1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-23 00:50:48 +00:00
log4j-affected-db/data/cisagov_E.yml

6856 lines
186 KiB
YAML
Raw Normal View History

---
version: '1.0'
owners:
- name: cisagov
url: https://github.com/cisagov/log4j-affected-db
software:
- vendor: EasyRedmine
2022-02-08 19:24:37 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.easyredmine.com/news/easy-redmine-application-is-not-affected-by-the-vulnerability-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Eaton
2022-02-08 19:24:37 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 19:24:37 +00:00
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Security-Bulletin%20log4j_CVE_2021_44228_v1.0_Legal-Approved.pdf
2022-02-10 13:50:54 +00:00
notes: For security purposes direct notifications are being made to impacted customers. Please
stay tuned for more updates.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: EclecticIQ
2022-02-08 19:24:37 +00:00
product: TIP
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 19:24:37 +00:00
investigated: true
affected_versions:
2022-02-10 13:50:54 +00:00
- < 2.11
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.eclecticiq.com/security-advisories/security-issues-and-mitigation-actions/eiq-2021-0016-2
2022-02-10 13:50:54 +00:00
notes: This advisory is available to customer only and has not been reviewed by
CISA. The Threat Intel Platform includes Neo4j 3.5.12 (not vulnerable) and Elasticsearch
2022-02-08 19:24:37 +00:00
and Logstash OSS 7.9.1 (vulnerable) see Elasticsearch below for mitigation.
See link in their own fix for Logstash (Support account needed, ongoing investigation)
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Eclipse Foundation
2022-02-08 19:24:37 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://wiki.eclipse.org/Eclipse_and_log4j2_vulnerability_(CVE-2021-44228)
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Edwards
2022-02-08 19:24:37 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 19:24:37 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 19:24:37 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.edwards.com/devices/support/product-security
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: EFI
2022-02-08 19:24:37 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://communities.efi.com/s/article/Are-Fiery-Servers-vulnerable-to-CVE-2021-44228-Apache-Log4j2?language=en_US
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-08 21:23:38 +00:00
- vendor: eG Innovations
product: eG Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
2022-02-10 13:50:54 +00:00
- 7.1.8 - 7.1.9
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-02-08 21:23:38 +00:00
- https://www.eginnovations.com/brochures/eGEnterprise-and-Log4jShell-Vulnerability.pdf
notes: ''
references:
- ''
2022-02-08 21:23:38 +00:00
last_updated: '2022-01-06T00:00:00'
- vendor: EGroupware
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-02-08 21:23:38 +00:00
- https://help.egroupware.org/t/uk-de-statement-log4j-log4shell/76430
notes: ''
references:
- ''
2022-02-08 21:23:38 +00:00
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Elastic
2022-02-08 21:23:38 +00:00
product: APM Java Agent
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
2022-02-08 21:23:38 +00:00
fixed_versions:
2022-02-10 13:50:54 +00:00
- 1.17.0 - 1.28.0
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
2022-02-08 21:23:38 +00:00
notes: Only vulnerable with specific configuration.
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
2022-02-08 21:23:38 +00:00
product: APM Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
2022-02-08 21:23:38 +00:00
product: Beats
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
2022-02-08 21:23:38 +00:00
product: Cmd
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
2022-02-08 21:23:38 +00:00
product: Elastic Agent
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
2022-02-08 21:23:38 +00:00
product: Elastic Cloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
2022-01-24 22:27:28 +00:00
product: Elastic Cloud Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
2022-01-24 22:27:28 +00:00
product: Elastic Cloud on Kubernetes
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Elastic Endgame
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Elastic Maps Service
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Elasticsearch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-08 21:23:38 +00:00
affected_versions: []
fixed_versions:
2022-02-10 13:50:54 +00:00
- 7.16.2
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Endpoint Security
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Enterprise Search
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Fleet Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Kibana
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Logstash
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-08 21:23:38 +00:00
affected_versions: []
fixed_versions:
2022-02-10 13:50:54 +00:00
- 6.8.22
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Machine Learning
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Elastic
product: Swiftype
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-08 21:23:38 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-08 21:23:38 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Admin
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Banner Analytics
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Banner Document Management (includes Banner Document Retention)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Banner Event Publisher
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
product: Banner Integration for eLearning
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
product: Banner Integration for eProcurement
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Banner Self Service
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Banner Workflow
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Colleague
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
2022-01-24 22:27:28 +00:00
notes: On-prem and cloud deployements expect fixed 12/18/2021
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Colleague Analytics
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: CRM Advance
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: CRM Advise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: CRM Recruit
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Ellucian Advance Web Connector
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Ellucian Data Access
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Ellucian Design Path
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian ePrint
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Ethos API & API Management Center
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Ethos Extend
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Ethos Integration
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian eTranscripts
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Experience
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Intelligent Platform (ILP)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian International Student and Scholar Management (ISSM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Message Service (EMS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Messaging Adapter (EMA)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Mobile
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Payment Gateway
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-10 13:50:54 +00:00
product: Ellucian Portal
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Ellucian PowerCampus
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-01-24 22:27:28 +00:00
product: Ellucian Solution Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
product: Ellucian Workflow
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Ellucian
2022-02-09 16:20:32 +00:00
product: Enterprise Identity Services (BEIS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 16:20:32 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 16:20:32 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.ellucian.com/news/ellucian-response-apache-log4j-issue
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 148 Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 2051 Pressure Transmitter Family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 2088 Pressure Transmitter Family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 2090F/2090P Pressure Transmitters
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 215 Pressure Sensor Module
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 248 Configuration Application
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 248 Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 3051 & 3051S Pressure transmitter families
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 3144P Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 326P Pressure Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 326T Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 327T Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 4088 Pressure Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 4088 Upgrade Utility
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 4600 Pressure Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 4732 Endeavor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 550 PT Pressure Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 5726 Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 644 Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 648 Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: 848T Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Combustion - OCX OXT 6888 CX1100 6888Xi
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT2211 QCL Aerosol Microleak Detection System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT3000 QCL Automotive OEM Gas Analyzer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT4000 QCL Marine OEM Gas Analyzer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT4215 QCL Packaging Leak Detection System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT4400 QCL General Purpose Continuous Gas Analyzer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT4404 QCL pMDI Leak Detection Analyzer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT5100 QCL Field Housing Continuous Gas Analyzer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT5400 QCL General Purpose Continuous Gas Analyzer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: CT5800 QCL Flameproof Housing Continuous Gas Analyzer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: DHNC1 DHNC2
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: DHNC1 DHNC2
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Emerson Aperio software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Engineering Assistant
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- 5.x
- 6.x
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Fieldwatch and Service consoles
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Fieldwatch and Service consoles
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Flame Detection - 975UF & 975UR Infrared Flame Detectors 975HR Infrared
Hydrogen Flame Detector 975MR Multi-Spectrum Infrared Flame Detector
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Flarecheck FlowCheck Flowel & PWAM software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Flarecheck FlowCheck Flowel & PWAM software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Gas Analysis - X-STREAM Enhanced (XEGP XEGK XEGC XEGF XEFD XECLD)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Gas Chromatographs - M500/2350A MON2000 700XA/1500XA 370XA MON2020
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Gas Detection - Millennium II Basic Single & Dual Channel 928 Wireless
Gas Monitor/628 Gas Sensor 935 & 936 Open Path Gas Detector Millennium Air Particle
Monitor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Incus Ultrasonic gas leak detector
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: K-Series Coriolis Transmitters
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Liquid Transmitters - 5081 1066 1056 1057 56'
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Mark III Gas and Liquid USM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: MPFM2600 & MPFM5726
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Plantweb Advisor for Metrology and Metering Suite SDK
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Prolink Configuration Software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Prolink Mobile Application & ProcessViz Software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount 2230 Graphical Field Display
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount 2240S Multi-input Temperature Transmitter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount 2410 Tank Hub
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount 2460 System Hub
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount 3490 Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount CMS/IOU 61
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount CMS/SCU 51/SCC
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount CMS/WSU 51/SWF 51
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount IO-Link Assistant
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount Level Detectors (21xx)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount Level Transmitters (14xx 33xx 53xx 54xx 56xx)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount Radar Configuration Tool
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: Rosemount Radar Level Gauges (Pro 39xx 59xx)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Rosemount RadarMaster
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Rosemount RadarMaster Plus
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Rosemount Tank Radar Gauges (TGUxx)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Rosemount TankMaster
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Rosemount TankMaster Mobile
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Spectrex family Flame Detectors and Rosemount 975 flame detector
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: USM 3410 and 3810 Series Ultrasonic Transmitters
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: USM 3410 and 3810 Series Ultrasonic Transmitters
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
product: Vortex and Magmeter Transmitters
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Emerson
2022-01-24 22:27:28 +00:00
product: WCM SWGM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf
notes: ''
references:
- ''
last_updated: '2021-12-17T00:00:00'
2022-02-09 17:27:05 +00:00
- vendor: Enfocus
product: BoardingPass
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-09 17:27:05 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Enfocus
product: Connect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-09 17:27:05 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Enfocus
product: PDF Review Module
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-09 17:27:05 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Enfocus
product: PitStop
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-09 17:27:05 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Enfocus
product: Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-09 17:27:05 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Enovation
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://enovationgroup.com/nl/nieuws/log4j-vulnerability-cve-2021-44228/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: EnterpriseDT
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://enterprisedt.com/blogs/announcements/enterprisedt-does-not-use-log4j/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: ESET
2022-02-09 21:42:05 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 21:42:05 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.eset.com/en/alert8188-information-regarding-the-log4j2-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: ESET
product: Secure Authentication
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-09 21:42:05 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.eset.com/en/alert8188-information-regarding-the-log4j2-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: ESRI
product: ArcGIS Data Store
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/
notes: Requires script remediation. ESRI has created scripts to remove the JndiLookup
class, but has not issued patches to upgrade the Log4j versions
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: ESRI
product: ArcGIS Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/
notes: Requires script remediation. ESRI has created scripts to remove the JndiLookup
class, but has not issued patches to upgrade the Log4j versions
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: ESRI
product: ArcGIS GeoEvent Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/
notes: Requires script remediation. ESRI has created scripts to remove the JndiLookup
class, but has not issued patches to upgrade the Log4j versions
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: ESRI
product: ArcGIS Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/
notes: Requires script remediation. ESRI has created scripts to remove the JndiLookup
class, but has not issued patches to upgrade the Log4j versions
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: ESRI
product: ArcGIS Workflow Manager Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/
notes: Requires script remediation. ESRI has created scripts to remove the JndiLookup
class, but has not issued patches to upgrade the Log4j versions
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: ESRI
product: Portal for ArcGIS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/
notes: Requires script remediation. ESRI has created scripts to remove the JndiLookup
class, but has not issued patches to upgrade the Log4j versions
references:
- ''
last_updated: '2021-12-17T00:00:00'
- vendor: Estos
2022-02-09 21:42:05 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-09 21:42:05 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-09 21:42:05 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.estos.de/de/sicherheitshinweise/estos-von-kritischer-schwachstelle-in-log4j-cve-2021-44228-nicht-betroffen
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-10 13:01:03 +00:00
- vendor: EVL Labs
product: JGAAP
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-10 13:01:03 +00:00
investigated: true
affected_versions: []
fixed_versions:
2022-02-10 13:50:54 +00:00
- <8.0.2
2022-02-10 13:01:03 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-10 13:01:03 +00:00
vendor_links:
- https://github.com/evllabs/JGAAP/releases/tag/v8.0.2
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Evolveum Midpoint
product: Midpoint
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://evolveum.com/midpoint-not-vulnerable-to-log4shell/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Ewon
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
2022-02-10 13:01:03 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42
notes: ''
references:
- ''
last_updated: '2022-02-02T07:18:50+00:00'
- vendor: Ewon
product: eCatcher
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-10 13:50:54 +00:00
- 6.7.6
2022-02-10 13:01:03 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42
notes: ''
references:
- ''
last_updated: '2022-02-02T07:18:50+00:00'
- vendor: Exabeam
2022-02-10 13:01:03 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.exabeam.com/s/discussions?t=1639379479381
notes: This advisory is available to customers only and has not been reviewed
by CISA
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
2022-02-10 13:23:37 +00:00
product: AEC
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Audition
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: BoekhoudGemak
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Bouw7
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Business Suite
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: CommunicatieGemak
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Consolidation powered by LucaNet
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Digipoort
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: DigitaleFactuur
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Dimoni
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: EDI Gateway
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: FDS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Financials
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: FiscaalGemak
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Globe Core Product
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Globe E-report/Crystal Reports
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Go2UBL
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Gripp
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: HR & SalarisGemak
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Insights (Qlik)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Officient
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Online All core products
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Online Elastic Search
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Online Samenwerken (OSW)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Payroll Plus (Loket)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: ProAcc
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: ProQuro
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: RapportageGemak
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Reeleezee
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-10 13:23:37 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: ScanSys
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-10 13:23:37 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-10 13:23:37 +00:00
- vendor: Exact
product: SRXP
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Synergy Core Product
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Synergy Elastic Search
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-10 13:50:54 +00:00
- 6.6.2
2022-02-10 13:23:37 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: WerkprogrammaGemak
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: Winbooks
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exact
product: WMS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-10 13:23:37 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
2022-02-10 13:23:37 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.exact.com/news/general-statement-apache-leak
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Exivity
product: On-Premise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-10 13:23:37 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-10 13:50:54 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.exivity.com/getting-started/releases/announcements#announcement-regarding-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-10 13:23:37 +00:00
- vendor: Extensis
product: Universal Type Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '>=7.0.6'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://help.extensis.com/hc/en-us/articles/4412767414299-Universal-Type-Server-7-and-Log4j-vulnerabilities
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: ExtraHop
product: Reveal(x)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- <=8.4.6
- <=8.5.3
- <=8.6.4
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://forums.extrahop.com/t/extrahop-update-on-log4shell/8148
notes: Versions >8.4.7, >8.5.4, >8.6.5 and >=8.7 are fixed.
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: eXtreme Hosting
2022-02-10 13:23:37 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-10 13:23:37 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-10 13:23:37 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremehosting.nl/log4shell-log4j/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
2022-02-10 13:43:27 +00:00
product: 200-series
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-10 13:43:27 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: BOSS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: EXOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Extreme AirDefense
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Extreme Campus Controller (Extreme Cloud Appliance)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Extreme Fabric Automation (EFA)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Extreme Management Center (XMC)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Extreme Visibility Manager (XVM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeAnalytics
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeCloud A3
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeCloud IQ
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeConnect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeControl
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeGuest
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeLocation
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: ExtremeWireless (IdentiFi)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Fabric Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Guest and IoT Manager (GIM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: HiveManager Classic On-Premises
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: HiveManager Classic Online
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Ipanema Ip | Engine
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Ipanema SALSA
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-10 13:50:54 +00:00
- 9.3.8
- 9.4.3
2022-02-10 13:43:27 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Ipanema SD-WAN Orchestrator
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: IQEngine (HiveOS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-10 13:43:27 +00:00
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: IQVA
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-10 13:50:54 +00:00
- 21.1.22.1-IQVA
2022-02-10 13:43:27 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: NetIron OS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Network OS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: NSight
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: SLX-OS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: Traffic Sensor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: VGVA
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: VOSS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extreme Networks
product: WiNG
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://extremeportal.force.com/ExtrArticleDetail?an=000100806
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Extron
2022-02-10 13:43:27 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.extron.com/featured/Security-at-Extron/extron-security
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
...