@ -166,6 +166,7 @@ This list was initially populated using information from the following sources:
| Broadcom | Web Isolation (WI) | | Under Investigation | | [Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793) | | | |
| Broadcom | Web Security Service (WSS) | | Under Investigation | | [Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793) | | | |
| Broadcom | WebPulse | | Under Investigation | | [Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793) | | | |
|Chaser Systems| dscrimiNAT Firewall| All| Not Affected| | [Log4Shell and its traces in a network egress filter](https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected)| | 12/15/2021|
| Check Point | Quantum Security Gateway | | Not Affected | | | | | |
| Check Point | Quantum Security Management | | Not Affected | | | Uses the 1.8.0\_u241 version of the JRE that protects against this attack by default. | | |
| Check Point | CloudGuard | | Not Affected | | | | | |
@ -343,6 +344,7 @@ This list was initially populated using information from the following sources:
| ElasticSearch | all products | | Not Affected | | | | | |
@ -393,6 +395,13 @@ This list was initially populated using information from the following sources:
| Gradle | Gradle Enterprise | <2021.3.6|Affected|Yes| [Gradle Enterprise Security Advisories - Remote code execution vulnerability due to use of Log4j2](https://security.gradle.com/advisory/2021-11) ||||
| Gradle | Gradle Enterprise Test Distribution Agent | <1.6.2|Affected|Yes| [Gradle Enterprise Security Advisories - Remote code execution vulnerability due to use of Log4j2](https://security.gradle.com/advisory/2021-11) ||||
| Gradle | Gradle Enterprise Build Cache Node | <10.1|Affected|Yes| [Gradle Enterprise Security Advisories - Remote code execution vulnerability due to use of Log4j2](https://security.gradle.com/advisory/2021-11) ||||
| Gravitee | Access Management | 3.10.x | Not Affected | No |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| | | |
| Gravitee | Access Management | 3.5.x | Not Affected | No |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| | | |
| Gravitee | API Management | 3.10.x | Not Affected | No |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| | | |
| Gravitee | API Management | 3.5.x | Not Affected | No |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| | | |
|Mulesoft| Mule Runtime| 3.x,4.x| Affected| Yes| [Apache Log4j2 vulnerability - December 2021](https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021)| This advisory is available to account holders only and has not been reviewed by CISA.| | 12/15/2021|
|Mulesoft| Mule Agent| 6.x| Affected| Yes| [Apache Log4j2 vulnerability - December 2021](https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021)| This advisory is available to account holders only and has not been reviewed by CISA.| | 12/15/2021|
|Mulesoft| Cloudhub| | Affected| Yes| [Apache Log4j2 vulnerability - December 2021](https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021)| This advisory is available to account holders only and has not been reviewed by CISA.| | 12/15/2021|
|Mulesoft| Anypoint Studio| 7.x| Affected| Yes| [Apache Log4j2 vulnerability - December 2021](https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021)| This advisory is available to account holders only and has not been reviewed by CISA.| | 12/15/2021|