We have just published an article about the an exploit in the log4j logging library. Pulse 6 could be used to exploit the vulnerability but the attacker would need admin permissions in Pulse.
If you have Pulse 6 you should apply one of the fixes in the article.
The latest release is 2.16.0. Some initial changes were introduced in 2.15.0 to resolve the issue, and some more comprehensive changes were made in 2.16.0 and released yesterday.
From my understanding PAL local is not impacted, TM1Web uses version 1 of log4j and the server itself is C++. If you look in the install directory no v2 log4j jar files can be found. PAW and CA both have v2 jar files.
See IBMs statement in https://www.ibm.com/support/pages/node/6525700? βWithin IBM Planning Analytics 2.0, only the IBM Planning Analytics Workspace component of IBM Planning Analytics is affected by a security vulnerability.β
This whole Log4j saga is getting even more interesting following discovery that 2.15 has a critical vulnerability 2.16 turned out to have high so 2.17 contains the fix for it: