A vulnerability scan may flag the Clarity XOG client due to the included version of Log4j Core (e.g., version 2.20.0). The vulnerability identified is CVE-2025-68161, which relates to Apache Log4j Core versions 2.0-beta9 through 2.25.2 failing to perform TLS hostname verification in the Socket Appender. This could potentially allow a Man-in-the-Middle (MITM) attack to intercept or redirect log traffic.
Clarity 16.4.1 XOG (XML Open Gateway) Client
CVE-2025-68161 specifically impacts the Log4j Socket Appender when using TLS for remote logging. The software ignores the verifyHostName setting, failing to verify the peer certificate's hostname.
The Clarity XOG client is not affected by CVE-2025-68161 in its default configuration.