Cloud Backup Solutions – Code42 Application Name and Path Changes

With the release of Code42 app 8.2.0 expected in early July 2020, Code42 will be modifying path and process names for the Code42 app on endpoints. These changes are occurring as part of an ongoing effort to reduce confusion between CrashPlan (legacy branding) and the Code42 App (current branding).

What is changing:

Code42 is removing the word “CrashPlan” and replacing it with “Code42” for process names and certain directories on Windows, macOS, and Linux devices. Directories containing logs and backup data will not be modified (for example, C:\ProgramData\CrashPlan and /Library/Application\ Support/CrashPlan are not changing).

Full information on the changing paths can be found on the Code42 Support site.

Impacted customers:

Path names will change for all customers using the Code42 cloud beginning with the 8.2 release of the Code42 app in early July 2020. This will impact the ability of the Code42 app to continue to function in instances where application or process whitelists are utilized on the endpoint or network.

Action required for customers with application blocklists, or other endpoint security controls: 

Update all known application restrictions to allow the new paths and process names to continue to function prior to allowing endpoints to upgrade to 8.2.

Cloud Backup Solutions – Environment Upgrade v7.0.5

Yesterday the Cloud Backup environment was upgraded after-hours to v7.0.5.

This upgrade was a security vulnerability resolution.

Security Vulnerability Details

  • Code42 server version 7.0.5 corrects a vulnerability that potentially allows remote code execution on the server by an authenticated user.
  • The Common Vulnerability Scoring System (CVSS) score for the vulnerability is 8.0.
  • We are not currently aware of any attempts to actively exploit this vulnerability.
  • Customers with their own on-premises authority server require an upgrade to version 7.0.5.
  • Code42 cloud customers have already been remediated, so no action is required on their part.
  • Reserved Common Vulnerability and Exposure (CVE) ID: CVE-2020-12736.

This update did not include an app update.

We continue to grow our business and strive to provide service excellence whilst protecting our customers’ critical data.