x.&lt;/p&gt;
&lt;h2&gt;Publication History [#history]&lt;/h2&gt;
&lt;p&gt;January 13, 2022 - NR22-01 Published&lt;/p&gt;</content:encoded><description>Containerized Private Minion Removes Log4j Version 1.2.17 subdependency, Security Bulletin NR22-01</description></item><item><title><![CDATA[Apache Log4j Critical Vulnerability CVE-2021-44228 - CPM]]></title><guid isPermaLink="false">QXBhY2hlIExvZzRqIENyaXRpY2FsIFZ1bG5lcmFiaWxpdHkgQ1ZFLTIwMjEtNDQyMjggLSBDUE0=</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-04</link><pubDate>Tue, 14 Dec 2021 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;New Relic released Containerized Private Minion (CPM) &lt;a href=&quot;/docs/release-notes/synthetics-release-notes/containerized-private-minions-release-notes/containerized-private-minion-cpm-3058/&quot;&gt;version 3.0.58&lt;/a&gt; on 2021-12-21 to address critical vulnerabilities CVE-2021-44228,CVE-2021-45046, and CVE-2021-45105 in the open source Apache Log4j framework. A malicious actor may be able to execute arbitrary code using log messages or log message parameters.&lt;/p&gt;
&lt;p&gt;New Relic also released Helm Charts version 1.0.46 on 2021-12-21 to address these vulnerabilities. Helm Charts version 1.0.46 contains the CPM version 3.0.58.&lt;/p&gt;
&lt;p&gt;New Relic will update this Security Bulletin and our customer guidance as new information becomes available.&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR21-04&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; Critical&lt;/p&gt;
&lt;h2&gt;Affected software [#affected]&lt;/h2&gt;
&lt;p&gt;Versions affected: All supported containerized private minion (CPM) versions prior to 3.0.58&lt;/p&gt;
&lt;p&gt;Fixed version:  3.0.58, also available through Helm Charts version 1.0.46&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;New Relic Containerized Private Minion (CPM) version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Apache log4j version&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;3.0.55&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.15.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;3.0.57&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.16.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;3.0.58&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;2.17.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;If you use Helm Charts to update your CPM configurations, you will want to implement New Relic Helm Charts version 1.0.46. This will update your CPM to version 3.0.58.&lt;/p&gt;
&lt;h2&gt;Action items [#action]&lt;/h2&gt;
&lt;p&gt;To remediate CVE 2021-44228, CVE 2021-45046, and CVE 2021-45105 in the New Relic Containerized Private Minion, we recommend customers upgrade to version 3.0.58 as soon as possible. This version has been updated to use the remediated 2.17.0 version of the Apache Log4j framework. You may update your CPM through Helm Charts version 1.0.46.&lt;/p&gt;
&lt;p&gt;This step will remediate your New Relic Containerized Private Minion (CPM) only. You may also need to update your New Relic Java agent. Please refer to &lt;a href=&quot;/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-03&quot;&gt;NR21-03&lt;/a&gt; for more information.&lt;/p&gt;
&lt;div&gt;&lt;p&gt;&lt;strong&gt;Customers using log4j directly in their applications should carefully review the &lt;a href=&quot;https://logging.apache.org/log4j/2.x/security.html&quot;&gt;Apache Log4j Security Vulnerabilities&lt;/a&gt; page for remediation details that should be considered.&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h2&gt;Vulnerability information [#vuln-info]&lt;/h2&gt;
&lt;p&gt;A high level vulnerability was publicly disclosed for the log4j framework on 2021-12-09. An attacker is able to execute arbitrary code using log messages or log message parameters.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228&quot;&gt;CVE-2021-44228 CVSS 10.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046&quot;&gt;CVE-2021-45046 CVSS 9.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105&quot;&gt;CVE-2021-45105 CVSS 7.5&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/blog/nerdlog/security-guidance-for-log4j&quot;&gt;Security guidance for New Relic customers related to Apache Log4j vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://newrelic.com/blog/how-to-relic/new-relic-log4j-detection&quot;&gt;How to help identify systems with vulnerable log4j versions using New Relic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://logging.apache.org/log4j/2.x/security.html&quot;&gt;Apache log4j Security Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://discuss.newrelic.com/t/log4j-zero-day-vulnerability-and-the-new-relic-java-agent/170322&quot;&gt;New Relic Support Forum&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Frequently asked questions [#faq]&lt;/h2&gt;
&lt;div&gt;&lt;div&gt;&lt;p&gt;Apache Foundation has disclosed additional vulnerabilities in log4j framework (CVE-2021-45046 and CVE-2021-45105) and advise that log4j v2.16.0 is not sufficient protection against exploitation. CPM 3.0.58 and later versions are the only CPM versions available with log4j 2.17.0.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Publication history [#history]&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;December 22, 2021: NR21-04 Major Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;New fix version 3.0.58 available to address CVE-2021-44228, CVE-2021-45046, and CVE-2021-45105.&lt;/li&gt;
&lt;li&gt;Addition of Helm Charts version 1.0.46 that contains the CPM 3.0.58 update.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 17, 2021: NR21-04 Revision: Change in severity and technical description of CVE-2021-45046.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 16, 2021: NR21-04 Major Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Change in guidance regarding sufficiency of CPM 3.0.55 containing log4j version 2.15.0 to protect against exploitation of CVE-2021-44228.&lt;/li&gt;
&lt;li&gt;Addition of Helm Charts version 1.0.45 that contains the CPM 3.0.57 update.&lt;/li&gt;
&lt;li&gt;Update of NIST technical description of CVE-2021-44228.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 14, 2021: NR21-04 Major Revision:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;New fix version 3.0.57 released to address both CVE-2021-44228 and CVE-2021-45046.&lt;/li&gt;
&lt;li&gt;Updated to provide better clarity between New Relic CPM updates and the best practices customers should take to secure their applications.&lt;/li&gt;
&lt;li&gt;Added FAQ section.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;December 13, 2021: NR21-04 published&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Report security vulnerabilities to New Relic [#report]&lt;/h2&gt;
&lt;p&gt;New Relic is committed to the security of our customers and your data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic&apos;s coordinated disclosure program. For more information, see our documentation about &lt;a href=&quot;/docs/security/new-relic-security/data-privacy/reporting-security-vulnerabilities&quot;&gt;reporting security vulnerabilities&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>Apache Log4j CVE 2021-44228, Security Bulletin NR21-04 (Containerized Private Minions)</description></item><item><title><![CDATA[NR24-01 - Fluent Bit]]></title><guid isPermaLink="false">TlIyNC0wMSAtIEZsdWVudCBCaXQ=</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr24-01</link><pubDate>Sat, 08 Jun 2024 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability Identifier:&lt;/strong&gt;&lt;/div&gt; NR24-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;New Relic advises all customers using log forwarding instrumentation to update the following solutions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Linux Infrastructure Agent AND Fluent Bit&lt;/li&gt;
&lt;li&gt;Kubernetes Plugin&lt;/li&gt;
&lt;li&gt;Fluent Bit Output Plugin&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;New Relic has released new versions of these services to eliminate a recently announced &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2024-4323&quot;&gt;vulnerable version of Fluent Bit&lt;/a&gt;. Each identified service has been updated to use &lt;a href=&quot;https://fluentbit.io/blog/2024/05/21/statement-on-cve-2024-4323-and-its-fix/&quot;&gt;Fluent Bit version 3.0.4, which was released to remediate the identified vulnerability&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Customers who are using the Infrastructure Agent but have disabled log forwarding are not impacted.&lt;/p&gt;
&lt;h2&gt;Action required&lt;/h2&gt;
&lt;p&gt;New Relic is recommending that customers who use the log forwarding instrumentation (as identified below) immediately take the following Actions:&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Solution&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Action Required&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Windows Infrastructure Agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;On Windows, the embedded version of Fluent Bit within the Windows Infrastructure Agent has been determined to not be impacted by CVE-2024-4323.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Linux Infrastructure Agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade the Infrastructure Agent to version 1.52.3 or later, &lt;strong&gt;AND&lt;/strong&gt; update Fluent Bit to version 3.0.4 or later&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Kubernetes Plugin&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade using either &lt;code&gt;newrelic-logging-1.22.0&lt;/code&gt; or &lt;code&gt;nri-bundle-5.0.80&lt;/code&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Fluent Bit Output Plugin&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Update to version 2.0.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;New Relic has provided the following resources to assist with these updates:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/infrastructure/install-infrastructure-agent/update-or-uninstall/update-infrastructure-agent/&quot;&gt;Update the Infrastructure Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/logs/forward-logs/forward-your-logs-using-infrastructure-agent/#install-fb-version&quot;&gt;Update Fluent Bit with the Linux Infrastructure Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/newrelic/helm-charts/tree/master?tab=readme-ov-file#Installthecharts&quot;&gt;Install the newest helm charts for the Kubernetes Plugin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/kubernetes-pixie/kubernetes-integration/installation/kubernetes-integration-install-configure/&quot;&gt;Install the Kubernetes integration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/logs/forward-logs/fluent-bit-plugin-log-forwarding/&quot;&gt;Fluent Bit plugin for log forwarding&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/infrastructure/infrastructure-ui-pages/infrastructure-inventory-page-search-your-entire-infrastructure/#search&quot;&gt;Check the Fluent Bit versions being used on your host&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/logs/forward-logs/fluent-bit-plugin-log-forwarding/#upgrade-plugin&quot;&gt;Check the Fluent Bit log forwarder version&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;New Relic has not identified any workarounds at this time.&lt;/p&gt;
&lt;h2&gt;Frequently Asked Questions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;I am using the Infrastructure Agent but have disabled log forwarding. Am I impacted?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, if log forwarding is disabled, the Infrastructure Agent will not run Fluent Bit and will not be impacted. However, New Relic recommends that you upgrade the agent regularly and check for updates at a minimum of every 3 months to ensure you are using a current version.&lt;/p&gt;
&lt;p&gt;Additionally, New Relic recommends that all customers identify any other uses of Fluent Bit in their environments and update them to at least version 3.0.4.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Once I update to the latest versions of the listed log forwarding services, do I have to do anything else?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, but only if you are running Infrastructure Agents on Linux hosts. If you are running the Linux Infrastructure Agent, you will &lt;strong&gt;also&lt;/strong&gt; need to &lt;a href=&quot;/docs/logs/forward-logs/forward-your-logs-using-infrastructure-agent/#install-fb-version&quot;&gt;update Fluent Bit&lt;/a&gt; within your environment to version 3.0.4 or later.&lt;/p&gt;
&lt;p&gt;There are no further configuration changes required to the Kubernetes Plugin or the Fluent Bit Output Plugin after updating to the most recent versions, although New Relic recommends that you periodically check your set configurations to make sure they match your desired settings.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Supporting Release Notes&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;/docs/release-notes/infrastructure-release-notes/infrastructure-agent-release-notes/&quot;&gt;Infrastructure Agent Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;/docs/release-notes/logs-release-notes/&quot;&gt;Logs Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;/docs/release-notes/infrastructure-release-notes/kubernetes-integration-release-notes/3/&quot;&gt;Kubernetes Integration Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/newrelic/newrelic-fluent-bit-output/releases&quot;&gt;Fluent Bit Output Plugin Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Technical vulnerability information&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4323&quot;&gt;CVE-2024-4323&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://fluentbit.io/blog/2024/05/21/statement-on-cve-2024-4323-and-its-fix/&quot;&gt;Fluent Bit&apos;s Statement on CVE-2024-4323&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.tenable.com/security/research/tra-2024-17&quot;&gt;Research Synopsis of CVE-2024-4323&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Publication History&lt;/h2&gt;
&lt;p&gt;June 7, 2024 - NR24-01 Published&lt;/p&gt;</content:encoded><description>Security bulletin for Windows and Linux infrastructure agent and Fluent Bit, the Kubernetes plugin, and the Fluent Bit output plugin.</description></item><item><title><![CDATA[NR24-02 - OpenSSH in New Relic Salesforce Exporter]]></title><guid isPermaLink="false">TlIyNC0wMiAtIE9wZW5TU0ggaW4gTmV3IFJlbGljIFNhbGVzZm9yY2UgRXhwb3J0ZXI=</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr24-02</link><pubDate>Thu, 18 Jul 2024 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability Identifier:&lt;/strong&gt;&lt;/div&gt; NR24-02&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;New Relic advises all customers using the New Relic Salesforce Exporter to update to version 2.2.0, which New Relic has released to eliminate a recently announced &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2024-6387&quot;&gt;vulnerable version of OpenSSH&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Action required&lt;/h2&gt;
&lt;p&gt;New Relic is recommending that customers who use the New Relic Salesforce Exporter immediately update to version 2.2.0.&lt;/p&gt;
&lt;p&gt;New Relic has provided the following resources to assist with these updates:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/newrelic/newrelic-salesforce-exporter/releases/tag/2.2.0&quot;&gt;Salesforce Exporter Release Notes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/newrelic/newrelic-salesforce-exporter?tab=readme-ov-file#upgrading-on-host-deployments&quot;&gt;Detecting &amp;#x26; Upgrading on-host deployments&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If customers are unable to upgrade their New Relic Salesforce Exporter, limit SSH access through network-based controls to minimize the attack risks.&lt;/p&gt;
&lt;h2&gt;Supporting Release Notes&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/newrelic/newrelic-salesforce-exporter/releases/tag/2.2.0&quot;&gt;Salesforce Exporter Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Technical vulnerability information&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387&quot;&gt;CVE-2024-6387&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Publication History&lt;/h2&gt;
&lt;p&gt;July 18, 2024 - NR24-02 Published&lt;/p&gt;</content:encoded><description>Security bulletin for all customers using the New Relic Salesforce Exporter.</description></item><item><title><![CDATA[Security Bulletin NR23-01 — Security Advisory]]></title><guid isPermaLink="false">U2VjdXJpdHkgQnVsbGV0aW4gTlIyMy0wMSDigJQgU2VjdXJpdHkgQWR2aXNvcnk=</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr23-01-security-advisory</link><pubDate>Wed, 22 Nov 2023 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Investigation conclusion: January 31, 2024 [#conclusion]&lt;/h2&gt;
&lt;p&gt;This is our final update to this security bulletin describing our November 2023 security incident involving unauthorized access to our staging environment. New Relic, leading cyber experts, and forensic firms conducted an extensive investigation into the incident, and together have provided updates to this security bulletin as information became available. The investigation has concluded and we are sharing additional information about our findings.&lt;/p&gt;
&lt;h2&gt;Background [#background-details]&lt;/h2&gt;
&lt;p&gt;In November 2023, New Relic became aware of unauthorized access to our staging environment—an internal environment that provides visibility into, and information relating to, our customers’ use and operation of our services for troubleshooting purposes (“Staging Environment”). The Staging Environment maintains New Relic’s own observability data, including logs, events, traces and other diagnostic files, ensuring that we have visibility in the event of a failure in our customer facing Production environment. Notably, telemetry and application data sent to New Relic by our customers in their use of the New Relic platform does not reside in our Staging Environment.&lt;/p&gt;
&lt;p&gt;Upon learning of the unauthorized access to the Staging Environment, we took immediate action to assess the integrity of internal applications, systems, and infrastructure. We activated our incident response plan and engaged several third-party cybersecurity experts to conduct a thorough investigation into the impact to our customers and our business.&lt;/p&gt;
&lt;p&gt;During the course of the investigation, we learned the unauthorized actor used stolen credentials in connection with a single New Relic employee account to gain access to the Staging Environment. The unauthorized access occurred shortly before the completion of a planned migration of the remainder of our employees to our enhanced &lt;a href=&quot;/docs/accounts/accounts-billing/new-relic-one-user-management/introduction-managing-users/&quot;&gt;User management model&lt;/a&gt; for added security.&lt;/p&gt;
&lt;p&gt;New Relic immediately revoked access to the compromised employee account. We also analyzed the potential impact to customers by searching the Staging Environment for passwords, API keys, user identifiers, including usernames and other customer data. Our investigation also confirmed there was no lateral movement from the Staging Environment to any customer accounts in separate environments or to New Relic’s Production environment.&lt;/p&gt;
&lt;h2&gt;Additional steps to harden environment [#additional-hardening]&lt;/h2&gt;
&lt;p&gt;We took additional steps to remediate the impact of the incident, including by redacting secrets out of our logging rules, and took steps to further harden our systems, such as implementing additional layers of technical controls, enhancing our network access controls, and accelerating the migration of our remaining employee users to our enhanced &lt;a href=&quot;/docs/accounts/accounts-billing/new-relic-one-user-management/introduction-managing-users/&quot;&gt;User management model&lt;/a&gt;. These additional steps were taken and completed.&lt;/p&gt;
&lt;h2&gt;Incident findings [#incident-findings]&lt;/h2&gt;
&lt;p&gt;Our investigation into the Staging Environment incident is complete and has revealed the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The unauthorized actor utilized a single New Relic employee account to gain access to New Relic’s Staging Environment.&lt;/li&gt;
&lt;li&gt;All activity by the unauthorized actor within New Relic’s Staging Environment has been comprehensively identified and reviewed by New Relic and our industry-leading forensic firms.&lt;/li&gt;
&lt;li&gt;Between October 24 and November 15, 2023, the unauthorized actor executed specific search queries and exfiltrated these query results from the Staging Environment.&lt;/li&gt;
&lt;li&gt;The last observed unauthorized activity in the Staging Environment was on November 16, 2023. There is no indication of persistent access by the unauthorized actor in New Relic’s Staging Environment.&lt;/li&gt;
&lt;li&gt;A very small percentage of our customers were impacted by the search queries executed by the unauthorized actor.&lt;/li&gt;
&lt;li&gt;There is no indication of lateral movement from our Staging Environment to any customers’ New Relic accounts in the separate production environment or to New Relic’s production infrastructure.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Tactics, techniques, and procedures (TTPs) [#ttps]&lt;/h2&gt;
&lt;p&gt;In support of our industry and community as a whole, we are sharing the tactics, techniques, and procedures (TTPs) utilized by this unauthorized actor so that our community can leverage this information to identify potential risk to their environments. These TTPs were discovered and confirmed through the investigation performed by New Relic in partnership with forensic and cybersecurity experts.&lt;/p&gt;
&lt;p&gt;The unauthorized actor used the following tactics, techniques, and procedures (TTPs):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Credential stuffing;&lt;/li&gt;
&lt;li&gt;Use of Protonmail (proton.me) for communication;&lt;/li&gt;
&lt;li&gt;Use of VPN services including NordVPN for access to public services; and&lt;/li&gt;
&lt;li&gt;Programmatic Data Extraction using APIs.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Eradication and remediation efforts [#eradication-efforts]&lt;/h2&gt;
&lt;p&gt;We understand that the best defense starts right here at New Relic. New Relic took a number of actions to eradicate the unauthorized actor’s access during the incident, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Revoking access to the compromised employee account immediately;&lt;/li&gt;
&lt;li&gt;Blocking indicators of compromise associated with the attack;&lt;/li&gt;
&lt;li&gt;Further hardening access controls and credential theft defenses, leveraging an industry-leading security toolset; increasing our capacity to monitor security across our entire enterprise; and&lt;/li&gt;
&lt;li&gt;Providing additional cyber education and awareness to our employees.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Customer recommendations [#customer-recommendations]&lt;/h2&gt;
&lt;p&gt;We have completed our proactive outreach to customers whose accounts were impacted from this incident in order to help them understand the impact and to communicate suggested remediation steps. If you have not received specific instructions regarding your systems, there is no action you need to take. Customers should review our &lt;a href=&quot;/docs/security/security-privacy/information-security/security-bulletins/&quot;&gt;Security bulletins&lt;/a&gt; and &lt;a href=&quot;/docs/security/security-privacy/data-privacy/data-privacy-new-relic/&quot;&gt;Security guides&lt;/a&gt; for best practices. There are no additional measures you need to take beyond what has already been communicated with you.&lt;/p&gt;
&lt;p&gt;We regret any inconvenience this incident caused for our customers. Our CEO, CTO, and CISO are aligned on the future state of security at New Relic. They share the same commitment to making broad improvements to our security posture, and specifically to preventing the same type of incident from occurring in the future. We have talked to many customers, including those  not impacted directly by this incident, and have shared both our commitment to do better and the significant enhancements we have made to our security posture. We will continue making long term investments to earn back the trust of our customers. We deeply appreciate the understanding and support that customers have shown.To all of our customers—we look forward to our continued work together.&lt;/p&gt;
&lt;h2&gt;Previous updates [#previous-updates]&lt;/h2&gt;
&lt;div&gt;&lt;div&gt;&lt;p&gt;Following considerable progress in our investigation, we are now in a more informed position to share with our customers additional details about the ongoing investigation and what we have learned.&lt;/p&gt;&lt;h3&gt;What happened—initial attack on New Relic staging environment [#what-happened]&lt;/h3&gt;&lt;p&gt;Two weeks ago, New Relic became aware of unauthorized access to our staging environment, an internal environment that provides visibility into how our customers are using New Relic and certain logs. Telemetry and application data sent to New Relic by our customers in their use of the New Relic platform does not reside in our staging environment.&lt;/p&gt;&lt;p&gt;We immediately launched an investigation and discovered that an unauthorized actor used stolen credentials and social engineering in connection with a New Relic employee account. The unauthorized actor used the stolen credentials to gain access to our staging environment, where they were able to view certain data pertaining to our customers’ use of New Relic. &lt;div&gt;&lt;strong&gt;Customers confirmed to have been impacted by this incident have been notified with recommended next steps.&lt;/strong&gt;&lt;/div&gt; There is no indication of lateral movement from our staging environment to any customers’ New Relic accounts in the separate production environment or to New Relic’s production infrastructure.&lt;/p&gt;&lt;p&gt;As a result of the steps we have taken, we can also confirm that the unauthorized access to our staging environment is contained, and we see no further signs of unauthorized access or activity in our staging environment. We will continue to proactively reach out to our customers if we identify further information that may be relevant to them over the course of our ongoing investigation.&lt;/p&gt;&lt;h3&gt;Steps we have taken [#steps-taken]&lt;/h3&gt;&lt;p&gt;Since learning of this incident, we took immediate action to assess the integrity of internal applications, systems, and infrastructure. We activated our incident response plan and engaged several third-party cybersecurity experts to conduct a thorough investigation into the impact to our customers and our business. Our continuity of operations and ability to serve our customers were not disrupted by this incident and continue as normal.&lt;/p&gt;&lt;p&gt;Our security team revoked access to the compromised employee account immediately. We have taken steps to implement additional layers of technical controls, enhance network access controls, and eliminate the attack method used to access New Relic’s staging environment. Leading cyber experts and forensics firms continue to be engaged to aid in our ongoing investigation.&lt;/p&gt;&lt;p&gt;We have taken this opportunity to further harden access controls and credential theft defenses, leveraging an industry-leading security toolset. We have also increased capacity to monitor security across our entire enterprise, all in order to ensure comprehensive visibility into our security posture.&lt;/p&gt;&lt;h3&gt;Additional information concerning potential access to customer accounts discovered during our investigation [#additional-information]&lt;/h3&gt;&lt;p&gt;Over the course of our investigation, we observed similar indicators of compromise (IOCs) accessing a small number of customers’ New Relic accounts. Out of an abundance of caution, we proactively responded by rotating passwords and removing user API keys for the suspected compromised user accounts. Based on our investigation to date, &lt;div&gt;&lt;strong&gt;there is no evidence to suggest the identified log-in credentials were acquired as a result of the attack on New Relic’s staging environment.&lt;/strong&gt;&lt;/div&gt; It appears the credentials were harvested in recent large-scale social engineering and credential compromise attacks, which may have put these New Relic user accounts at risk. In cases where we identify this suspected access, we are proactively reaching out to these customers.&lt;/p&gt;&lt;h3&gt;Steps you can take to prevent credential-based compromises [#steps-you-can-take]&lt;/h3&gt;&lt;p&gt;Although our investigation is ongoing, we aim to take a security forward posture by sharing our learnings to support the broader New Relic community. Our goal is to assist our customers in enhancing their own security posture and provide assistance where applicable to any investigations that may be necessary.&lt;/p&gt;&lt;p&gt;New Relic offers automatic controls over how users are added to New Relic, how they&apos;re managed, and how they log in. New Relic also makes available SAML, SSO, and SCIM provisioning, which is available &lt;a href=&quot;/docs/accounts/accounts-billing/new-relic-one-user-management/introduction-saml-scim/&quot;&gt;here&lt;/a&gt;. Additionally, customers configured with SAML, SSO, and SCIM, are strongly encouraged to enable MFA. If you are not taking advantage of these features, avoid reusing passwords and ensure that you regularly rotate your passwords.&lt;/p&gt;&lt;p&gt;We also recommend that you remain vigilant and monitor your account for suspicious activity. For example, as an additional security measure, you should regularly audit the changes made in your New Relic environment - particularly when you suspect unusual activity. New Relic makes such functionality readily available for every customer. Customers should also use automatically generated meta-events, such as &lt;a href=&quot;/docs/accounts/accounts/account-maintenance/query-account-audit-logs-nrauditevent/&quot;&gt;NrAuditEvent&lt;/a&gt; and NrdbQuery to understand what actions your users are taking and which telemetry they are querying. Additionally, we encourage you to review our &lt;a href=&quot;/docs/security/security-privacy/information-security/security-bulletins/&quot;&gt;Security bulletins&lt;/a&gt; and &lt;a href=&quot;/docs/security/security-privacy/data-privacy/data-privacy-new-relic/#product-security&quot;&gt;Security guides&lt;/a&gt; for best practices.&lt;/p&gt;&lt;p&gt;We understand that you may have additional questions as a result of this notice. Please open a support case under security or contact our Customer Support team at &lt;a href=&quot;mailto:supportforum@newrelic.com&quot;&gt;supportforum@newrelic.com&lt;/a&gt; if you have further questions. They will be able to assist you or connect you with the appropriate team.&lt;/p&gt;&lt;p&gt;As our investigation continues, we will continue to share information with appropriate parties and the larger New Relic customer community.&lt;/p&gt;&lt;p&gt;Trust and transparency are paramount in our business, and we know the security of our systems is an important part of earning and keeping your trust. We apologize to our customers that this happened, and we deeply appreciate the partnership that we have forged with you. We will continue to make security investments in our infrastructure and product offering to maintain a strong security posture for our New Relic community.&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;div&gt;&lt;strong&gt;Release date:&lt;/strong&gt;&lt;/div&gt; November 22, 2023&lt;/p&gt;&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability identifier:&lt;/strong&gt;&lt;/div&gt; NR23-01&lt;/p&gt;&lt;p&gt;We value our New Relic community and want to make our customers aware of a recent cybersecurity incident that we are working diligently to investigate with the support of third-party cybersecurity experts.&lt;/p&gt;&lt;p&gt;&lt;div&gt;&lt;strong&gt;Customers will be directly contacted if there are any specific actions required of you.&lt;/strong&gt;&lt;/div&gt; To be clear, if you do not hear from us, there is no action you need to take at this time.&lt;/p&gt;&lt;p&gt;As always, we recommend that you remain vigilant and monitor your account for suspicious activity. Additionally, we encourage you to review &lt;a href=&quot;/docs/security/security-privacy/data-privacy/data-privacy-new-relic/#product-security&quot;&gt;Security Guides&lt;/a&gt; for best practices as well as our &lt;a href=&quot;/docs/security/security-privacy/information-security/security-bulletins/&quot;&gt;Security Bulletins&lt;/a&gt; for updates.&lt;/p&gt;&lt;p&gt;We will continue to provide relevant updates as we have more information to share.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;</content:encoded><description>Final update to Security Bulletin NR23-01</description></item><item><title><![CDATA[NR25-01- Fluent Bit Plugins (CVE-2024-50608 & CVE-2024-50609)]]></title><guid isPermaLink="false">TlIyNS0wMS0gRmx1ZW50IEJpdCBQbHVnaW5zIChDVkUtMjAyNC01MDYwOCAmIENWRS0yMDI0LTUwNjA5KQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr25-01</link><pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability Identifier:&lt;/strong&gt;&lt;/div&gt; NR25-01&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;By default New Relic does not include or enable the specific plugins that are affected by security vulnerabilities identified in certain versions of Fluent Bit. The specific plugins are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://docs.fluentbit.io/manual/pipeline/inputs/opentelemetry&quot;&gt;OpenTelemetry input plugin&lt;/a&gt; - Affected by &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2024-50608&quot;&gt;CVE-2024-50608&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://docs.fluentbit.io/manual/pipeline/inputs/prometheus-remote-write&quot;&gt;Prometheus Remote Write input plugin&lt;/a&gt;  - Affected by  &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2024-50609&quot;&gt;CVE-2024-50609&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;However, to support customers that have enabled these optional plugins, we recommend customers to upgrade to the latest available versions of these package:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Infrastructure Agent - Windows&lt;/li&gt;
&lt;li&gt;Infrastructure Agent - Linux&lt;/li&gt;
&lt;li&gt;Kubernetes Plugin&lt;/li&gt;
&lt;li&gt;New Relic Fluent Bit Output Plugin Docker Image&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Action required&lt;/h2&gt;
&lt;p&gt;New Relic strongly advises our customers who are using the aforementioned log forwarding instrumentation to take immediate action as follows. If you are unable to upgrade to Fluent Bit v3.2.7, we recommend disabling the affected plugins specified above.&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Solution&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Action Required&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Infrastructure agent - Windows&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade the Infrastracture agent to version 1.62.0 or later&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Infrastructure agent - Linux&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade the Infrastracture agent to version 1.62.0 or later AND update Fluent Bit to version 3.2.7 or later&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Kubernetes Plugin&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade using either newrelic-logging-1.26.1 or nri-bundle-5.0.115&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;New Relic Fluent Bit Output Plugin Docker Image&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Update to version 2.3.0&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;New Relic has provided the following resources to assist with these updates:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/infrastructure/install-infrastructure-agent/update-or-uninstall/update-infrastructure-agent/&quot;&gt;Update the Infrastructure Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/logs/forward-logs/forward-your-logs-using-infrastructure-agent/#install-fb-version&quot;&gt;Update Fluent Bit with the Linux Infrastructure Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/newrelic/helm-charts/tree/master?tab=readme-ov-file#Installthecharts&quot;&gt;Install the newest helm charts for the Kubernetes Plugin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/kubernetes-pixie/kubernetes-integration/installation/kubernetes-integration-install-configure/&quot;&gt;Install the Kubernetes integration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/logs/forward-logs/fluent-bit-plugin-log-forwarding/&quot;&gt;Fluent Bit plugin for log forwarding&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Frequently Asked Questions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;How can I find out if I’m using the vulnerable plugins?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;New Relic default Fluent Bit configuration does not include the vulnerable plugins by default. If you have amended your Fluent bit configuration post-installation and included the &lt;a href=&quot;https://docs.fluentbit.io/manual/pipeline/inputs/opentelemetry&quot;&gt;OpenTelemetry input plugin&lt;/a&gt; and/or &lt;a href=&quot;https://docs.fluentbit.io/manual/pipeline/inputs/prometheus-remote-write&quot;&gt;Prometheus Remote Write input&lt;/a&gt;, any version of Fluent Bit installed in your environment is vulnerable. Follow the instructions to upgrade all your log forwarding instrumentation immediately.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;I am using the Infrastructure Agent but have disabled log forwarding. Am I impacted?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you previously used New Relic log forwarding instrumentation (listed above), and used the affected plugins, you might still be impacted. New Relic recommends that you upgrade your agents, or at minimum disable the affected plugins.&lt;/p&gt;
&lt;p&gt;Additionally, New Relic recommends that all customers identify any other uses of Fluent Bit in their environments and update them to at least version 3.2.7.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Once I update to the latest versions of the listed log forwarding services, do I have to do anything else?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, but only if you are running Infrastracture agents on Linux hosts. If you are running the Linux Infrastructure agent, you will also need to &lt;a href=&quot;/docs/logs/forward-logs/forward-your-logs-using-infrastructure-agent/#install-fb-version&quot;&gt;update Fluent Bit&lt;/a&gt; within your environment to a version 3.2.7 or later.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;How can I find out which Fluent Bit version I’m using?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you previously used New Relic log forwarding instrumentation (listed above), and used the affected plugins, you might still be impacted. New Relic recommends that you upgrade your agents, or at minimum disable the affected plugins.&lt;/p&gt;
&lt;p&gt;Additionally, New Relic recommends that all customers identify any other uses of Fluent Bit in their environments and update them to at least version 3.2.7.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Agent&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Steps&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Infra agent and standalone Fluent bit&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;For your Infrastructure agents, navigate to the &lt;a href=&quot;/docs/infrastructure/infrastructure-data/infrastructure-ui-pages/infra-inventory-ui-page/&quot;&gt;Infrastructure Inventory&lt;/a&gt; UI and search for Fluent Bit.&lt;/p&gt;
&lt;p&gt;Then, Check which Fluent Bit version is installed for a particular host.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Kubernetes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;For New Relic Logging Helm chart version 1.25.0 or higher, Navigate to the Installed tab and search for Fluent bit in the entities field&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Otherwise, run the following NRQL query:
&lt;code&gt;FROM K8sContainerSample select latest(containerImage) Where podName like &apos;%newrelic-logging%&apos; FACET clusterName&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Then, check which Fluent Bit version was installed with the &lt;a href=&quot;https://github.com/newrelic/helm-charts/releases/tag/nri-bundle-5.0.115&quot;&gt;output plugin&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h2&gt;Supporting Release Notes&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;/docs/release-notes/fluentbit-release-notes/&quot;&gt;Fluent Bit release notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;/docs/release-notes/infrastructure-release-notes/infrastructure-agent-release-notes/&quot;&gt;Infrastructure Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/newrelic/newrelic-fluent-bit-output/releases&quot;&gt;Fluent Bit Output Plugin Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Technical vulnerability information&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2024-50608&quot;&gt;CVE-2024-50608&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2024-50609&quot;&gt;CVE-2024-50609&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://fluentbit.io/announcements/v3.2.7/&quot;&gt;Fluent Bit 3.2.7 Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Publication History&lt;/h2&gt;
&lt;p&gt;March 1, 2025 - NR25-01 Published&lt;/p&gt;</content:encoded><description>Security bulletin for Windows and Linux infrastructure agent and Fluent Bit, the Kubernetes plugin, and the Fluent Bit output plugin.</description></item><item><title><![CDATA[NR25-02- Fluent Bit Plugins (CVE-2025-12969, CVE-2025-12970, CVE-2025-12972, CVE-2025-12977, CVE-2025-12978)]]></title><guid isPermaLink="false">TlIyNS0wMi0gRmx1ZW50IEJpdCBQbHVnaW5zIChDVkUtMjAyNS0xMjk2OSwgQ1ZFLTIwMjUtMTI5NzAsIENWRS0yMDI1LTEyOTcyLCBDVkUtMjAyNS0xMjk3NywgQ1ZFLTIwMjUtMTI5Nzgp</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr25-02</link><pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;&lt;div&gt;&lt;strong&gt;Vulnerability Identifier:&lt;/strong&gt;&lt;/div&gt; NR25-02&lt;/p&gt;
&lt;p&gt;&lt;div&gt;&lt;strong&gt;Priority:&lt;/strong&gt;&lt;/div&gt; High&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p&gt;By default, New Relic does not include or enable the specific plugins that are affected by the security vulnerabilities identified in certain versions of Fluent Bit. The specific plugins and their associated vulnerabilities are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Forward input plugin (in_forward) - Affected by &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12969&quot;&gt;CVE-2025-12969&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Docker input plugin (in_docker) - Affected by &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12970&quot;&gt;CVE-2025-12970&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;File output plugin (out_file) - Affected by &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12972&quot;&gt;CVE-2025-12972&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;HTTP, Splunk, and Elasticsearch input plugins (in_http, in_splunk, in_elasticsearch) - Affected by &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12978&quot;&gt;CVE-2025-12978&lt;/a&gt; &amp;#x26; &lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12977&quot;&gt;CVE-2025-12977&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;However, to support customers that have enabled these optional plugins, we recommend customers to upgrade to the latest available versions of these packages which bundle the patched version of Fluent Bit (v4.0.13, v4.1.1, v4.2.0 or higher):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Infrastructure Agent - Windows&lt;/li&gt;
&lt;li&gt;Infrastructure Agent - Linux&lt;/li&gt;
&lt;li&gt;Kubernetes Plugin&lt;/li&gt;
&lt;li&gt;New Relic Fluent Bit Output Plugin Docker Image&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Action required&lt;/h2&gt;
&lt;p&gt;New Relic strongly advises our customers who are using the aforementioned log forwarding instrumentation to take immediate action as follows. If you are unable to upgrade to the latest agent versions containing Fluent Bit v4.0.13, v4.1.1, or v4.2.0, we recommend disabling the affected plugins specified above to mitigate the risk.&lt;/p&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Solution&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Action Required&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Infrastructure agent - Windows&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade the Infrastructure agent to version v1.71.2 or later&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Infrastructure agent - Linux&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade the Infrastructure agent to version v1.71.2 or later AND update Fluent Bit to version v4.2.0 or later&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Kubernetes plugin&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Upgrade using either newrelic-logging-1.33.0 or nri-bundle-6.0.28&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;New Relic Fluent Bit Output Plugin Docker Image&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Update to version 3.2.1&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;New Relic has provided the following resources to assist with these updates:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;/docs/infrastructure/install-infrastructure-agent/update-or-uninstall/update-infrastructure-agent/&quot;&gt;Update the Infrastructure Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/logs/forward-logs/forward-your-logs-using-infrastructure-agent/#install-fb-version&quot;&gt;Update Fluent Bit with the Linux Infrastructure Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/newrelic/helm-charts/tree/master?tab=readme-ov-file#Installthecharts&quot;&gt;Install the newest helm charts for the Kubernetes Plugin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/kubernetes-pixie/kubernetes-integration/installation/kubernetes-integration-install-configure/&quot;&gt;Install the Kubernetes integration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;/docs/logs/forward-logs/fluent-bit-plugin-log-forwarding/&quot;&gt;Fluent Bit plugin for log forwarding&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Frequently Asked Questions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;How can I find out if I&apos;m using the vulnerable plugins?&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Check your Fluent Bit configuration file(s) for use of the tag_key parameter in input plugins e.g. HTTP, Splunk, or Elasticsearch  which may leave your installation vulnerable to the attacks described in CVE-2025-12978 and CVE-2025-12977&lt;/li&gt;
&lt;li&gt;Check your Fluent Bit configuration file(s) for use of the File output plugin, especially where the File configuration parameter has not been set, which may leave your installation vulnerable to the attacks described in CVE-2025-12972&lt;/li&gt;
&lt;li&gt;Check your Fluent Bit configuration file(s) for use of the Docker metrics input plugin, which may leave your installation vulnerable to the attacks described in CVE-2025-12970&lt;/li&gt;
&lt;li&gt;Check your Fluent Bit configuration file(s) for use of the Forward input plugin, which may leave your installation vulnerable to the attacks described in CVE-2025-12969&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;I am using the Infrastructure Agent but have disabled log forwarding. Am I impacted?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you previously used New Relic log forwarding instrumentation (listed above), and used the affected plugins, you might still be impacted. New Relic recommends that you upgrade your agents, or at minimum disable the affected plugins. Additionally, New Relic recommends that all customers identify any other uses of Fluent Bit in their environments and update them to at least version v4.0.13, v4.1.1, or v4.2.0.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;How can I find out which Fluent Bit version I&apos;m using?&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Agent&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Steps&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Infrastructure agent and standalone Fluent Bit&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;
&lt;li&gt;For your Infrastructure agents, navigate to the &lt;a href=&quot;/docs/infrastructure/infrastructure-data/infrastructure-ui-pages/infra-inventory-ui-page/&quot;&gt;Infrastructure Inventory&lt;/a&gt; UI and search for Fluent Bit. Then, check the Fluent Bit version installed on a given host&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;Kubernetes&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;For New Relic Logging Helm chart version 1.25.0 or higher, Navigate to the Installed tab and search for Fluent bit in the entities field&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Otherwise, run the following NRQL query:
&lt;code&gt;FROM K8sContainerSample select latest(containerImage) Where podName like &apos;%newrelic-logging%&apos; FACET clusterName&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Then, check which Fluent Bit version was installed with the &lt;a href=&quot;https://github.com/newrelic/helm-charts/releases/tag/nri-bundle-6.0.28&quot;&gt;output plugin&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;ol start=&quot;4&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;What should I do if there are no patched artifacts available for my OS?&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is no patched FluentBit upstream package available for Ubuntu 16, 18, and 20. If you are running on any of these distributions, we recommend you remove the affected input plugins to protect from vulnerabilities.&lt;/li&gt;
&lt;li&gt;We are working to provide patched packages for SLES 12.5 and 15.4 as soon as possible. Until we roll out the updated packages for these distributions, we recommend removing the affected plugins to protect from vulnerabilities.&lt;/li&gt;
&lt;li&gt;We are working to provide a patched package for Debian 13 as soon as possible. Until we roll out a patched package for this distribution, we recommend removing the affected plugins to protect from vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Supporting Release Notes&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;/docs/release-notes/fluentbit-release-notes/&quot;&gt;Fluent Bit release notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;/docs/release-notes/infrastructure-release-notes/infrastructure-agent-release-notes/&quot;&gt;Infrastructure Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/newrelic/newrelic-fluent-bit-output/releases&quot;&gt;Fluent Bit Output Plugin Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Technical vulnerability information&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12969&quot;&gt;CVE-2025-12969&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12970&quot;&gt;CVE-2025-12970&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12972&quot;&gt;CVE-2025-12972&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12977&quot;&gt;CVE-2025-12977&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://nvd.nist.gov/vuln/detail/CVE-2025-12978&quot;&gt;CVE-2025-12978&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Publication History&lt;/h2&gt;
&lt;p&gt;December 11, 2025 - NR25-02 Published&lt;/p&gt;</content:encoded><description>Security bulletin for Windows and Linux infrastructure agent and Fluent Bit, the Kubernetes plugin, and the Fluent Bit output plugin.</description></item><item><title><![CDATA[Update the .NET agent if you use Microsoft Extensions Logging with log forwarding]]></title><guid isPermaLink="false">VXBkYXRlIHRoZSAuTkVUIGFnZW50IGlmIHlvdSB1c2UgTWljcm9zb2Z0IEV4dGVuc2lvbnMgTG9nZ2luZyB3aXRoIGxvZyBmb3J3YXJkaW5n</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nrsg2202-01</link><pubDate>Sat, 03 Dec 2022 00:00:00 +0000</pubDate><content:encoded>&lt;h2&gt;Summary [#summary]&lt;/h2&gt;
&lt;p&gt;New Relic is recommending that customers who deploy the .NET agent in a configuration employing Microsoft Extensions Logging (MEL) should update to version 10.1.0 or later to address an &lt;a href=&quot;/docs/release-notes/agent-release-notes/net-release-notes/net-agent-10-1-0/&quot;&gt;issue&lt;/a&gt; where New Relic .NET agents (v9.7.0 to 10.0.0) would forward any level of MEL logging level, regardless of configuration.&lt;/p&gt;
&lt;p&gt;This guidance applies to users of the .NET agent versions 9.7.0 through 10.0.0 that use the MEL logging framework. .NET agents that use Log4net, Serilog, and NLog logging frameworks are not affected.&lt;/p&gt;
&lt;h2&gt;Affected software [#affected-software]&lt;/h2&gt;
&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent version&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Logging framework&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Required conditions&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Affected/not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;.NET agent 9.7.0 through 10.0.0&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Microsoft Extensions Logging (MEL)&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Log forwarding enabled and log level set&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Affected&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent all versions&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Log4Net, Serilog, or NLog logging&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent 9.7.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Microsoft Extensions Logging (MEL)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Default configuration (Log forwarding not enabled)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent 9.8.0 through 10.0.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Microsoft Extensions Logging (MEL)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Log forwarding disabled&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent 9.7.0 through 10.0.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Microsoft Extensions Logging (MEL)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Configured to forward all Microsoft Extension Logging levels&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent before 9.7.0&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;n/a&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent 10.1.0 and later&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Microsoft Extensions Logging (MEL)&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;.NET agent all versions&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;n/a&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Deployed in Linux&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;Not affected&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;h3&gt;Fixed in:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;New Relic .NET agent versions 10.1.0 and later&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Recommended action: [#recommended]&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Customers who use Microsoft Extension Logging should &lt;a href=&quot;/docs/apm/agents/net-agent/installation/update-net-agent/&quot;&gt;upgrade to version 10.1.0 or later&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;&lt;strong&gt;Technical Links&lt;/strong&gt;&lt;/div&gt;: &lt;a href=&quot;/docs/apm/agents/net-agent/installation/update-net-agent/&quot;&gt;Updating the .NET agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;&lt;strong&gt;Workarounds&lt;/strong&gt;&lt;/div&gt;: Affected customers who cannot update their .NET agents to 10.1.0 or later at this time can &lt;a href=&quot;/docs/logs/logs-context/disable-automatic-logging/&quot;&gt;disable log forwarding&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Technical details: [#technical-details]&lt;/h2&gt;
&lt;p&gt;Version 10.1.0 remediates an error in the timing of the instrumentation point for Microsoft Extensions Logging to correctly send MEL data after the built-in log level filtering occurs.&lt;/p&gt;
&lt;h2&gt;Timeline details [#timeline]&lt;/h2&gt;
&lt;p&gt;This issue was introduced when New Relic added support for the log forwarding feature with Microsoft Extensions Logging (MEL) framework in .NET Core applications in .NET agent v 9.7.0 (April 4, 2022) and in .NET Framework applications in v 10.0.0 (July 19, 2022).  In version 9.7.0, the log forwarding feature was disabled by default, so customers using version 9.7.0.0 may only be affected by this issue if they have manually configured log forwarding.&lt;/p&gt;
&lt;p&gt;In version 9.8.0 (May 5th, 2022), the log forwarding feature was enabled by default.&lt;/p&gt;
&lt;p&gt;The issue was fixed with the release of .NET agent version 10.1.0, released on September 12, 2022.&lt;/p&gt;
&lt;h2&gt;Frequently asked questions [#faq]&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;What is a Security Guidance document?
New Relic has issued this Security Guidance document to notify customers of the need to update their software to address a software bug that, while it cannot be exploited by a third party to gain access to customer data, still has actionable security or privacy recommendations for customers.&lt;/li&gt;
&lt;li&gt;Is it possible for a third-party to exploit this issue to access  log data that is forwarded to New Relic?
No, the issue does not allow for exposure of data to a third party. We use a comprehensive set of technical controls to support security for data we receive. For more information, see our documentation about &lt;a href=&quot;/docs/security/security-privacy/data-privacy/security-controls-privacy/&quot;&gt;data security&lt;/a&gt; and &lt;a href=&quot;/docs/security/security-privacy/compliance/data-encryption/&quot;&gt;data encryption&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Once I deploy version 10.1.0 of the New Relic .NET agent, do I have to do anything else?
No, there are no further configuration changes required after updating. We recommend that you check your set configurations to make sure that they match your desired settings.&lt;/li&gt;
&lt;li&gt;I am using the .NET agent but not using Microsoft Extensions Logging for log forwarding. Am I impacted?
No, this issue only impacts .NET applications using MEL for their logging. MEL logging was introduced in version 9.7.0 for .NET Core applications and 10.0.0 for .NET Framework applications.&lt;/li&gt;
&lt;li&gt;I am using the .NET agent but have disabled the log forwarding feature. Am I impacted?
No, this issue only impacts .NET applications using the log forwarding feature and the MEL framework.&lt;/li&gt;
&lt;/ol&gt;</content:encoded><description>New Relic advises updating .NET agent for customers employing Microsoft Extensions Logging with log forwarding enabled</description></item><item><title><![CDATA[Security for Heartbleed vulnerability]]></title><guid isPermaLink="false">U2VjdXJpdHkgZm9yIEhlYXJ0YmxlZWQgdnVsbmVyYWJpbGl0eQ==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-heartbleed-vulnerability</link><pubDate>Thu, 08 Oct 2020 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;On April 7, 2014 the OpenSSL Project released an update to address a critical vulnerability known as &lt;a href=&quot;http://heartbleed.com&quot;&gt;Heartbleed (CVE-2014-0160)&lt;/a&gt;. This vulnerability, which affects multiple sites across the Internet, could be remotely exploited to leak sensitive information.&lt;/p&gt;
&lt;h2&gt;Action by New Relic [#nr-action]&lt;/h2&gt;
&lt;p&gt;New Relic has reviewed all of our sites and applications, and we have determined that the majority of our sites, including &lt;div&gt;&lt;strong&gt;&lt;a href=&quot;http://www.newrelic.com&quot;&gt;www.newrelic.com&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;, &lt;div&gt;&lt;strong&gt;rpm.newrelic.com&lt;/strong&gt;&lt;/div&gt;, and &lt;div&gt;&lt;strong&gt;insights.newrelic.com&lt;/strong&gt;&lt;/div&gt; are not vulnerable to this issue. New Relic did discover that the Documentation site (&lt;div&gt;&lt;strong&gt;docs.newrelic.com&lt;/strong&gt;&lt;/div&gt;) was vulnerable. This has now been patched, and the &lt;a href=&quot;/docs/accounts-partnerships/education/getting-started-new-relic/glossary#ssl-certificate&quot;&gt;SSL certificate&lt;/a&gt; has been replaced.&lt;/p&gt;
&lt;h2&gt;Change your password [#password]&lt;/h2&gt;
&lt;p&gt;New Relic has no evidence that any customer data (including user names and passwords) was exposed. However, if you have any concerns about your account&apos;s protection, you should change your password.&lt;/p&gt;
&lt;p&gt;This procedure is for users who sign in directly to APM and do not have partner accounts or SAML SSO enabled accounts:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Go to &lt;div&gt;&lt;strong&gt;&lt;a href=&quot;https://rpm.newrelic.com&quot;&gt;rpm.newrelic.com&lt;/a&gt; &gt; &lt;a href=&quot;/docs/accounts/accounts-billing/general-account-settings/intro-account-settings&quot;&gt;(user menu)&lt;/a&gt; &gt; User preferences&lt;/strong&gt;&lt;/div&gt;.&lt;/li&gt;
&lt;li&gt;Type your &lt;div&gt;&lt;strong&gt;Current password&lt;/strong&gt;&lt;/div&gt;.&lt;/li&gt;
&lt;li&gt;Type your new &lt;div&gt;&lt;strong&gt;Password&lt;/strong&gt;&lt;/div&gt; (meeting &lt;a href=&quot;/docs/subscriptions/account-user-settings#requirements&quot;&gt;minimum requirements&lt;/a&gt;), and then re-type the new password in &lt;div&gt;&lt;strong&gt;Password confirmation&lt;/strong&gt;&lt;/div&gt;.&lt;/li&gt;
&lt;li&gt;Select &lt;div&gt;&lt;strong&gt;Save user preferences&lt;/strong&gt;&lt;/div&gt;.&lt;/li&gt;
&lt;li&gt;&lt;div&gt;&lt;strong&gt;Regenerate&lt;/strong&gt;&lt;/div&gt; your &lt;a href=&quot;/docs/apis/rest-api-v2/requirements/api-keys#creating&quot;&gt;API key&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;block-image image&quot;&gt;&lt;img src=&quot;https:/docs.newrelic.com/images/accounts_screenshot-full_user-preferences.webp&quot; alt=&quot;screen user preferences.png&quot;&gt;&lt;/div&gt;
&lt;div&gt;&lt;p&gt;&lt;div&gt;&lt;strong&gt;&lt;a href=&quot;https://rpm.newrelic.com&quot;&gt;rpm.newrelic.com&lt;/a&gt; &gt; &lt;a href=&quot;/docs/accounts/accounts-billing/general-account-settings/intro-account-settings&quot;&gt;(user menu)&lt;/a&gt; &gt; User preferences:&lt;/strong&gt;&lt;/div&gt; Anyone can change their own New Relic user name, account email, password, and other settings.&lt;/p&gt;&lt;/div&gt;</content:encoded><description>Published: Thu, 08 Oct 2020 00:00:00 +0000.</description></item><item><title><![CDATA[SolarWinds Orion]]></title><guid isPermaLink="false">U29sYXJXaW5kcyBPcmlvbg==</guid><link>https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/solarwinds-orion</link><pubDate>Fri, 05 Feb 2021 00:00:00 +0000</pubDate><content:encoded>&lt;p&gt;We understand that our customers are evaluating the impact of the &lt;a href=&quot;https://www.solarwinds.com/securityadvisory&quot;&gt;SolarWinds Security Advisory&lt;/a&gt; to their business. To address the immediate concern: New Relic is not a customer of the SolarWinds Orion product and therefore New Relic and customers using New Relic are not impacted by the compromised SolarWinds product.&lt;/p&gt;
&lt;h2&gt;New Relic and SolarWinds Orion [#statement]&lt;/h2&gt;
&lt;p&gt;New Relic Security is closely monitoring for updated information about the SolarWinds incident as it is released.&lt;/p&gt;
&lt;p&gt;As a proactive measure, New Relic security has conducted a review of our processes related to code integrity and software delivery. New Relic will take appropriate steps to implement improvements where needed. New Relic will also continue to evaluate our systems for indicators related to the SolarWinds incident.&lt;/p&gt;
&lt;p&gt;In accordance with our own vendor risk management program, New Relic has initiated communication with critical vendors to determine whether they use the SolarWinds product in any of the services they provide to us. Based on their response, New Relic will identify and take appropriate steps to mitigate the risk to our company and our customers.&lt;/p&gt;
&lt;p&gt;The security and privacy of our customers is our top priority, and we are continuing to follow the SolarWinds situation closely. We encourage customers with questions to contact us at &lt;a href=&quot;https://support.newrelic.com/&quot;&gt;support.newrelic.com/&lt;/a&gt;.&lt;/p&gt;</content:encoded><description>A summary of the 2020 security breach of the systems of SolarWinds Orion and New Relic&apos;s response.</description></item></channel></rss>