1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-18 23:07:54 +00:00
log4j-affected-db/data/cisagov_D.yml

11040 lines
312 KiB
YAML
Raw Normal View History

---
version: '1.0'
owners:
- name: cisagov
url: https://github.com/cisagov/log4j-affected-db
software:
- vendor: Daktronics
product: All Sport Pro
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
2022-01-24 22:27:28 +00:00
product: Dakronics Media Player
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
- DMP (any series)
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Dakronics Web Player
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions:
2022-02-03 21:14:08 +00:00
- DWP-1000
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
2022-02-01 15:41:22 +00:00
notes: DWP-1000 is not present in our codebase, but awaiting confirmation from
LG re webOS platform.
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
2022-01-24 22:27:28 +00:00
product: Data Vision Software (DVS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
2022-01-24 22:27:28 +00:00
notes: DVS has one microservice that uses Log4j, but it uses a version that is
not impacted.
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Dynamic Messaging System (DMS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Dynamic Messaging System - DMS Core Player
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- P10
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Dynamic Messaging System - DMS Player hardware
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- AMP-R200
- AMP-R400
- AMP-R800
- AMP-SM100
- AMP-SE100
- AMP-SM200
- AMP-SM400
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Dynamic Messaging System - DMS Web Player
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
2022-02-03 21:14:08 +00:00
notes: DMS Web Player not present in our codebase, but awaiting confirmation from
LG re webOS platform.
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: IBoot - Dataprobe IBoot Devices
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- A-3257
- '3256'
- '2270'
- '2269'
- '1978'
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Outdoor Smartlink Devices
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- A-3189335
- '3128'
- '3416'
- '3418'
- '3707'
- '3708'
- '3709'
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Routers - Cisco Meraki Z3/Z3c Routers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- A-4036028
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Routers - Cisco Z1 Routers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- A-3665
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Routers - Sierra Wireless RV50x/RV50
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions:
2022-02-03 21:14:08 +00:00
- A-3350704
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Show Control System (SCS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Vanguard
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Venus 1500
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Venus Control Suite (VCS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Video Image Processors
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- VIP-5060/VIP-5160/VIP-4060
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: Daktronics
product: Webcam - Mobotix
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- A-2242
- A-3127
- A-3719
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.daktronics.com/en-us/support/kb/000025337
notes: ''
references:
- ''
last_updated: '2022-01-06T00:00:00'
- vendor: DarkTrace
2022-02-01 18:12:12 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://customerportal.darktrace.com/inside-the-soc/get-article/201
2022-02-03 21:14:08 +00:00
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Dassault Systèmes
2022-02-01 18:15:18 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.dsxclient.3ds.com/mashup-ui/page/resultqa?id=QA00000102301e
2022-02-03 21:14:08 +00:00
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Databricks
2022-02-01 18:15:18 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.google.com/document/d/e/2PACX-1vREjwZk17BAHGwj5Phizi4DPFS9EIUbAMX-CswlgbFwqwKXNKZC8MrT-L6wUgfIChsSHtvd_QD3-659/pub
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Datadog
2022-02-01 18:24:17 +00:00
product: Datadog Agent
cves:
cve-2021-4104:
2022-02-01 18:15:18 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-01 18:24:17 +00:00
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '>=6.17.0'
2022-02-03 21:14:08 +00:00
- <=6.32.2
- '>=7.17.0'
2022-02-03 21:14:08 +00:00
- <=7.32.2
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.datadoghq.com/log4j-vulnerability/
2022-02-01 18:24:17 +00:00
notes: JMX monitoring component leverages an impacted version of log4j.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Datadog
product: datadog-kafka-connect-logs
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- < 1.0.2
2022-02-01 18:24:17 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.datadoghq.com/log4j-vulnerability/
notes: Version 1.0.2 of the library uses version 2.16.0 of Log4j.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Datadog
product: datadog-lambda-java
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- < 1.0.2
2022-02-01 18:24:17 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.datadoghq.com/log4j-vulnerability/
2022-02-03 21:14:08 +00:00
notes: Following AWS recommendation, library updated using the latest version
of amazon-lambda-java-log4j2 (1.4.0).
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Dataminer
2022-02-01 18:34:54 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.dataminer.services/responding-to-log4shell-vulnerability/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Datev
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.datev-community.de/t5/Freie-Themen/Log4-J-Schwachstelle/m-p/258185/highlight/true#M14308
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Datto
2022-02-01 18:34:54 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.datto.com/blog/dattos-response-to-log4shell
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-01 18:34:54 +00:00
- vendor: DBeaver
product: All
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dcache.org/post/log4j-vulnerability/
notes: ''
references:
- ''
last_updated: '2021-12-15T07:18:50+00:00'
- vendor: dCache.org
2022-02-01 18:34:54 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dcache.org/post/log4j-vulnerability/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Debian
2022-02-01 18:38:08 +00:00
product: Apache-log4j.1.2
cves:
cve-2021-4104:
2022-02-01 18:38:08 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- stretch, buster, bullseye
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- stretch, buster, bullseye
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-01 18:38:08 +00:00
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-01 18:38:08 +00:00
vendor_links:
- https://security-tracker.debian.org/tracker/CVE-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Debian
product: Apache-log4j2
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- stretch, buster, bullseye
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions:
- stretch, buster, bullseye
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://security-tracker.debian.org/tracker/CVE-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-01 18:52:44 +00:00
- vendor: Decos
product: Cloud
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
vendor_links:
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
notes: ''
references:
- ''
last_updated: '2022-02-01T07:18:50+00:00'
- vendor: Decos
product: EvenementenAssistent + InkomensAssistent + Leerlingenvervoer + AIM online
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
vendor_links:
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
notes: ''
references:
- ''
last_updated: '2022-02-01T07:18:50+00:00'
- vendor: Decos
product: Fixi
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
vendor_links:
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
notes: ''
references:
- ''
last_updated: '2022-02-01T07:18:50+00:00'
- vendor: Decos
product: Integrations (StUF/ZGW/Doclogic-DataIntegrator)
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
vendor_links:
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
notes: ''
references:
- ''
last_updated: '2022-02-01T07:18:50+00:00'
- vendor: Decos
product: JOIN Klant Contact
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
vendor_links:
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
notes: ''
references:
- ''
last_updated: '2022-02-01T07:18:50+00:00'
- vendor: Decos
product: JOIN Zaak &I Document (on-premise)
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
2022-02-03 21:14:08 +00:00
notes: The solution contains Elasticsearch (vulnerable). Mitigating actions available
on our WIKI.
2022-02-01 18:52:44 +00:00
references:
- ''
last_updated: '2022-02-01T07:18:50+00:00'
- vendor: Decos
product: JOIN Zaak &I Document (on-premise)
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- All
2022-02-01 18:52:44 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
2022-02-03 21:14:08 +00:00
notes: The SaaS hosted solution contains Logstash + Elasticsearch (vulnerable).
Mitigating actions taken.
2022-02-01 18:52:44 +00:00
references:
- ''
last_updated: '2022-02-01T07:18:50+00:00'
- vendor: Deepinstinct
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.deepinstinct.com/blog/log4shell-cve-2021-44228-what-you-need-to-know
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Dell
product: Alienware Command Center
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Alienware OC Controls
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Alienware On Screen Display
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Alienware Update
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: APEX Console
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: Cloud environment patched.
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: APEX Data Storage Services
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions:
- ''
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: Cloud environment patch in progress.
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Atmos
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: Avamar vproxy
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: CalMAN Powered Calibration Firmware
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-01 19:33:56 +00:00
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-01 19:33:56 +00:00
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: CalMAN Ready for Dell
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Centera
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Chameleon Linux Based Diagnostics
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Chassis Management Controller (CMC)
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: China HDD Deluxe
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
2022-02-03 21:14:08 +00:00
- vendor: Dell
product: Client Platforms (Latitude, OptiPlex, Alienware, Inspiron, Precision,
XPS, Vostro, ChengMing) BIOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Cloud IQ
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: Cloud environment patched.
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Cloud Mobility for Dell EMC Storage
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Cloud Tiering Appliance
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: CloudIQ Collector
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: Common Event Enabler
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Connectrix (Cisco MDS 9000 switches)
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Connectrix (Cisco MDS DCNM)
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 17:37:44 +00:00
investigated: true
2022-02-03 21:14:08 +00:00
affected_versions: Versions prior to 11.5(1x)
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: Patch expected by 12/23/21.
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-302](https://www.dell.com/support/kbdoc/en-us/000194797/dsa-2021-302-dell-connectrix-mds-dcnm-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Connectrix B-Series SANnav
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
- 2.1.1
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: Patch expected by 2/28/2022.
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-266](https://www.dell.com/support/kbdoc/en-us/000194461/dsa-2021-266-dell-emc-connectrix-b-series-sannav-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Connextrix B Series
cves:
cve-2021-4104:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: CyberSecIQ Application
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: CyberSense for PowerProtect Cyber Recovery
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Data Domain OS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- Versions from 7.3.0.5 to 7.7.0.6
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-274
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-274](https://www.dell.com/support/kbdoc/en-us/000194503/dsa-2021-274-dell-emc-data-domain-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell BSAFE Crypto-C Micro Edition
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell BSAFE Crypto-J
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell BSAFE Micro Edition Suite
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Calibration Assistant
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Cinema Color
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Cloud Command Repository Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Cloud Management Agent
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Color Management
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Command Configure
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Command Integration Suite for System Center
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Command Intel vPro Out of Band
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Command Monitor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Command Power Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Command PowerShell Provider
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Command Update
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Customer Connect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Data Guardian*
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Data Protection*
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Data Recovery Environment
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Data Vault
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Data Vault for Chrome OS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Deployment Agent
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Digital Delivery
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Direct USB Key
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Display Manager 1.5 for Windows / macOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Display Manager 2.0 for Windows / macOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC AppSync
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:37:44 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Avamar
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
- '18.2'
- '19.1'
- '19.2'
- '19.3'
- '19.4'
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: Patch expected by 12/20/21.
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-277](https://www.dell.com/support/kbdoc/en-us/000194480/dsa-2021-277-dell-emc-avamar-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC BSN Controller Node
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 17:37:44 +00:00
investigated: true
affected_versions: []
fixed_versions:
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-305
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-305](https://www.dell.com/support/kbdoc/en-us/000194631/dsa-2021-305-dell-emc-bsn-controller-node-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Cloud Disaster Recovery
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- Versions from 19.6 and later
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: Patch pending
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-289](https://www.dell.com/support/kbdoc/en-us/000194663/dsa-2021-289-dell-emc-cloud-disaster-recovery-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-and-cve-2021-45046)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Cloudboost
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC CloudLink
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Container Storage Modules
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Data Computing Appliance (DCA)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Data Protection Advisor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-02-03 17:37:44 +00:00
fixed_versions:
2022-02-03 21:14:08 +00:00
- 18.x (or earlier) -standalone DPA is EOSL
- 18.2.x (IDPA)
- 19.1.x
- 19.2.x
- 19.3.x
- 19.4.x
- 19.5.x
- 19.6.0
2022-02-03 17:37:44 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-309](https://www.dell.com/support/kbdoc/en-us/000194651/dsa-2021-309-dell-emc-dpa-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Data Protection Central
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 17:37:44 +00:00
investigated: true
affected_versions: []
2022-02-03 17:37:44 +00:00
fixed_versions:
2022-02-03 21:14:08 +00:00
- 18.2.x-19.4.x
- 19.5.0-19.5.0.7
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 17:37:44 +00:00
notes: See DSA-2021-269
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-269](https://www.dell.com/support/kbdoc/en-us/000194557/dsa-2021-269-dell-emc-data-protection-central-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Data Protection Search
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- Versions before 19.6
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-279
references:
2022-02-03 17:37:44 +00:00
- '[DSA-2021-279](https://www.dell.com/support/kbdoc/en-us/000194629/dsa-2021-279-dell-emc-data-protection-search-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC DataIQ
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:37:44 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Disk Library for Mainframe
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:37:44 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Enterprise Storage Analytics for vRealize Operations
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- <6.0.0
- 6.1.0
- 6.2.x
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-278
references:
2022-02-03 17:54:51 +00:00
- '[DSA-2021-278](https://www.dell.com/support/kbdoc/en-us/000194488/dsa-2021-278)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC GeoDrive
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:54:51 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Integrated System for Azure Stack HCI
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 17:54:51 +00:00
- ''
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 17:54:51 +00:00
notes: Dell EMC Integrated System for Azure Stack HCI is not impacted by this
2022-01-24 22:27:28 +00:00
advisory. If Dell EMC SupportAssist Enterprise (SAE) or Dell EMC Secure Connect
Gateway (SCG) were optionally installed with Dell EMC Integrated System for
2022-02-03 17:54:51 +00:00
Azure Stack HCI monitor the following advisories. See DSA-2021-307.
references:
2022-02-03 17:54:51 +00:00
- '[DSA-2021-307](https://www.dell.com/support/kbdoc/en-us/000194622/dsa-2021-307-dell-emc-integrated-system-for-azure-stack-hci-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Integrated System for Microsoft Azure Stack Hub
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 17:54:51 +00:00
- ''
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 17:54:51 +00:00
notes: Patchexpected by 2022-01-31.
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Isilon InsightIQ
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:54:51 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC License Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:54:51 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Metro Node
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- Versions before 7.0.1 P2
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-308
references:
2022-02-03 17:54:51 +00:00
- '[DSA-2021-308](https://www.dell.com/support/kbdoc/en-us/000194630/dsa-2021)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 17:54:51 +00:00
product: Dell EMC NetWorker
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- 19.4.x
- 19.5.x
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: Patch expected by 12/20/21
references:
2022-02-03 17:54:51 +00:00
- '[DSA-2021-280](https://www.dell.com/support/kbdoc/en-us/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 17:54:51 +00:00
product: Dell EMC NetWorker VE
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- 19.4.x
- 19.5.x
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: Patch expected by 12/20/21
references:
2022-02-03 17:54:51 +00:00
- '[DSA-2021-280](https://www.dell.com/support/kbdoc/en-us/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Networking Onie
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:54:51 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Networking Virtual Edge Platform with VersaOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 17:54:51 +00:00
affected_versions: []
fixed_versions: []
2022-02-03 17:54:51 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 17:54:51 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC OpenManage Ansible Modules
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 17:54:51 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
2022-02-03 18:19:55 +00:00
- vendor: Dell
product: Dell EMC OpenManage Enterprise Services
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- Version 1.2 and earlier
2022-02-03 18:19:55 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: Patch expected by 12/20/21
references:
- '[DSA-2021-276](https://www.dell.com/support/kbdoc/en-us/000194652/dsa-2021-276-dell-emc-openmanage-enterprise-services-security-update-for-apache-log4j-remote-code-execution-vulnerabilities-cve-2021-44228-cve-2021-45046)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC OpenManage integration for Splunk
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 18:19:55 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC OpenManage Integration for VMware vCenter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 18:19:55 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC OpenManage Management pack for vRealize Operations
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 18:19:55 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC OpenManage Operations Connector for Micro Focus Operations Bridge
Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 18:19:55 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerFlex Appliance
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
- ''
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-293.
references:
- '[DSA-2021-293](https://www.dell.com/support/kbdoc/en-us/000194579/dsa-2021-293-dell-powerflex-appliance-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerFlex Rack
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- RCM 3.3 train - all versions up to 3.3.11.0
- RCM 3.4 train - all versions up to 3.4.6.0
- RCM 3.5 train - all versions up to 3.5.6.0
- RCM 3.6 train - all versions up to 3.6.2.0
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-292.
references:
- '[DSA-2021-292](https://www.dell.com/support/kbdoc/en-us/000194578/dsa-2021-292-dell-powerflex-rack-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerFlex Software (SDS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
- '3.5'
2022-02-03 21:14:08 +00:00
- 3.5.1
- 3.5.1.1
- 3.5.1.2
- 3.5.1.3
- 3.5.1.4
- '3.6'
2022-02-03 21:14:08 +00:00
- 3.6.0.1
- 3.6.0.2
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-272.
references:
- '[DSA-2021-272](https://www.dell.com/support/kbdoc/en-us/000194548/dsa-2021-272-dell-powerflex-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerPath
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerPath Management Appliance
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerProtect Cyber Recovery
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerProtect Data Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- All versions 19.9 and earlier
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-286.
references:
- '[DSA-2021-286](https://www.dell.com/support/kbdoc/en-us/000194549/dsa-2021-286-dell-emc-power-protect-data-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerProtect DP Series Appliance (iDPA)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- 2.7.0 and earlier
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA 2021-285.
references:
- '[DSA-2021-285](https://www.dell.com/support/kbdoc/en-us/000194532/dsa-2021-285-dell-emc-integrated-data-protection-appliance-powerprotect-dp-series-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerScale OneFS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerShell for PowerMax
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerShell for Powerstore
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerShell for Unity
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC PowerStore
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- Versions before 2.0.1.3-1538564
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-295.
references:
- '[DSA-2021-295](https://www.dell.com/support/kbdoc/en-us/000194739/dsa-2021-295-dell-emc-powerstore-family-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-and-cve-2021-45046)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 19:53:40 +00:00
product: Dell EMC PowerSwitch Z9264F-ON BMC
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 19:53:40 +00:00
product: Dell EMC PowerSwitch Z9432F-ON BMC
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 19:53:40 +00:00
product: Dell EMC PowerVault ME4 Series Storage Arrays
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 19:53:40 +00:00
affected_versions: []
fixed_versions: []
2022-02-03 19:53:40 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 19:53:40 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 19:53:40 +00:00
product: Dell EMC RecoverPoint
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- All
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 19:53:40 +00:00
notes: See DSA 2021-284.
references:
2022-02-03 19:53:40 +00:00
- '[DSA 2021-284](https://www.dell.com/support/kbdoc/en-us/000194531/dsa-2021-284-dell-emc-recoverpoint-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Repository Manager (DRM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Ruckus SmartZone 100 Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 19:53:40 +00:00
investigated: true
affected_versions: []
2022-02-03 19:53:40 +00:00
fixed_versions:
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-303
references:
2022-02-03 19:53:40 +00:00
- '[DSA-2021-303](https://www.dell.com/support/kbdoc/en-us/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Ruckus SmartZone 300 Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 19:53:40 +00:00
investigated: true
affected_versions: []
2022-02-03 19:53:40 +00:00
fixed_versions:
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-303
references:
2022-02-03 19:53:40 +00:00
- '[DSA-2021-303](https://www.dell.com/support/kbdoc/en-us/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Ruckus Virtual Software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 19:53:40 +00:00
investigated: true
affected_versions: []
2022-02-03 19:53:40 +00:00
fixed_versions:
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-303
references:
2022-02-03 19:53:40 +00:00
- '[DSA-2021-303](https://www.dell.com/support/kbdoc/en-us/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC SourceOne
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 19:53:40 +00:00
product: Dell EMC SRM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 19:53:40 +00:00
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- Versions before 4.6.0.2
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 19:53:40 +00:00
notes: See DSA-2021-301.
references:
2022-02-03 19:53:40 +00:00
- '[DSA-2021-301](https://www.dell.com/support/kbdoc/en-us/000194613/dsa-2021-301)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Streaming Data Platform
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 19:53:40 +00:00
investigated: true
affected_versions:
2022-02-03 19:57:41 +00:00
- '1.1'
2022-02-03 19:53:40 +00:00
- '1.2'
2022-02-03 21:14:08 +00:00
- 1.2 HF1
2022-02-03 19:53:40 +00:00
- '1.3'
2022-02-03 21:14:08 +00:00
- 1.3.1
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 19:53:40 +00:00
notes: See DSA-2021-297.
references:
2022-02-03 19:53:40 +00:00
- '[DSA-2021-297](https://www.dell.com/support/kbdoc/en-us/000194627/dsa-2021-297-dell-emc-streaming-data-platform-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Systems Update (DSU)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Unisphere 360
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Unity
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 19:53:40 +00:00
investigated: true
affected_versions: []
2022-02-03 19:53:40 +00:00
fixed_versions:
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 19:53:40 +00:00
notes: See DSA-2021-294.
references:
2022-02-03 19:53:40 +00:00
- '[DSA-2021-294](https://www.dell.com/support/kbdoc/en-us/000194826/dsa-2021-294-dell-emc-unity-dell-emc-unityvsa-and-dell-emc-unity-xt-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046-and-cve-2021-45105)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC Virtual Storage Integrator
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC VPLEX
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
2022-02-03 19:53:40 +00:00
- vendor: Dell
product: Dell EMC vProtect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- 19.5-19.9
2022-02-03 19:53:40 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2022-007.
references:
- '[DSA-2022-007](https://www.dell.com/support/kbdoc/en-us/000195003/title-dsa-2022-007-dell-emc-vprotect-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC VxRail
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions:
2022-02-03 21:14:08 +00:00
- 4.5.x
- 4.7.x
- 7.0.x
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 19:53:40 +00:00
notes: See DSA-2021-265.
references:
2022-02-03 19:53:40 +00:00
- '[DSA-2021-265](https://www.dell.com/support/kbdoc/en-us/000194466/dsa-2021-265-dell-emc-vxrail-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: Dell EMC XC
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-311.
references:
- '[DSA-2021-311](https://www.dell.com/support/kbdoc/en-us/000194822/dsa-2021-311-dell-emc-xc-series-and-core-appliance-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046-and-cve-2021-45105)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell EMC XtremIO
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Encryption Enterprise*
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Encryption Personal*
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Endpoint Security Suite Enterprise*
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Hybrid Client
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell ImageAssist
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Insights Client
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Linux Assistant
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: Dell Memory Solutions
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Mobile Connect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Monitor ISP (Windows/Mac/Linux)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Monitor SDK
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Networking X-Series
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: Dell OpenManage Change Management
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: Dell OpenManage Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- Versions before 3.8.2
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-275
references:
- '[DSA-2021-275](https://www.dell.com/support/kbdoc/en-us/000194638/dsa-2021-275-dell-emc-openmanage-enterprise-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: Dell OpenManage Enterprise CloudIQ plugin
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: Dell OpenManage Enterprise Modular
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- Versions before 1.40.10
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-268
references:
- '[DSA-2021-268](https://www.dell.com/support/kbdoc/en-us/000194625/dsa-2021-268-dell-emc-openmanage-enterprise-modular-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: Dell OpenManage Enterprise Power Manager plugin
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: Dell OpenManage Mobile
2022-02-03 19:53:40 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: Dell OpenManage Server Administrator
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Optimizer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell OS Recovery Tool
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Peripheral Manager 1.4 / 1.5 for Windows
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Platform Service
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Power Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Power Manager Lite
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Precision Optimizer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Precision Optimizer for Linux
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Premier Color
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Recovery (Linux)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Remediation Platform
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Remote Execution Engine (DRONE)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Security Advisory Update - DSA-2021-088
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Security Management Server & Dell Security Management Server Virtual*
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell SupportAssist SOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Thin OS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Threat Defense
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell True Color
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Trusted Device
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dell Update
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Dream Catcher
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: DUP Creation Service
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: DUP Framework (ISG)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 19:53:40 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
2022-02-03 17:37:44 +00:00
- vendor: Dell
product: ECS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:13:12 +00:00
investigated: true
2022-02-03 17:37:44 +00:00
affected_versions: []
2022-02-03 20:13:12 +00:00
fixed_versions:
2022-02-03 21:14:08 +00:00
- 3.3.x
- 3.4.x
- 3.5.x
- 3.6.0.x
- 3.6.1.x
- 3.6.2.0
2022-02-03 17:37:44 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:13:12 +00:00
notes: See DSA-2021-273.
2022-02-03 17:37:44 +00:00
references:
2022-02-03 20:13:12 +00:00
- '[DSA-2021-273](https://www.dell.com/support/kbdoc/en-us/000194612/dsa-2021-273-dell-emc-ecs-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
2022-02-03 17:37:44 +00:00
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Embedded NAS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Embedded Service Enabler
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Enterprise Hybrid Cloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:13:12 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:13:12 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:13:12 +00:00
notes: See DSA-2021-270.
references:
2022-02-03 20:13:12 +00:00
- '[DSA-2021-270](https://www.dell.com/support/kbdoc/en-us/000194490/dsa-2021-270-enterprise-hybrid-cloud-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Equallogic PS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Fluid FS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: iDRAC Service Module (iSM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Infinity MLK (firmware)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Integrated Dell Remote Access Controller (iDRAC)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: ISG Accelerators
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: ISG Board & Electrical
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: ISG Drive & Storage Media
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: IsilonSD Management Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: IVE-WinDiag
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Mainframe Enablers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: MDS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: My Dell
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: MyDell Mobile
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: NetWorker Management Console
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Networking BIOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Networking DIAG
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Networking N-Series
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: Networking OS 10
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: Networking OS 9
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Networking SD-WAN Edge SD-WAN
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Networking W-Series
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Networking X-Series
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: OMIMSSC (OpenManage Integration for Microsoft System Center)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: OMNIA
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: OpenManage Connections - Nagios
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: OpenManage Connections - ServiceNow
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 21:14:08 +00:00
product: OpenManage Integration for Microsoft System Center for System Center
Operations Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: OpenManage Integration with Microsoft Windows Admin Center
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: OpenManage Network Integration
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: OpenManage Power Center
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PowerConnect N3200
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PowerConnect PC2800
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PowerConnect PC8100
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: PowerEdge Accelerator Solutions
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PowerEdge BIOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: PowerEdge Networking Solutions
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PowerEdge Operating Systems
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: PowerEdge RAID Controller Solutions
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PowerTools Agent
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PPDM Kubernetes cProxy
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: PPDM VMware vProxy
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Redtail
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Remotely Anywhere
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Riptide (firmware)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Rugged Control Center (RCC)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SD ROM Utility
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SDNAS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:13:12 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Secure Connect Gateway (SCG) Appliance
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-01-24 22:27:28 +00:00
- '"5.00.00 5.00.05 and 4.0.06 and earlier versions (OVF and VHD)"'
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-282
references:
2022-02-03 20:45:34 +00:00
- '[]'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: Secure Connect Gateway (SCG) Appliance
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- 5.00.00, 5.00.05, and 4.0.06 and earlier versions (OVF and VHD)
2022-02-03 20:45:34 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-03 20:45:34 +00:00
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-282
references:
- '[DSA-2021-282](https://www.dell.com/support/kbdoc/en-us/000194624/dsa-2021-282-dell-emc-secure-connect-gateway-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: Secure Connect Gateway (SCG) Policy Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- 5.00.00.10
- 5.00.05.10
2022-02-03 20:45:34 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-281
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-281](https://www.dell.com/support/kbdoc/en-us/000194539/dsa-2021-281-dell-emc-policy-manager-for-secure-connect-gateway-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Server Storage
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Smart Fabric Storage Software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SmartByte
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SMI-S
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Software RAID
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Solutions Enabler
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Solutions Enabler vApp
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Sonic
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SRS Policy Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
- '7.0'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-287.
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-287](https://www.dell.com/support/kbdoc/en-us/000194544/dsa-2021-287-dell-emc-srs-policy-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SRS VE
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Storage Center - Dell Storage Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:45:34 +00:00
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- 16.x
- 17.x
- 18.x
- 19.x
- 20.1.1
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-310.
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-310](https://www.dell.com/support/kbdoc/en-us/000194790/dsa-2021-310-storage-center-dell-storage-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Storage Center OS and additional SC applications unless otherwise noted
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SupportAssist Client Commercial
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SupportAssist Client Consumer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: SupportAssist Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:45:34 +00:00
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- 2.0.70 and earlier
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-283.
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-283](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: UCC Edge
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Unisphere Central
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:45:34 +00:00
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
2022-02-03 20:45:34 +00:00
fixed_versions:
2022-02-03 21:14:08 +00:00
- Versions before 4.0 SP 9.2 (4.0.9.1541235)
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-296.
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-296](https://www.dell.com/support/kbdoc/en-us/000194874/dsa-2021-296-dell-emc-unisphere-central-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046-and-cve-2021-45105)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Unisphere for PowerMax
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Unisphere for PowerMax vApp
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Unisphere for VMAX
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Unisphere for VNX
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Update Manager Plugin
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Vblock
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:45:34 +00:00
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 21:14:08 +00:00
notes: Patch pending See vce6771 (requires customer login). This advisory is available
to customer only and has not been reviewed by CISA.
references:
2022-02-03 20:45:34 +00:00
- '[vce6771](https://support-dellemc-com.secure.force.com/)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: ViPR Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: VMware vRealize Automation 8.x
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- 8.2 8.3 8.4 8.5 and 8.6
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: Patch expected by 12/19/21
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: VMware vRealize Orchestrator 8.x
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- 8.2 8.3 8.4 8.5 and 8.6
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: Patch expected by 12/19/21
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: VNX Control Station
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: VNX1
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: VNX2
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions: []
2022-02-03 20:45:34 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: VNXe 1600
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- Versions 3.1.16.10220572 and earlier
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-299
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-299](https://www.dell.com/support/kbdoc/en-us/000194605/dsa-2021-299-dell-emc-vnxe1600-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228?lang=en)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: VNXe 3200
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
2022-02-03 20:45:34 +00:00
fixed_versions:
2022-02-03 21:14:08 +00:00
- Version 3.1.15.10216415 and earlier
2022-02-03 20:45:34 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-298
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-298](https://www.dell.com/support/kbdoc/en-us/000194606/dsa-2021-298-dell-emc-vnxe3200-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228?lang=en)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: VPLEX VS2/VS6 / VPLEX Witness
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:45:34 +00:00
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-02-03 20:45:34 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-02-03 20:45:34 +00:00
product: vRealize Data Protection Extension Data Management
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-290.
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-290](https://www.dell.com/support/kbdoc/en-us/000194614/dsa-2021-290-dell-emc-vrealize-data-protection-extension-for-vrealize-automation-vra-8-x-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 20:45:34 +00:00
notes: See DSA-2021-300.
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-300](https://www.dell.com/support/kbdoc/en-us/000194610/dsa-2021-300)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: vRO Plugin for Dell EMC PowerMax
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- Version 1.2.3 or earlier
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-300
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: vRO Plugin for Dell EMC PowerScale
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- Version 1.1.0 or earlier
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-300
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: vRO Plugin for Dell EMC PowerStore
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- Version 1.1.4 or earlier
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-300
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: vRO Plugin for Dell EMC Unity
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- Version 1.0.6 or earlier
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-300
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: vRO Plugin for Dell EMC XtremIO
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
2022-02-03 21:14:08 +00:00
- Version 4.1.2 or earlier
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: See DSA-2021-300
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Vsan Ready Nodes
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
2022-01-24 22:27:28 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
product: VxBlock
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:45:34 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-02-03 21:14:08 +00:00
notes: Patch pending See vce6771 (requires customer login). This advisory is available
to customer only and has not been reviewed by CISA.
references:
2022-02-03 20:45:34 +00:00
- '[vce6771](https://support-dellemc-com.secure.force.com/)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Warnado MLK (firmware)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Wyse Management Suite
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 20:45:34 +00:00
affected_versions: []
fixed_versions:
2022-02-03 21:14:08 +00:00
- < 3.5
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: See DSA-2021-267
references:
2022-02-03 20:45:34 +00:00
- '[DSA-2021-267](https://www.dell.com/support/kbdoc/en-us/000194459/dsa-2021-267-dell-wyse-management-suite-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Wyse Proprietary OS (ThinOS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Dell
2022-01-24 22:27:28 +00:00
product: Wyse Windows Embedded Suite
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-01-24 22:27:28 +00:00
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-03 20:45:34 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: Deltares
product: Delft-FEWS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '>2018.02'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://publicwiki.deltares.nl/display/FEWSDOC/Delft-FEWS+and+Log4J+vulnerability
notes: Mitigations Only
references:
- ''
last_updated: '2021-12-22T00:00:00'
- vendor: Denequa
2022-02-03 20:54:50 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://denequa.de/log4j-information.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Device42
2022-02-03 20:54:50 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.device42.com/2021/12/13/log4j-zero-day/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Devolutions
2022-02-03 20:54:50 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.devolutions.net/2021/12/critical-vulnerability-in-log4j/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Diebold Nixdorf
2022-02-03 20:54:50 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dieboldnixdorf.com/en-us/apache
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: AnywhereUSB Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: ARMT
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Aview
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: AVWOB
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: CTEK G6200 family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: CTEK SkyCloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: CTEK Z45 family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi 54xx family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi 63xx family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi AnywhereUSB (G2) family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi AnywhereUSB Plus family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Connect EZ family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Connect family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Connect IT family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Connect Sensor family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Connect WS family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi ConnectPort family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi ConnectPort LTS family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Embedded Android
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Embedded Yocto
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi EX routers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi IX routers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi LR54
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Navigator
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi One family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Passport family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi PortServer TS family
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi Remote Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi TX routers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi WR11
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi WR21
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi WR31
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi WR44R/RR
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi WR54
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
2022-01-24 22:27:28 +00:00
product: Digi WR64
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
product: Digi Xbee mobile app
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
product: Lighthouse
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
product: Realport
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digi International
product: Remote Hub Config Utility
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-03 20:54:50 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-03 20:54:50 +00:00
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digi.com/resources/security
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Digicert
2022-02-03 20:54:50 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://knowledge.digicert.com/alerts/digicert-log4j-response.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Digital AI
2022-02-03 20:54:50 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.digital.ai/hc/en-us/articles/4412377686674-Log4J-Vulnerability-to-Zero-Day-Exploit-and-Digital-ai#overview-0-1
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Digital Alert Systems
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.digitalalertsystems.com/default-2.htm
notes: Formerly Monroe Electronics, Inc.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: DirectAdmin
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://forum.directadmin.com/threads/new-zero-day-exploit-for-log4j-java-library-is-an-enterprise-nightmare.65173/#post-339723
notes: Invidivual plugins not developed as part of DirectAdmin core may be vulnerable.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: DNSFilter
2022-02-03 20:54:50 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dnsfilter.com/blog/dnsfilter-response-to-log4j-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Docker
product: Infrastructure
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/
2022-02-03 21:14:08 +00:00
notes: Docker infrastructure not vulnerable, Docker images could be vulnerable.
For more info see source.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Docusign
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: DotCMS
product: Hybrid Content Management System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://github.com/dotCMS/core/issues/21393
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-03 21:14:08 +00:00
- vendor: DrayTek
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-02-03 21:14:08 +00:00
- https://www.draytek.com/about/security-advisory/log4shell-vulnerability-(cve-2021-44228)/
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
2022-02-03 21:14:08 +00:00
- vendor: Dropwizard
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-02-03 21:14:08 +00:00
- https://twitter.com/dropwizardio/status/1469285337524580359
notes: Only vulnerable if you manually added Log4j.
references:
- ''
last_updated: '2021-12-15T00:00:00'
2022-02-03 21:14:08 +00:00
- vendor: Dräger
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-02-03 21:14:08 +00:00
- https://static.draeger.com/security
notes: ''
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: DSpace
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Dynatrace
2022-01-24 22:27:28 +00:00
product: ActiveGate
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
product: Cloud Services
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
notes: Please see Dynatrace Communication for details
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
product: Extensions
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
2022-01-24 22:27:28 +00:00
notes: Please see Dynatrace Communication for details
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
product: FedRamp SAAS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
2022-01-24 22:27:28 +00:00
product: Managed cluster nodes
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
2022-01-24 22:27:28 +00:00
notes: Please see Dynatrace Communication for details
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
2022-01-24 22:27:28 +00:00
product: OneAgent
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
2022-01-24 22:27:28 +00:00
product: SAAS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
2022-01-24 22:27:28 +00:00
product: Synthetic Private ActiveGate
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
2022-01-24 22:27:28 +00:00
notes: Please see Dynatrace Communication for details
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Dynatrace
2022-01-24 22:27:28 +00:00
product: Synthetic public locations
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
2022-01-24 22:27:28 +00:00
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
...