mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-01 06:28:27 +00:00
7344 lines
209 KiB
YAML
7344 lines
209 KiB
YAML
|
---
|
|||
|
version: '1.0'
|
|||
|
owners:
|
|||
|
- name: cisagov
|
|||
|
url: https://github.com/cisagov/log4j-affected-db
|
|||
|
software:
|
|||
|
- vendor: C4b XPHONE
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.c4b.com/de/news/log4j.php
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Campbell Scientific
|
|||
|
product: All
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://s.campbellsci.com/documents/us/miscellaneous/log4j2-vulnerability.pdf
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-23T00:00:00'
|
|||
|
- vendor: Camunda
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Canary Labs
|
|||
|
product: All
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://helpcenter.canarylabs.com/t/83hjjk0/log4j-vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: CT Medical Imaging Products
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: MR Medical Imaging Products
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: UL Medical Imaging Products
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: XR Medical Imaging Products
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: NM Medical Imaging Products
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: Vitrea Advanced 7.x
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: Infinix-i (Angio Workstation)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Canon
|
|||
|
product: Alphenix (Angio Workstation)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: CapStorm
|
|||
|
product: Copystorm
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: CarbonBlack
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Carestream
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-20T00:00:00'
|
|||
|
- vendor: Carrier
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.corporate.carrier.com/product-security/advisories-resources/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CAS genesisWorld
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cato Networks
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cepheid
|
|||
|
product: C360
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.cepheid.com/en_US/legal/product-security-updates
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-20T00:00:00'
|
|||
|
- vendor: Cepheid
|
|||
|
product: GeneXpert
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.cepheid.com/en_US/legal/product-security-updates
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-20T00:00:00'
|
|||
|
- vendor: Cerberus FTP
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Chaser Systems
|
|||
|
product: discrimiNAT Firewall
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Check Point
|
|||
|
product: CloudGuard
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://supportcontent.checkpoint.com/solutions?id=sk176865
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Check Point
|
|||
|
product: Harmony Endpoint & Harmony Mobile
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://supportcontent.checkpoint.com/solutions?id=sk176865
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Check Point
|
|||
|
product: Infinity Portal
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://supportcontent.checkpoint.com/solutions?id=sk176865
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Check Point
|
|||
|
product: Quantum Security Gateway
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://supportcontent.checkpoint.com/solutions?id=sk176865
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Check Point
|
|||
|
product: Quantum Security Management
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://supportcontent.checkpoint.com/solutions?id=sk176865
|
|||
|
notes: Where used, uses the 1.8.0\_u241 version of the JRE that protects against
|
|||
|
this attack by default.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Check Point
|
|||
|
product: SMB
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://supportcontent.checkpoint.com/solutions?id=sk176865
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Check Point
|
|||
|
product: ThreatCloud
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://supportcontent.checkpoint.com/solutions?id=sk176865
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CheckMK
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Ciphermail
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ciphermail.com/blog/ciphermail-gateway-and-webmail-messenger-are-not-vulnerable-to-cve-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CircleCI
|
|||
|
product: CircleCI
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://discuss.circleci.com/t/circleci-log4j-information-cve-2021-4422
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: CIS
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: AppDynamics
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Common Services Platform Collector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Network Services Orchestrator (NSO)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco System Architecture Evolution Gateway (SAEGW)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco ACI Multi-Site Orchestrator
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco ACI Virtual Edge
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Adaptive Security Appliance (ASA) Software
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Advanced Web Security Reporting Application
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco AMP Virtual Private Cloud Appliance
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco AnyConnect Secure Mobility Client
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Application Policy Infrastructure Controller (APIC)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco ASR 5000 Series Routers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Broadcloud Calling
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco BroadWorks
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Catalyst 9800 Series Wireless Controllers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco CloudCenter Suite Admin
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco CloudCenter Workload Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Cognitive Intelligence
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Computer Telephony Integration Object Server (CTIOS)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Connected Grid Device Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Connected Mobile Experiences
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Connectivity
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Contact Center Domain Manager (CCDM)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Contact Center Management Portal (CCMP)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Crosswork Change Automation
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco CX Cloud Agent Software
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Data Center Network Manager (DCNM)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Defense Orchestrator
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco DNA Assurance
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco DNA Center
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco DNA Spaces
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: DUO network gateway (on-prem/self-hosted)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Elastic Services Controller (ESC)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Emergency Responder
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Enterprise Chat and Email
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Enterprise NFV Infrastructure Software (NFVIS)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Evolved Programmable Network Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Extensible Network Controller (XNC)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Finesse
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Firepower Management Center
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Firepower Threat Defense (FTD)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco GGSN Gateway GPRS Support Node
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco HyperFlex System
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Identity Services Engine (ISE)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Integrated Management Controller (IMC) Supervisor
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Intersight
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Intersight Virtual Appliance
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco IOS and IOS XE Software
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco IoT Field Network Director (formerly Cisco Connected Grid Network
|
|||
|
Management System)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco IoT Operations Dashboard
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco IOx Fog Director
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco IP Services Gateway (IPSG)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Kinetic for Cities
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco MDS 9000 Series Multilayer Switches
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Meeting Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco MME Mobility Management Entity
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Modeling Labs
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Network Assessment (CNA) Tool
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Network Assurance Engine
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Network Convergence System 2000 Series
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Network Planner
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus 5500 Platform Switches
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus 5600 Platform Switches
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus 6000 Series Switches
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus 7000 Series Switches
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure
|
|||
|
(ACI) mode
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus Dashboard (formerly Cisco Application Services Engine)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus Data Broker
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Nexus Insights
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Optical Network Planner
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Packaged Contact Center Enterprise
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Paging Server (InformaCast)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Paging Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco PDSN/HA Packet Data Serving Node and Home Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco PGW Packet Data Network Gateway
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Policy Suite
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Central for Service Providers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Collaboration Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Collaboration Provisioning
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Infrastructure
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime License Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Network
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Optical for Service Providers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Provisioning
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Prime Service Catalog
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Registered Envelope Service
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco SD-WAN vEdge 1000 Series Routers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco SD-WAN vEdge 2000 Series Routers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco SD-WAN vEdge 5000 Series Routers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco SD-WAN vEdge Cloud Router Platform
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco SD-WAN vManage
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Secure Network Analytics (SNA), formerly Stealthwatch
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco SocialMiner
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco TelePresence Management Suite
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco UCS Director
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco UCS Performance Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Umbrella
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Attendant Console Advanced
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Attendant Console Business Edition
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Attendant Console Department Edition
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Attendant Console Enterprise Edition
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Attendant Console Premium Edition
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Communications Manager Cloud
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Contact Center Enterprise - Live Data server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Contact Center Enterprise
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Contact Center Express
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified Intelligent Contact Management Enterprise
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Unified SIP Proxy Software
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Video Surveillance Operations Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Virtual Topology System - Virtual Topology Controller (VTC) VM
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Virtualized Voice Browser
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Vision Dynamic Signage Director
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco WAN Automation Engine (WAE)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Web Security Appliance (WSA)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Webex Cloud-Connected UC (CCUC)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Webex Meetings Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Webex Teams
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Cisco Wide Area Application Services (WAAS)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Duo
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: duo network gateway (on-prem/self-hosted)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Exony Virtualized Interaction Manager (VIM)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cisco
|
|||
|
product: Managed Services Accelerator (MSX) Network Access Control Service
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix ADC (NetScaler ADC) and Citrix Gateway (NetScaler Gateway)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All Platforms
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Application Delivery Management (NetScaler MAS)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All Platforms
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Cloud Connector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Connector Appliance for Cloud Services
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Content Collaboration (ShareFile Integration) – Citrix Files for
|
|||
|
Windows, Citrix Files for Mac, Citrix Files for Outlook
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Endpoint Management (Citrix XenMobile Server)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: 'For CVE-2021-44228 and CVE-2021-45046: Impacted–Customers are advised
|
|||
|
to apply the latest CEM rolling patch updates listed below as soon as possible
|
|||
|
to reduce the risk of exploitation. [XenMobile Server 10.14 RP2](https://support.citrix.com/article/CTX335763);
|
|||
|
[XenMobile Server 10.13 RP5](https://support.citrix.com/article/CTX335753);
|
|||
|
and [XenMobile Server 10.12 RP10](https://support.citrix.com/article/CTX335785).
|
|||
|
Note: Customers who have upgraded their XenMobile Server to the updated versions
|
|||
|
are recommended not to apply the responder policy mentioned in the blog listed
|
|||
|
below to the Citrix ADC vserver in front of the XenMobile Server as it may impact
|
|||
|
the enrollment of Android devices. For CVE-2021-45105: Investigation in progress.'
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Hypervisor (XenServer)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix License Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix SD-WAN
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All Platforms
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: ShareFile Storage Zones Controller
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Virtual Apps and Desktops (XenApp & XenDesktop)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: 'IMPACTED: Linux VDA (non-LTSR versions only)- CVE-2021-44228 and CVE-2021-45046:
|
|||
|
Customers are advised to apply the latest update as soon as possible to reduce
|
|||
|
the risk of exploitation. [Linux Virtual Delivery Agent 2112](https://www.citrix.com/downloads/citrix-virtual-apps-and-desktops/components/linux-vda-2112.html).
|
|||
|
See the [Citrix Statement](https://support.citrix.com/article/CTX335705) for
|
|||
|
additional mitigations. For CVE-2021-45105: Investigation has shown that Linux
|
|||
|
VDA is not impacted. Nonetheless, the Linux VDA 2112 has been updated (21.12.0.30,
|
|||
|
released December 20th) to contain Apache log4j version 2.17.0. NOT IMPACTED:
|
|||
|
Linux VDA LTSR all versions; All other CVAD components.'
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Citrix
|
|||
|
product: Citrix Workspace App
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All Platforms
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.citrix.com/article/CTX335705
|
|||
|
notes: Citrix continues to investigate any potential impact on Citrix-managed
|
|||
|
cloud services. If, as the investigation continues, any Citrix-managed services
|
|||
|
are found to be affected by this issue, Citrix will take immediate action to
|
|||
|
remediate the problem. Customers using Citrix-managed cloud services do not
|
|||
|
need to take any action.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: Claris
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.claris.com/s/article/CVE-2021-44228-Apache-Log4j-Vulnerability-and-Claris-products?language=en_US
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: AM2CM Tool
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Ambari
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only versions 2.x
|
|||
|
- 1.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Arcadia Enterprise
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only version 7.1.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: CDH, HDP, and HDF
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only version 6.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: CDP Operational Database (COD)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: CDP Private Cloud Base
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only version 7.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: CDS 3 Powered by Apache Spark
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: CDS 3.2 for GPUs
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Cybersecurity Platform
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Data Engineering (CDE)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Data Engineering (CDE)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Data Flow (CFM)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Data Science Workbench (CDSW)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only versions 2.x
|
|||
|
- 3.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Data Visualization (CDV)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Data Warehouse (CDW)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Data Warehouse (CDW)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera DataFlow (CDF)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Edge Management (CEM)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Enterprise
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only version 6.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Flow Management (CFM)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Machine Learning (CML)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Machine Learning (CML)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Manager (Including Backup Disaster Recovery (BDR) and Replication
|
|||
|
Manager)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Manager (Including Backup Disaster Recovery (BDR) and Replication
|
|||
|
Manager)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only versions 7.0.x
|
|||
|
- 7.1.x
|
|||
|
- 7.2.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Manager (Including Backup Disaster Recovery (BDR))
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Runtime (including Cloudera Data Hub and all Data Hub templates)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only versions 7.0.x
|
|||
|
- 7.1.x
|
|||
|
- 7.2.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Stream Processing (CSP)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Streaming Analytics (CSA)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Cloudera Streaming Analytics (CSA)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Data Analytics Studio (DAS)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Data Catalog
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Data Lifecycle Manager (DLM)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Data Steward Studio (DSS)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Hortonworks Data Flow (HDF)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Hortonworks Data Platform (HDP)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Only versions 7.1.x
|
|||
|
- 2.7.x
|
|||
|
- 2.6.x
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Hortonworks DataPlane Platform
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Management Console
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Management Console for CDP Public Cloud
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Replication Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: SmartSense
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Workload Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Workload XM (SaaS)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudera
|
|||
|
product: Workload XM
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All versions
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CloudFlare
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudian HyperStore
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudogu
|
|||
|
product: Ecosystem
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- All
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://community.cloudogu.com/t/security-vulnerability-log4shell-cve-2021-44228/417
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudogu
|
|||
|
product: SCM-Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://scm-manager.org/blog/posts/2021-12-13-log4shell/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cloudron
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://forum.cloudron.io/topic/6153/log4j-and-log4j2-library-vulnerability?lang=en-US
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Clover
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://community.clover.com/articles/35868/apache-log4j-vulnerability-cve-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Code42
|
|||
|
product: Code42 App
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions:
|
|||
|
- 8.8.1
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://success.code42.com/hc/en-us/articles/4416158712343-RELEASE-NOTIFICATION-Code42-Vulnerability-Mitigation-for-CVE-2021-44228-and-other-updates
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-22T00:00:00'
|
|||
|
- vendor: Code42
|
|||
|
product: Crashplan
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions:
|
|||
|
- '8.8'
|
|||
|
- possibly prior versions
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://success.code42.com/hc/en-us/articles/4416158712343-RELEASE-NOTIFICATION-Code42-Vulnerability-Mitigation-for-CVE-2021-44228-and-other-updates
|
|||
|
notes: I think, they don't specify in the notice, but we know that they released
|
|||
|
an updated Crashplan client. Possibly prior versions affected.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: CodeBeamer
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://codebeamer.com/cb/wiki/19872365
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Codesys
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.codesys.com/news-events/news/article/log4j-not-used-in-codesys.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cohesity
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.cohesity.com/s/article/Security-Advisory-Apache-Log4j-Remote-Code-Execution-RCE-CVE-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CommVault
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://documentation.commvault.com/v11/essential/146231_security_vulnerability_and_reporting.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Concourse
|
|||
|
product: Concourse
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://github.com/concourse/concourse/discussions/7887
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: ConcreteCMS.com
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent Cloud
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions:
|
|||
|
- N/A
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent Platform
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <7.0.1
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent for Kubernetes
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- N/A
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent Kafka Connectors
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- N/A
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent ElasticSearch Sink Connector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <11.1.7
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent Google DataProc Sink Connector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <1.1.5
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent Splunk Sink Connector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <2.05
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent HDFS 2 Sink Connector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <10.1.3
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent HDFS 3 Sink Connector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <1.1.8
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Confluent
|
|||
|
product: Confluent VMWare Tanzu GemFire Sink Connector
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <1.0.8
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Connect2id
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://connect2id.com/blog/connect2id-server-12-5-1
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: ConnectWise
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.connectwise.com/company/trust/advisories
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: ContrastSecurity
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.contrastsecurity.com/hc/en-us/articles/4412612486548
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: ControlUp
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://status.controlup.com/incidents/qqyvh7b1dz8k
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: COPADATA
|
|||
|
product: All
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.copadata.com/fileadmin/user_upload/faq/files/InformationReport_CVE_2021_44228.pdf
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-06T00:00:00'
|
|||
|
- vendor: CouchBase
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CPanel
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Cradlepoint
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://cradlepoint.com/vulnerability-alerts/cve-2021-44228-apache-log4j-security-vulnerabilities/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: Crestron
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.crestron.com/Security/Security_Advisories/Apache-Log4j
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-20T00:00:00'
|
|||
|
- vendor: CrushFTP
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.crushftp.com/download.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CryptShare
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.cryptshare.com/en/support/cryptshare-support/#c67572
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CyberArk
|
|||
|
product: Privileged Threat Analytics (PTA)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions:
|
|||
|
- N/A
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- This advisory is available to customers only and has not been reviewed by
|
|||
|
CISA.
|
|||
|
last_updated: '2021-12-14T00:00:00'
|
|||
|
- vendor: Cybereason
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
- vendor: CyberRes
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
|||
|
...
|