DigiCert is aware of the zero-day exploit affecting the Java Spring Framework disclosed on March 31, 2022. We continue to analyze this vulnerability and its potential impact on our services. At this time, we are not aware of any issue for our customers or services, and all services continue to operate as expected.
Our team of security professionals continues to monitor the overall impact of the Java Spring Framework vulnerabilities (CVE-2022-22965). We will provide new information as it becomes available.
CertCentral
Services
Impacted/Not affected
Patch status
Notes
CertCentral API
Not affected
CertCentral console
Not affected
Automation: DigiCert Automation Agent
Not affected
Discovery and Automation: On-premises sensor
Not affected
Discovery and Automation: CertCentral public scan
Not affected
Discovery and Automation:
CertCentral-Discovery as a Service
Not affected
ACME
Not affected
DigiCert Site Seal
Services
Impacted/Not affected
Patch status
Notes
Site Seal
Not affected
Certificate Issuing Service (CIS)
Services
Impacted/Not affected
Patch status
Notes
CIS
Not affected
Code Signing Timestamp Service
Services
Impacted/Not affected
Patch status
Notes
Code Signing Timestamp Service
Not affected
Online Certificate Status Protocol (OCSP)
Services
Impacted/Not affected
Patch status
Notes
OCSP
Not affected
Certificate Revocation List (CRL)
Services
Impacted/Not affected
Patch status
Notes
CRL
Not affected
digicert.com
Services
Impacted/Not affected
Patch status
Notes
Website
Not affected
Managed PKI (User Authentication)
Services
Impacted/Not affected
Patch status
Notes
PKI Platform 8
Not affected
PKI Platform 8: Web Services (SOAP API)
Not affected
PKI Platform 8: REST API
Not affected
PKI Platform 8: UAA
Not affected
PKI Platform 8:
Enterprise Gateway
Not affected
PKI Platform 8:
Auto Enrollment Server
Not affected
PKI Platform 8:
Local Key Management Server (LKMS)
Not affected
PKI Platform 8:
PKI Client
Not affected
PKI Platform 8:
InTune Import Tool
Not affected
PKI Platform 8:
Enrollment over Secure Transport (EST) Client
Not affected
PKI Platform 8:
Simple Certificate Enrollment Protocol (SCEP) Client
Not affected
PKI Platform 8:
DigiCert Desktop Client
Not affected
PKI Platform 8:
Bulk Export Tool
Not affected
PKI Platform 8:
Enrollment over Secure Transport (EST) Proxy Server
Not affected
PKI Platform 8:
Simple Certificate Enrollment Protocol (SCEP) Proxy Server
Not affected
PKI Platform 8+: JP Public Retail system (non S/MIME)
Not affected
PKI Platform 7 (Including PC/CLP)
Not affected
PKI Platform 7 (Japan) Plus Japan unique services
Not affected
MPKI 7 Web Service (MWS)
Not affected
MPKI for Smartphone (AKA MPKI for Device)
Not affected
Twin'et
Not affected
CI+ Platform
Not affected
Online Certificate Status Protocol (OCSP)
Not affected
Certificate Revocation List (CRL)
Not affected
Direct Cert Portal
Services
Impacted/Not affected
Patch status
Notes
Direct Cert Portal API
Not affected
Direct Cert Portal Console
Not affected
DigiCert ONE
Services
Impacted/Not affected
Patch status
Notes
Account Manager
Not affected
CA Manager
Not affected
DigiCert® Trust Lifecycle Manager
Not affected
DigiCert® IoT Trust Manager
Not affected
DigiCert® Software Trust Manager
Not affected
DigiCert® Document Trust Manager
Not affected
Automation Manager
Not affected
Automation Manager, on-premises sensor
Not affected
DigiCert ONE Japan
Services
Impacted/Not affected
Patch status
Notes
Account Manager
Not affected
CA Manager
Not affected
Enterprise PKI Manager
Not affected
IoT Device Manager
Not affected
Secure Software Manager
Not affected
Document Signing Manager
Not affected
Enterprise
Services
Impacted/Not affected
Patch status
Notes
API VICE2
Not affected
DigiCert Gatekeeper Service
Services
Impacted/Not affected
Patch status
Notes
GateKeeper
Not affected
QuoVadis
Services
Impacted/Not affected
Patch status
Notes
DSS-Engine Production
DSS-Engine Staging
Trust/Link
Not affected
SealSign Cloud Production
Not affected
SealSign Cloud Staging
Not affected
QVSS (QuoVadis Signing Service)
QuoVadis Qualified Timestamps
QuoVadis website Netherlands
QuoVadis NOVA System
TL/C Demo
TL/C Prod
PERSS
SixTerravis
Primosign
Not affected
If you discover your systems are affected by Java Spring Framework, DigiCert recommends that you create new keys, request replacement certificates, and revoke any impacted certificates from the compromised systems.
For further questions, contact DigiCert Support.