1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-25 01:40:47 +00:00
log4j-affected-db/data/cisagov_H.yml

5992 lines
174 KiB
YAML
Raw Normal View History

---
version: '1.0'
owners:
- name: cisagov
url: https://github.com/cisagov/log4j-affected-db
software:
- vendor: HAProxy
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.haproxy.com/blog/december-2021-log4shell-mitigation/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HarmanPro AMX
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://help.harmanpro.com/apache-log4j-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Boundary
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Consul
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Consul Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Nomad
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Nomad Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Packer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Terraform
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Terraform Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Vagrant
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Vault
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Vault Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HashiCorp
product: Waypoint
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HCL Software
product: BigFix Compliance
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-01-24 22:27:28 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
notes: Not Affected for related CVE-2021-45046
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: HCL Software
product: BigFix Insights
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-01-24 22:27:28 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
notes: Not Affected for related CVE-2021-45046
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: HCL Software
product: BigFix Insights for Vulnerability Remediation
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-01-24 22:27:28 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
notes: Not Affected for related CVE-2021-45046
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: HCL Software
product: BigFix Inventory
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- < 10.0.7
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
notes: Not Affected for related CVE-2021-45046
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: HCL Software
product: BigFix Lifecycle
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-01-24 22:27:28 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
notes: Not Affected for related CVE-2021-45046
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: HCL Software
product: BigFix Mobile
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-01-24 22:27:28 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
notes: Not Affected for related CVE-2021-45046
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: HCL Software
product: BigFix Patch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-01-24 22:27:28 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
notes: Not Affected for related CVE-2021-45046
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: HelpSystems Clearswift
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HENIX
product: Squash TM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- 1.21.7-1.22.9
- 2.0.3-2.1.5
- 2.2.0-3.0.2
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tm-en.doc.squashtest.com/v3/downloads.html#download-previous-versions
notes: ''
references:
- ''
last_updated: '2021-12-23T00:00:00'
- vendor: Hexagon
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Hikvision
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://video.xortec.de/media/pdf/87/e8/03/kw50_Update-for-Apache-Log4j2-Issue-Hikvision_official.pdf
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Hitachi Energy
product: 3rd party - Elastic Search, Kibana
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- Elasticsearch 5.0.0+
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: Set the JVM option -Dlog4j2.formatMsgNoLookups=true and restart each node
of the cluster.
references:
- ''
last_updated: '2022-01-05T00:00:00'
2022-01-24 22:27:28 +00:00
- vendor: Hitachi Energy
product: 3rd party - Oracle Database Components
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
- '12.2'
- 19c
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: As this is a third-party component, a separate patch management report
will be provided to customers with the steps to apply the Oracle provided patches
for these components.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: Axis
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '3.6'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: No action is required by customers. Axis is a fully SaaS hosted solution
and the environment has been patched per the recommendations
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: Counterparty Settlement and Billing (CSB)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- v6
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: e-Mesh Monitor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: No end-user action needed. The affected e-Mesh Monitor part is at the cloud
offering side of which the remediation is handled by Hitachi Energy team. Remediation
is currently ongoing, and during this time period, e-Mesh Monitor edge device
is not able to upload data to cloud.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: eSOMS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.hitachienergy.com/offering/solutions/cybersecurity/alerts-and-notifications
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Hitachi Energy
product: FOXMAN-UN
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- R15A
- R14B
- R14A
- R11B SP1
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: A patch is available for releases R15A, R14B, R14A and R11B SP1. . For
details on how to apply such patch, please refer to the technical bulletin “FOXMAN-UN
- Installation of Log4j Patch”, version A (1KHW029176) available in the Hitachi
Energy Customer Connect Portal.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: FOXMAN-UN
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- R11A and R10 series
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: Apply General Mitigations and upgrade to latest version. For upgrades,
please get in touch with your Hitachi Energy contacts.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
2022-01-24 22:27:28 +00:00
product: Lumada APM On-premises
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
2022-01-24 22:27:28 +00:00
notes: See vendor advisory for instructions for various versions.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
2022-01-24 22:27:28 +00:00
product: Lumada APM SaaS offering
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
2022-01-24 22:27:28 +00:00
notes: No action is required by customers. The SaaS offering has been patched
per the recommendations.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: Lumada EAM / FSM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- v1.7.x
- v1.8.x
- v1.9.x
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: See Section Mitigation Strategy in vendor advisory.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: MMS Internal facing subcomponent.
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: Network Manager ADMS Network Model Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- 9.1.0.32-9.1.0.44
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: See vendor advisory for instructions on mitigation steps.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
2022-01-24 22:27:28 +00:00
product: Network Manager Outage Management Interface (CMI)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- 9.0-9.10.44
- 9.1.1
- 10.3.4
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
2022-01-24 22:27:28 +00:00
notes: See vendor advisory for instructions on mitigation steps.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: nMarket Global I-SEM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- 3.7.15
- 3.7.16
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: RelCare
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- 2.0.0
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: No action is required by customers. The RelCare SaaS hosted solution and
the on-premises have been patched per the recommendations.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: UNEM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- R15A
- R14B
- R14A
- R11B SP1
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: A patch is available for releases R15A, R14B, R14A and R11B SP1. For details
on how to apply such patch, please refer to the technical bulletin “UNEM - Installation
of Log4j Patch”, version A (1KHW029176) available in the Hitachi Energy Customer
Connect Portal.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Energy
product: UNEM
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-01-24 22:27:28 +00:00
- R11A and R10 series
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: Apply General Mitigations and upgrade to latest version. For upgrades,
please get in touch with your Hitachi Energy contacts.
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Hitachi Vantara
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://knowledge.hitachivantara.com/Support_Information/Hitachi_Vantara_Security_Advisories/CVE-2021-44228_-_Apache_Log4j2
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: HMS Industrial Networks AB
2022-01-24 22:27:28 +00:00
product: Cosy, Flexy and Ewon CD
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: HMS Industrial Networks AB
2022-01-24 22:27:28 +00:00
product: eCatcher Mobile applications
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: HMS Industrial Networks AB
product: eCatcher Windows software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: HMS Industrial Networks AB
2022-01-24 22:27:28 +00:00
product: Netbiter Hardware including EC, WS, and LC
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: HMS Industrial Networks AB
2022-01-24 22:27:28 +00:00
product: Talk2M including M2Web
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
2022-01-24 22:27:28 +00:00
- vendor: HOLOGIC
product: Advanced Workflow Manager (AWM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: While the Hologic software itself does not utilize Java/Log4J, the installed
APC PowerChute UPS with Business Edition v9.5 software installed may. APC is
still assessing its PowerChute software to determine if it is vulnerable.
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Affirm Prone Biopsy System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Brevera Breast Biopsy System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Cenova Image Analytics Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Dimensions / 3Dimensions Mammography System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Discovery Bone Densitometer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Faxitron CT Specimen Radiography System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: While the Hologic software itself does not utilize Java/Log4J, there is
a utility program installed that may utilize Java and Log4J. This utility program
does not run on startup and is not required for system operation. Please contact
Hologic Service for assistance in removing this program.
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Faxitron Specimen Radiography Systems
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Fluoroscan Insight Mini C-Arm
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Horizon DXA Bone Densitometer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Rosetta DC Tomosynthesis Data Converter
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: SecurView DX Workstation
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: SecurXChange Router
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: SuperSonic Imagine Ultrasound Products (Aixplorer & Aixplorer Mach)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Trident HD Specimen Radiography System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Unifi Workspace
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: While the Hologic software itself does not utilize Java/Log4J, the installed
APC PowerChute UPS with Business Edition v9.5 software installed may. APC is
still assessing its PowerChute software to determine if it is vulnerable.
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: HOLOGIC
product: Windows Selenia Mammography System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-20T00:00:00'
- vendor: Honeywell
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.honeywell.com/us/en/press/2021/12/honeywells-statement-on-java-apache-log4j-logging-framework-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-01-24 22:27:28 +00:00
- vendor: HP
product: Teradici Cloud Access Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
- < v113
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-17T00:00:00'
- vendor: HP
product: Teradici EMSDK
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
- < 1.0.6
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-17T00:00:00'
- vendor: HP
product: Teradici Management Console
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
- < 21.10.3
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-17T00:00:00'
- vendor: HP
product: Teradici PCoIP Connection Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
- < 21.03.6
- < 20.07.4
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-17T00:00:00'
- vendor: HP
product: Teradici PCoIP License Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-17T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: 3PAR StoreServ Arrays
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: AirWave Management Platform
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Alletra 6000
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Alletra 9k
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba Central
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba ClearPass Policy Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba ClearPass Policy Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba Instant (IAP)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba Location Services
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba NetEdit
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba PVOS Switches
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba SDN VAN Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba User Experience Insight (UXI)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Aruba VIA Client
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: ArubaOS SD-WAN Controllers and Gateways
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: ArubaOS Wi-Fi Controllers and Gateways
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: ArubaOS-CX switches
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: ArubaOS-S switches
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: BladeSystem Onboard Administrator
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Brocade 16Gb Fibre Channel SAN Switch for HPE Synergy
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Brocade 16Gb SAN Switch for HPE BladeSystem c-Class
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Brocade 32Gb Fibre Channel SAN Switch for HPE Synergy
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Brocade Network Advisor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: CloudAuth
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: CloudPhysics
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Compute Cloud Console
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Compute operations manager- FW UPDATE SERVICE
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: COS (Cray Operating System)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Cray Systems Management (CSM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Custom SPP Portal [Link](https://spp.hpe.com/custom)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Data Services Cloud Console
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Harmony Data Platform
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HOP public services (grafana, vault, rancher, Jenkins)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE B-series SN2600B SAN Extension Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE B-series SN4000B SAN Extension Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE B-series SN6000B Fibre Channel Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE B-series SN6500B Fibre Channel Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE B-series SN6600B Fibre Channel Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE B-series SN6650B Fibre Channel Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE B-series SN6700B Fibre Channel Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Customer Experience Assurance (CEA)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Hardware Support Manager plug-in for VMware vSphere Lifecycle Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Home Location Register (HLR/I-HLR)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Infosight for Servers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Integrated Home Subscriber Server (I-HSS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Intelligent Messaging (IM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Intelligent Network Server (INS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Multimedia Services Environment (MSE)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OC Convergent Communications Platform (OCCP)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OC Media Platform Media Resource Function (OCMP-MRF)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OC Service Access Controller (OC SAC)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OC Service Controller (OCSC)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OC Universal Signaling Platform (OC-USP-M)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OneView
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OneView for VMware vRealize Operations (vROps)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE OneView Global Dashboard
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Performance Cluster Manager (HPCM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Performance Manager (PM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Position Determination Entity (PDE)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Secure Identity Broker (SIB)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Service Activator (SA)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Service Governance Framework (SGF)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Service Orchestration Manager (SOM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Service Provisioner (SP)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Short Message Point-to-Point Gateway (SMPP)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Slingshot
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Smart Interaction Server (SIS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE SN3000B Fibre Channel Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE SN8000B 4-Slot SAN Director Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE SN8000B 8-Slot SAN Backbone Director Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE SN8600B 4-Slot SAN Director Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE SN8600B 8-Slot SAN Director Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE SN8700B 4-Slot Director Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE SN8700B 8-Slot Director Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Subscriber, Network, and Application Policy (SNAP)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Subscription Manager (SM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Synergy Image Streamer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Systems Insight Manager (SIM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Telecom Application Server (TAS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Unified Correlation and Automation (UCA)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Unified Mediation Bus (UMB)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Unified OSS Console (UOC)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Unified Topology Manager (UTM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Universal Identity Repository (VIR)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Universal SLA Manager (uSLAM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Virtual Connect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Virtual Connect Enterprise Manager (VCEM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Virtual Provisioning Gateway (vPGW)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Virtual Server Environment (VSE)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Virtual Subscriber Data Management (vSDM)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE WebRTC Gateway Controller (WGW)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-14T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: HPE Wi-Fi Authentication Gateway (WauG)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Insight Cluster Management Utility (CMU)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Integrated Lights-Out (iLO) Amplifier Pack
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Integrated Lights-Out 4 (iLO 4)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
- '4'
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Integrated Lights-Out 5 (iLO 5)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
- '5'
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Integrity BL860c, BL870c, BL890c
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Integrity Rx2800/Rx2900
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Integrity Superdome 2
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Integrity Superdome X
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Intelligent Provisioning
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: iSUT integrated smart update tool
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Maven Artifacts (Atlas)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: MSA
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: NetEdit
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Nimble Storage
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: NS-T0634-OSM CONSOLE TOOLS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: NS-T0977-SCHEMA VALIDATOR
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: OfficeConnect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Primera Storage
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: RepoServer part of OPA (on Premises aggregator)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
2022-01-24 22:27:28 +00:00
product: Resource Aggregator for Open Distributed Infrastructure Management
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
last_updated: '2021-12-12T00:00:00'
2022-01-24 22:27:28 +00:00
- vendor: HPE
product: RESTful Interface Tool (iLOREST)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
2022-01-24 22:27:28 +00:00
- ''
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: SAT (System Admin Toolkit)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: Scripting Tools for Windows PowerShell (HPEiLOCmdlets)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: SGI MC990 X Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: SGI UV 2000 Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: SGI UV 300, 300H, 300RL, 30EX
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: SGI UV 3000 Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: SN8700B 8-Slot Director Switch
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: StoreEasy
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: StoreEver CVTL
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: StoreEver LTO Tape Drives
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: StoreEver MSL Tape Libraries
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: StoreOnce
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: SUM (Smart Update Manager)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: Superdome Flex 280
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: Superdome Flex Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE
product: UAN (User Access Node)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-12T00:00:00'
- vendor: HPE/Micro Focus
product: Data Protector
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
- '9.09'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://portal.microfocus.com/s/article/KM000003243
notes: ''
references:
2022-01-24 22:27:28 +00:00
- '[https://portal.microfocus.com/s/article/KM000003050](https://portal.microfocus.com/s/article/KM000003050)'
last_updated: '2021-12-17T00:00:00'
- vendor: Huawei
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Hubspot
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.hubspot.com/t5/APIs-Integrations/Log4J-day-zero-exploit-CVE-2021-44228/td-p/541949
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
...