@ -547,7 +547,7 @@ This list was initially populated using information from the following sources:
| Crestron | | | Not Affected | | [Crestron Advisory ](https://www.crestron.com/Security/Security_Advisories/Apache-Log4j ) | | | 12/20/2021 |
| CrushFTP | | | | | [CrushFTP Link ](https://www.crushftp.com/download.html ) | | | |
| CryptShare | | | | | [Cryptshare Support Link ](https://www.cryptshare.com/en/support/cryptshare-support/#c67572 ) | | | |
| Cumul.io | | | | | | [Cumul.io Status Link ](https://status.cumul.io/#incidents ) | | | |
| Cumul.io | | | | | [Cumul.io Status Link ](https://status.cumul.io/#incidents ) | | | |
| CyberArk | Privileged Threat Analytics (PTA)| N/A | Fixed | Yes | [CyberArk Customer Force ](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228 ) | | This advisory is available to customers only and has not been reviewed by CISA. |12/14/2021|
| Cybereason | | | | | [Cybereason Blog Post ](https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228 ) | | | |
| CyberRes | | | | | [CyberRes Community Link ](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228 ) | | | |