From 2fe01a0abd0c6cdb551f750817d08b4316c73a0c Mon Sep 17 00:00:00 2001 From: cisagovbot <65734717+cisagovbot@users.noreply.github.com> Date: Wed, 12 Oct 2022 18:43:37 +0000 Subject: [PATCH] Normalize YAML files and update the software lists --- data/cisagov.yml | 5 +++++ software_lists/software_list_C.md | 4 ++++ software_lists/software_list_W.md | 1 + 3 files changed, 10 insertions(+) diff --git a/data/cisagov.yml b/data/cisagov.yml index 48e214f..6704c21 100644 --- a/data/cisagov.yml +++ b/data/cisagov.yml @@ -30493,6 +30493,7 @@ software: unaffected_versions: [] vendor_links: - https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities + notes: '' references: - '' last_updated: '2022-01-12T07:18:50+00:00' @@ -30522,6 +30523,7 @@ software: unaffected_versions: [] vendor_links: - https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities + notes: '' references: - '' last_updated: '2022-01-12T07:18:50+00:00' @@ -30551,6 +30553,7 @@ software: unaffected_versions: [] vendor_links: - https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities + notes: '' references: - '' last_updated: '2022-01-12T07:18:50+00:00' @@ -30580,6 +30583,7 @@ software: unaffected_versions: [] vendor_links: - https://www.catalogicsoftware.com/blog/category/dpx/ + notes: '' references: - '' last_updated: '2022-01-12T07:18:50+00:00' @@ -127629,6 +127633,7 @@ software: customer only and has not been reviewed by CISA. references: - '' + last_updated: '2022-02-03T16:14:09+00:00' - vendor: Wasp Barcode technologies product: All cves: diff --git a/software_lists/software_list_C.md b/software_lists/software_list_C.md index 44584b6..e8d90dd 100644 --- a/software_lists/software_list_C.md +++ b/software_lists/software_list_C.md @@ -68,6 +68,10 @@ NOTE: This file is automatically generated. To submit updates, please refer to | Carestream | All | | | Not Affected | [link](https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 | | Carrier | | | | Not Affected | [link](https://www.corporate.carrier.com/product-security/advisories-resources/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | | CAS genesisWorld | All | | | Unknown | [link](https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | +| CaseWare | Cloud | | All | Fixed | [link](https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | +| CaseWare | IDEA | | | Not Affected | [link](https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | +| CaseWare | WorkingPapers | | | Not Affected | [link](https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | +| Catalogic | All | | | Not Affected | [link](https://www.catalogicsoftware.com/blog/category/dpx/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | | Cato Networks | All | | | Unknown | [link](https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | | Cendio | ThinLinc | | | Not Affected | [link](https://community.thinlinc.com/t/log4shell-vulnerability/286) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 | | Cepheid | C360 | | | Not Affected | [link](https://www.cepheid.com/en_US/legal/product-security-updates) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 | diff --git a/software_lists/software_list_W.md b/software_lists/software_list_W.md index cfcdad5..6d6d995 100644 --- a/software_lists/software_list_W.md +++ b/software_lists/software_list_W.md @@ -35,6 +35,7 @@ NOTE: This file is automatically generated. To submit updates, please refer to | ------ | ------- | ----------------- | ---------------- | ------ | ------------ | ----- | ---------- | -------- | ------------ | | WAGO | WAGO Smart Script | | 4.2.x < 4.8.1.3 | Fixed | [link](https://www.wago.com/de/automatisierungstechnik/psirt#log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-17 | | Wallarm | All | | | Unknown | [link](https://lab.wallarm.com/cve-2021-44228-mitigation-update/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | +| Wallix | Access Manager | | | Fixed | [link](https://www.wallix.com/fr/support/alerts/) | Customer Portal for patch found in advisory. This patch is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-03 | | Wasp Barcode technologies | All | | | Unknown | [link](https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | | Watcher | All | | | Not Affected | [link](https://twitter.com/felix_hrn/status/1470387338001977344) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 | | WatchGuard | AuthPoint | | Cloud | Fixed | [link](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |