Last checked: 9 minutes ago
Get notified about any outages, downtime or incidents for Miro and 1800+ other cloud vendors. Monitor 10 companies, for free.
Outage and incident data over the last 30 days for Miro.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage. It's completely free and takes less than 2 minutes!
Sign Up NowOutlogger tracks the status of these components for Xero:
Component | Status |
---|---|
Application | Active |
Billing | Active |
Log in ability | Active |
Mail System | Active |
Web Site | Active |
View the latest incidents for Miro and check for official updates:
Description: The issue has been resolved successfully, and Miro AI is up and running again. Thank you for bearing with us!
Status: Resolved
Impact: Major | Started At: July 3, 2024, 3:23 p.m.
Description: On Friday, 6th March, a fix was applied to the EasyList filter list used by a number of popular ad blockers such as uBlock. As a result, users of ad blockers should no longer encounter issues accessing Miro features.
Status: Resolved
Impact: Minor | Started At: April 4, 2024, 4:46 p.m.
Description: This incident has been resolved.
Status: Resolved
Impact: Minor | Started At: March 5, 2024, 4:26 p.m.
Description: We want to provide an update on the recently reported CVE-2024-23748, a vulnerability which relates to certain configurations of the ElectronJS framework and has the potential to impact a number of applications, including Miro. The security of our users and our product is critically important to us here at Miro, and we take these reports seriously. We have thoroughly researched the potential impact of this vulnerability on the Miro client to clearly understand any exposure it might create. Based on our investigations, we believe that the potential impact is not as severe as reported. We have found an attacker must already have the ability to run applications on a user’s computer to potentially execute code in the context of the Miro application as also clarified in ElectronsJS blog post describing the underlying vulnerability. We have addressed this vulnerability by releasing an updated, patched version of the Miro macOS application. We strongly encourage users to update to the latest version (0.8.39), which contains the patch for this vulnerability. Most users will receive the update automatically through a restart, but enterprises who centrally manage and distribute their updates will need to proactively update to the latest version. Additionally, based on our investigation, we believe that the statement from the NVD [1] that this is Remote Code Execution (RCE) is incorrect, as an attacker requires local access to the user’s machine in order to execute this attack. Using a standard CVSS calculation, we consider the rating for this vulnerability to be a Medium. Miro has since contacted the NVD to dispute the accuracy and completeness of the information published. Resources [1] Miro CVE - https://nvd.nist.gov/vuln/detail/CVE-2024-23746 [2] Official Electron statement - https://www.electronjs.org/blog/statement-run-as-node-cves
Status: Resolved
Impact: None | Started At: Feb. 15, 2024, 7:02 p.m.
Description: The fix applied was successful and service has been fully restored. We thank you again for your patience.
Status: Resolved
Impact: Major | Started At: Jan. 29, 2024, 7:14 a.m.
Join OutLogger to be notified when any of your vendors or the components you use experience an outage or down time. Join for free - no credit card required.