Normalize YAML files and update the software lists

pull/518/head^2
cisagovbot 1 year ago
parent a9e36a1354
commit ce449abb29
  1. 14092
      data/cisagov.yml
  2. 304
      data/cisagov_B.yml
  3. 655
      software_lists/software_list_B.md

File diff suppressed because it is too large Load Diff

@ -600,8 +600,8 @@ software:
- ''
last_updated: '2022-01-31T00:00:00'
- vendor: BBraun
product: Space Infusion Pump family (Infusomat Space Infusion Pump, Perfusor
Space Infusion
product: Space Infusion Pump family (Infusomat Space Infusion Pump, Perfusor Space
Infusion
cves:
cve-2021-4104:
investigated: false
@ -656,7 +656,8 @@ software:
unaffected_versions: []
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2021-12-20T00:00:00'
@ -686,7 +687,8 @@ software:
unaffected_versions: []
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2021-12-20T00:00:00'
@ -702,7 +704,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.10.210'
- 2.10.210
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -716,7 +718,8 @@ software:
unaffected_versions: []
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2021-12-20T00:00:00'
@ -746,7 +749,8 @@ software:
unaffected_versions: []
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2021-12-20T00:00:00'
@ -776,7 +780,8 @@ software:
unaffected_versions: []
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2021-12-20T00:00:00'
@ -792,7 +797,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.125.3'
- 1.125.3
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -806,7 +811,8 @@ software:
unaffected_versions: []
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2021-12-20T00:00:00'
@ -2011,7 +2017,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSAria Fusion
product: BD FACS Lyse Wash Assistant
cves:
cve-2021-4104:
investigated: false
@ -2041,7 +2047,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSAria II
product: BD FACS Sample Prep Assistant (SPA) III
cves:
cve-2021-4104:
investigated: false
@ -2071,7 +2077,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSAria III
product: BD FACS Workflow Manager
cves:
cve-2021-4104:
investigated: false
@ -2101,7 +2107,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSCalibur
product: BD FACSAria Fusion
cves:
cve-2021-4104:
investigated: false
@ -2131,7 +2137,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSCanto 10-color
product: BD FACSAria II
cves:
cve-2021-4104:
investigated: false
@ -2161,7 +2167,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSCanto 10-color clinical
product: BD FACSAria III
cves:
cve-2021-4104:
investigated: false
@ -2191,7 +2197,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSCanto II (w Diva 9.0)
product: BD FACSCalibur
cves:
cve-2021-4104:
investigated: false
@ -2221,7 +2227,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSCanto II clinical
product: BD FACSCanto 10-color
cves:
cve-2021-4104:
investigated: false
@ -2251,7 +2257,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSCelesta
product: BD FACSCanto 10-color clinical
cves:
cve-2021-4104:
investigated: false
@ -2281,7 +2287,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSCount
product: BD FACSCanto II (w Diva 9.0)
cves:
cve-2021-4104:
investigated: false
@ -2311,7 +2317,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSDuet
product: BD FACSCanto II clinical
cves:
cve-2021-4104:
investigated: false
@ -2341,7 +2347,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSLink
product: BD FACSCelesta
cves:
cve-2021-4104:
investigated: false
@ -2371,7 +2377,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSLyric
product: BD FACSCount
cves:
cve-2021-4104:
investigated: false
@ -2401,7 +2407,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSMelody
product: BD FACSDuet
cves:
cve-2021-4104:
investigated: false
@ -2431,7 +2437,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSPresto
product: BD FACSLink
cves:
cve-2021-4104:
investigated: false
@ -2461,7 +2467,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSVerse
product: BD FACSLyric
cves:
cve-2021-4104:
investigated: false
@ -2491,7 +2497,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSVia
product: BD FACSMelody
cves:
cve-2021-4104:
investigated: false
@ -2521,7 +2527,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSymphony A1
product: BD FACSPresto
cves:
cve-2021-4104:
investigated: false
@ -2551,7 +2557,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSymphony A3
product: BD FACSVerse
cves:
cve-2021-4104:
investigated: false
@ -2581,7 +2587,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSymphony A5
product: BD FACSVia
cves:
cve-2021-4104:
investigated: false
@ -2611,7 +2617,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACSymphony S6
product: BD FACSymphony A1
cves:
cve-2021-4104:
investigated: false
@ -2641,7 +2647,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACS Lyse Wash Assistant
product: BD FACSymphony A3
cves:
cve-2021-4104:
investigated: false
@ -2671,7 +2677,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACS Sample Prep Assistant (SPA) III
product: BD FACSymphony A5
cves:
cve-2021-4104:
investigated: false
@ -2701,7 +2707,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD FACS Workflow Manager
product: BD FACSymphony S6
cves:
cve-2021-4104:
investigated: false
@ -2971,7 +2977,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD Intelliport Medication Management System
product: BD Intelliport
cves:
cve-2021-4104:
investigated: false
@ -3001,7 +3007,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD Inventory Connect
product: BD Intelliport Medication Management System
cves:
cve-2021-4104:
investigated: false
@ -3031,7 +3037,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD Intelliport
product: BD Inventory Connect
cves:
cve-2021-4104:
investigated: false
@ -4081,7 +4087,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD Rowa Dose (Windows 7 Workstations only)
product: BD Rowa Dose (Windows 10 platform)
cves:
cve-2021-4104:
investigated: false
@ -4111,7 +4117,7 @@ software:
- ''
last_updated: '2021-12-20T00:00:00'
- vendor: BD
product: BD Rowa Dose (Windows 10 platform)
product: BD Rowa Dose (Windows 7 Workstations only)
cves:
cve-2021-4104:
investigated: false
@ -7385,7 +7391,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -7801,7 +7807,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -7889,7 +7895,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- 'All'
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -7903,7 +7909,8 @@ software:
unaffected_versions: []
vendor_links:
- https://login.blackberry.com/sso/SSORedirect/metaAlias/idp?SAMLRequest=fZNdc6owEIb%2FCpN7JFIqlal2KKio%2BFGgar05EyCWKCRAgqK%2F%2FlA9zvT0ojuzF5l9s%2B9u5snzS52l0hGXnDDaA%2B0WBBKmEYsJ%2FeyB92AoP4GX%2FjNHWZobZiUS6uGiwlxIzT3KjWuhB6qSGgxxwg2KMswNERm%2BOXMNtQWNvGSCRSwFksk5LkVjZDHKqwyXPi6PJMLvntsDiRA5NxSFV3nOStEKUxQdQlyW51bEMqXJrKJEnJWUfRL6wlkPQvuhA68Rdi8XINnNXIQicV3l3u8q%2F9mNc6b4%2FsLDMSlxJJQMC2SmBHGFxDmQxnYP%2FFEts4mNvEhOfDSzzdPP%2FCrr9vFjMig0OBtGswiZ52H6mK9Gbtev5FnViZ2HV3dnV3lSOPvSn2YCboaeFV5Q4Yx2K%2FQ%2B1RcPUzWin0%2F7j%2FlEI1OtULfqpNnC8arkIjaD3X6%2BtlVvF8JJvQqznJlx4MfWIQuC1HJhklLH1m2vA9PHbjgSaB2K3YbND5a3X2%2BLfD48DbofVaIlfBSiLt5qS67P6pW87%2FD4SAaqfDzVzLbrQWGdhq7pkG6AdNt0k4ofMj1Zs7Jeio4%2FpuQURwMtHC%2BdGtZvRVD7Vg7jt%2Ba1OK%2FwmHKBqOgBFaqqDFW5%2FRi0dQO2DbXb0qC6BdLyHwivhN7w%2Bo2a8CbihhMES3m58AMgre6YNgJwg9K4mpffaPy9LbojCPp3QL6hkZ1bHKWY71gZ4S9QnpVvJv3b6f9%2F0P8L&RelayState=%2Fcommunity%2Fs%2Farticle%2F90708&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=ThznbsjgVwDX5E2fOcNREcaH%2FaSSD9EIp6MP3c9O9BRVFL%2BETG3n1WQKapplpISRgUkLEs2XvRpJ4%2FfEmynkr5laH4rrAIgMNL%2FauqYIGWvzbdzfp44PkOGUBkHxgo52GjhshHBPyHqJjnvzIoNyIK2zhDBQXevq9etV7wnX7SprJpHX%2B6Ivskj5wAXJzi9SiMafMvUiUFyVq9YBhzd2ZpiTyiYia%2Bdgq4Z74sUIqOyz6bn2KjCKT%2FMqeFqyYYp5JU9CnQk%2BHAH2juQU%2F8MlrGtrRRtgf6fACGMOGria0Vu1wUDwnJiSdI%2BZSzShr%2Fg6Cl9mfaKuTItwlxiqQlbx7hvHEhgg2SNqyrRnJDzpYImSeIMjgHuUy2Iaf6O6J90GdKF4%2BDkCpyXVsm%2FkZhBA6D7uo9rj8tPfE7ml6Njhm9pFZxjuicbCI%2F4Zj66aC52RlpUZwlMgS2HpXOdbILUX8H2FXnm%2FCjDHEDGv49HusCmQehes1g0LzTXXwKkC1hWOYjwWb8uxNneaR0e552R6fjRns%2B2kG04C%2B8COLbJ7v7s3WlUDGBN%2BUa%2BE5q0QNpIYmIW1daXmOx%2FXRBoBdBwWZ1b3GtaBmRiEarb4rF1DgKa9P3SdQBb1M6SvjprcyHRtai7AxnIBW1KMFWB6mETzESVSFwO5KA80co5Aau7HfhM%3D
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -7919,7 +7926,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.12 and above'
- 2.12 and above
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -7933,7 +7940,8 @@ software:
unaffected_versions: []
vendor_links:
- https://login.blackberry.com/sso/SSORedirect/metaAlias/idp?SAMLRequest=fZNdc6owEIb%2FCpN7JFIqlal2KKio%2BFGgar05EyCWKCRAgqK%2F%2FlA9zvT0ojuzF5l9s%2B9u5snzS52l0hGXnDDaA%2B0WBBKmEYsJ%2FeyB92AoP4GX%2FjNHWZobZiUS6uGiwlxIzT3KjWuhB6qSGgxxwg2KMswNERm%2BOXMNtQWNvGSCRSwFksk5LkVjZDHKqwyXPi6PJMLvntsDiRA5NxSFV3nOStEKUxQdQlyW51bEMqXJrKJEnJWUfRL6wlkPQvuhA68Rdi8XINnNXIQicV3l3u8q%2F9mNc6b4%2FsLDMSlxJJQMC2SmBHGFxDmQxnYP%2FFEts4mNvEhOfDSzzdPP%2FCrr9vFjMig0OBtGswiZ52H6mK9Gbtev5FnViZ2HV3dnV3lSOPvSn2YCboaeFV5Q4Yx2K%2FQ%2B1RcPUzWin0%2F7j%2FlEI1OtULfqpNnC8arkIjaD3X6%2BtlVvF8JJvQqznJlx4MfWIQuC1HJhklLH1m2vA9PHbjgSaB2K3YbND5a3X2%2BLfD48DbofVaIlfBSiLt5qS67P6pW87%2FD4SAaqfDzVzLbrQWGdhq7pkG6AdNt0k4ofMj1Zs7Jeio4%2FpuQURwMtHC%2BdGtZvRVD7Vg7jt%2Ba1OK%2FwmHKBqOgBFaqqDFW5%2FRi0dQO2DbXb0qC6BdLyHwivhN7w%2Bo2a8CbihhMES3m58AMgre6YNgJwg9K4mpffaPy9LbojCPp3QL6hkZ1bHKWY71gZ4S9QnpVvJv3b6f9%2F0P8L&RelayState=%2Fcommunity%2Fs%2Farticle%2F90708&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=ThznbsjgVwDX5E2fOcNREcaH%2FaSSD9EIp6MP3c9O9BRVFL%2BETG3n1WQKapplpISRgUkLEs2XvRpJ4%2FfEmynkr5laH4rrAIgMNL%2FauqYIGWvzbdzfp44PkOGUBkHxgo52GjhshHBPyHqJjnvzIoNyIK2zhDBQXevq9etV7wnX7SprJpHX%2B6Ivskj5wAXJzi9SiMafMvUiUFyVq9YBhzd2ZpiTyiYia%2Bdgq4Z74sUIqOyz6bn2KjCKT%2FMqeFqyYYp5JU9CnQk%2BHAH2juQU%2F8MlrGtrRRtgf6fACGMOGria0Vu1wUDwnJiSdI%2BZSzShr%2Fg6Cl9mfaKuTItwlxiqQlbx7hvHEhgg2SNqyrRnJDzpYImSeIMjgHuUy2Iaf6O6J90GdKF4%2BDkCpyXVsm%2FkZhBA6D7uo9rj8tPfE7ml6Njhm9pFZxjuicbCI%2F4Zj66aC52RlpUZwlMgS2HpXOdbILUX8H2FXnm%2FCjDHEDGv49HusCmQehes1g0LzTXXwKkC1hWOYjwWb8uxNneaR0e552R6fjRns%2B2kG04C%2B8COLbJ7v7s3WlUDGBN%2BUa%2BE5q0QNpIYmIW1daXmOx%2FXRBoBdBwWZ1b3GtaBmRiEarb4rF1DgKa9P3SdQBb1M6SvjprcyHRtai7AxnIBW1KMFWB6mETzESVSFwO5KA80co5Aau7HfhM%3D
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -7949,7 +7957,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- 'All'
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -7963,7 +7971,8 @@ software:
unaffected_versions: []
vendor_links:
- https://login.blackberry.com/sso/SSORedirect/metaAlias/idp?SAMLRequest=fZNdc6owEIb%2FCpN7JFIqlal2KKio%2BFGgar05EyCWKCRAgqK%2F%2FlA9zvT0ojuzF5l9s%2B9u5snzS52l0hGXnDDaA%2B0WBBKmEYsJ%2FeyB92AoP4GX%2FjNHWZobZiUS6uGiwlxIzT3KjWuhB6qSGgxxwg2KMswNERm%2BOXMNtQWNvGSCRSwFksk5LkVjZDHKqwyXPi6PJMLvntsDiRA5NxSFV3nOStEKUxQdQlyW51bEMqXJrKJEnJWUfRL6wlkPQvuhA68Rdi8XINnNXIQicV3l3u8q%2F9mNc6b4%2FsLDMSlxJJQMC2SmBHGFxDmQxnYP%2FFEts4mNvEhOfDSzzdPP%2FCrr9vFjMig0OBtGswiZ52H6mK9Gbtev5FnViZ2HV3dnV3lSOPvSn2YCboaeFV5Q4Yx2K%2FQ%2B1RcPUzWin0%2F7j%2FlEI1OtULfqpNnC8arkIjaD3X6%2BtlVvF8JJvQqznJlx4MfWIQuC1HJhklLH1m2vA9PHbjgSaB2K3YbND5a3X2%2BLfD48DbofVaIlfBSiLt5qS67P6pW87%2FD4SAaqfDzVzLbrQWGdhq7pkG6AdNt0k4ofMj1Zs7Jeio4%2FpuQURwMtHC%2BdGtZvRVD7Vg7jt%2Ba1OK%2FwmHKBqOgBFaqqDFW5%2FRi0dQO2DbXb0qC6BdLyHwivhN7w%2Bo2a8CbihhMES3m58AMgre6YNgJwg9K4mpffaPy9LbojCPp3QL6hkZ1bHKWY71gZ4S9QnpVvJv3b6f9%2F0P8L&RelayState=%2Fcommunity%2Fs%2Farticle%2F90708&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=ThznbsjgVwDX5E2fOcNREcaH%2FaSSD9EIp6MP3c9O9BRVFL%2BETG3n1WQKapplpISRgUkLEs2XvRpJ4%2FfEmynkr5laH4rrAIgMNL%2FauqYIGWvzbdzfp44PkOGUBkHxgo52GjhshHBPyHqJjnvzIoNyIK2zhDBQXevq9etV7wnX7SprJpHX%2B6Ivskj5wAXJzi9SiMafMvUiUFyVq9YBhzd2ZpiTyiYia%2Bdgq4Z74sUIqOyz6bn2KjCKT%2FMqeFqyYYp5JU9CnQk%2BHAH2juQU%2F8MlrGtrRRtgf6fACGMOGria0Vu1wUDwnJiSdI%2BZSzShr%2Fg6Cl9mfaKuTItwlxiqQlbx7hvHEhgg2SNqyrRnJDzpYImSeIMjgHuUy2Iaf6O6J90GdKF4%2BDkCpyXVsm%2FkZhBA6D7uo9rj8tPfE7ml6Njhm9pFZxjuicbCI%2F4Zj66aC52RlpUZwlMgS2HpXOdbILUX8H2FXnm%2FCjDHEDGv49HusCmQehes1g0LzTXXwKkC1hWOYjwWb8uxNneaR0e552R6fjRns%2B2kG04C%2B8COLbJ7v7s3WlUDGBN%2BUa%2BE5q0QNpIYmIW1daXmOx%2FXRBoBdBwWZ1b3GtaBmRiEarb4rF1DgKa9P3SdQBb1M6SvjprcyHRtai7AxnIBW1KMFWB6mETzESVSFwO5KA80co5Aau7HfhM%3D
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -8009,8 +8018,8 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- '3.5.x'
- '4.x'
- 3.5.x
- 4.x
cve-2021-45046:
investigated: false
affected_versions: []
@ -8023,7 +8032,8 @@ software:
unaffected_versions: []
vendor_links:
- https://twitter.com/bluemind/status/1470379923034578946?s=20A
notes: This advisory is available to customer only and has not been reviewed by CISA.
notes: This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -8236,36 +8246,6 @@ software:
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC Application Accelerator for IMS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Apptune for Db2
cves:
@ -8867,7 +8847,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Integrity for IMS
product: BMC AMI Database Performance for Db2
cves:
cve-2021-4104:
investigated: false
@ -8897,7 +8877,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Database Performance for Db2
product: BMC AMI Datastream for Ops
cves:
cve-2021-4104:
investigated: false
@ -8927,7 +8907,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Datastream for Ops
product: BMC AMI Defender for Db2
cves:
cve-2021-4104:
investigated: false
@ -8957,7 +8937,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender for Db2
product: BMC AMI Defender for IMS
cves:
cve-2021-4104:
investigated: false
@ -8987,7 +8967,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender for IMS
product: BMC AMI Defender for McAfee DAM
cves:
cve-2021-4104:
investigated: false
@ -9017,7 +8997,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender for McAfee DAM
product: BMC AMI Defender for Ops Insight
cves:
cve-2021-4104:
investigated: false
@ -9047,7 +9027,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender for Ops Insight
product: BMC AMI Defender for z/Linux
cves:
cve-2021-4104:
investigated: false
@ -9077,7 +9057,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender for z/Linux
product: BMC AMI Defender for z/OS
cves:
cve-2021-4104:
investigated: false
@ -9107,7 +9087,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender for z/OS
product: BMC AMI Defender for z/OS GSIP Package
cves:
cve-2021-4104:
investigated: false
@ -9137,7 +9117,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender for z/OS GSIP Package
product: BMC AMI Defender TCP/IP Receiver
cves:
cve-2021-4104:
investigated: false
@ -9197,7 +9177,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Defender TCP/IP Receiver
product: BMC AMI DevOps for Db2
cves:
cve-2021-4104:
investigated: false
@ -9227,7 +9207,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI DevOps for Db2
product: BMC AMI Energizer for IMS Connect
cves:
cve-2021-4104:
investigated: false
@ -9257,7 +9237,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Energizer for IMS Connect
product: BMC AMI Enterprise Connector
cves:
cve-2021-4104:
investigated: false
@ -9287,7 +9267,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Enterprise Connector
product: BMC AMI Extended Terminal Assist for IMS
cves:
cve-2021-4104:
investigated: false
@ -9317,7 +9297,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Extended Terminal Assist for IMS
product: BMC AMI Fast Path Indexer for IMS
cves:
cve-2021-4104:
investigated: false
@ -9347,7 +9327,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Fast Path Indexer for IMS
product: BMC AMI Fast Path Online Analyzer for IMS
cves:
cve-2021-4104:
investigated: false
@ -9377,7 +9357,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Fast Path Online Analyzer for IMS
product: BMC AMI Fast Path Online Image Copy for IMS
cves:
cve-2021-4104:
investigated: false
@ -9407,7 +9387,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Fast Path Online Image Copy for IMS
product: BMC AMI Fast Path Online Reorg for IMS
cves:
cve-2021-4104:
investigated: false
@ -9437,7 +9417,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Fast Path Online Reorg for IMS
product: BMC AMI Fast Path Online Restructure for IMS
cves:
cve-2021-4104:
investigated: false
@ -9467,7 +9447,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Fast Path Online Restructure for IMS
product: BMC AMI Fast Path Recovery for IMS
cves:
cve-2021-4104:
investigated: false
@ -9497,7 +9477,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Fast Path Recovery for IMS
product: BMC AMI Fast Path Restart for IMS
cves:
cve-2021-4104:
investigated: false
@ -9527,7 +9507,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Fast Path Restart for IMS
product: BMC AMI Integrity for IMS
cves:
cve-2021-4104:
investigated: false
@ -10847,7 +10827,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Utlities for Db2
product: BMC AMI Utility Mangement for Db2
cves:
cve-2021-4104:
investigated: false
@ -10877,7 +10857,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Utility Mangement for Db2
product: BMC AMI Utility Mangemer for Db2
cves:
cve-2021-4104:
investigated: false
@ -10907,7 +10887,37 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC AMI Utility Mangemer for Db2
product: BMC AMI Utlities for Db2
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC Application Accelerator for IMS
cves:
cve-2021-4104:
investigated: false
@ -12377,7 +12387,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC Digital Workplace Basic (DWP)
product: BMC Digital Workplace Advanced (DWPA)
cves:
cve-2021-4104:
investigated: false
@ -12407,7 +12417,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC Digital Workplace Catalog (DWPC)
product: BMC Digital Workplace Basic (DWP)
cves:
cve-2021-4104:
investigated: false
@ -12437,7 +12447,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC Digital Workplace Advanced (DWPA)
product: BMC Digital Workplace Catalog (DWPC)
cves:
cve-2021-4104:
investigated: false
@ -12719,7 +12729,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- '21.x and below'
- 21.x and below
cve-2021-45046:
investigated: false
affected_versions: []
@ -12748,7 +12758,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '21.x'
- 21.x
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -13247,7 +13257,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC PATROL for Sybase
product: BMC PATROL for Linux KM
cves:
cve-2021-4104:
investigated: false
@ -13277,7 +13287,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: BMC PATROL for Linux KM
product: BMC PATROL for Sybase
cves:
cve-2021-4104:
investigated: false
@ -14747,7 +14757,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: FASTCPK
product: FASTCOPY
cves:
cve-2021-4104:
investigated: false
@ -14777,7 +14787,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: FASTCOPY
product: FASTCPK
cves:
cve-2021-4104:
investigated: false
@ -15467,7 +15477,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: Release Process Management
product: Release Package and Deployment
cves:
cve-2021-4104:
investigated: false
@ -15497,7 +15507,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: BMC
product: Release Package and Deployment
product: Release Process Management
cves:
cve-2021-4104:
investigated: false
@ -15857,7 +15867,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Bosch
product: Bosch IoT Suite
product: Bosch IoT Gateway
cves:
cve-2021-4104:
investigated: false
@ -15868,7 +15878,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- ''
- 3.7.0
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -15881,13 +15891,13 @@ software:
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://bosch-iot-suite.com/news/apache-log4j-rce-vulnerability/
- https://psirt.bosch.com/security-advisories/bosch-sa-572602.html
notes: ''
references:
- ''
last_updated: '2021-12-22T00:00:00'
- vendor: Bosch
product: Bosch IoT Gateway
product: Bosch IoT Suite
cves:
cve-2021-4104:
investigated: false
@ -15898,7 +15908,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '3.7.0'
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -15911,7 +15921,7 @@ software:
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://psirt.bosch.com/security-advisories/bosch-sa-572602.html
- https://bosch-iot-suite.com/news/apache-log4j-rce-vulnerability/
notes: ''
references:
- ''
@ -15958,7 +15968,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.0.32'
- 1.0.32
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -16572,8 +16582,8 @@ software:
affected_versions: []
fixed_versions:
- '9.1'
- '9.1.01'
- '9.1.02'
- 9.1.01
- 9.1.02
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -17263,9 +17273,9 @@ software:
- '4.4'
- '4.5'
- '5.0'
- '5.0 CR1'
- '5.0.2'
- '5.0.2.1'
- 5.0 CR1
- 5.0.2
- 5.0.2.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -17295,7 +17305,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '5.0.3'
- 5.0.3
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -17358,7 +17368,7 @@ software:
affected_versions: []
fixed_versions:
- '5.4'
- '5.1 - 5.3 (EOS)'
- 5.1 - 5.3 (EOS)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -17418,7 +17428,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.3.10'
- 2.3.10
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -17808,12 +17818,12 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '12.8.x Policy Server'
- '12.8.04 or later Administrative UI'
- '12.8.x Access Gateway'
- '12.8.x SDK'
- '12.7 ASA Agents'
- '12.8 ASA Agents'
- 12.8.x Policy Server
- 12.8.04 or later Administrative UI
- 12.8.x Access Gateway
- 12.8.x SDK
- 12.7 ASA Agents
- 12.8 ASA Agents
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -17874,8 +17884,8 @@ software:
affected_versions: []
fixed_versions:
- '9.1'
- '9.1.01'
- '9.1.02'
- 9.1.01
- 9.1.02
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -17995,10 +18005,10 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '4.6.0'
- '4.6.5'
- '4.6.7'
- '4.6.8'
- 4.6.0
- 4.6.5
- 4.6.7
- 4.6.8
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -18300,9 +18310,9 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '3.4.6'
- 3.4.6
- '4.0'
- '4.0.1'
- 4.0.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -18362,7 +18372,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '12.9.x'
- 12.9.x
- '14.0'
unaffected_versions: []
cve-2021-45046:
@ -18483,7 +18493,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '3.6.2.4'
- 3.6.2.4
unaffected_versions: []
cve-2021-45046:
investigated: false

@ -48,25 +48,159 @@ NOTE: This file is automatically generated. To submit updates, please refer to
| Barracuda | All | | | Unknown | [link](https://www.barracuda.com/company/legal/trust-center) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Basis Technology | Autopsy | | 4.18.0 onwards | Fixed | [link](https://www.autopsy.com/autopsy-and-log4j-vulnerability/) | version 4.18.0 onwards use Apache Solr 8. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Baxter | All | | | Unknown | [link](https://www.baxter.com/sites/g/files/ebysai746/files/2021-12/Apache_Log4j_Vulnerability.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BBraun | APEX® Compounder | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | DoseTrac® Server, DoseLink™ Server, and Space® Online Suite Server software | | All | Fixed | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Outlook® Safety Infusion System Pump family | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Pinnacle® Compounder | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Pump, SpaceStation, and Space® Wireless Battery) | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Space® Infusion Pump family (Infusomat® Space® Infusion Pump, Perfusor® Space® Infusion | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BD | Arctic Sun™ Analytics | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Diabetes Care App Cloud | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight™ Clinical Advisor | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight™ Data Manager | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight™ Diversion Management | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight™ Infection Advisor | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight™ Inventory Optimization Analytics | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight™ Medication Safety | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Knowledge Portal for BD Pyxis™ Supply | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Knowledge Portal for Infusion Technologies | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Knowledge Portal for Medication Technologies | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Synapsys™ Informatics Solution | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Veritor™ COVID At Home Solution Cloud | | | Unknown | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BBraun | APEX Compounder | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | DoseTrac Server, DoseLink Server, and Space® Online Suite Server software | | All | Fixed | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Outlook Safety Infusion System Pump family | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Pinnacle Compounder | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Pump, SpaceStation, and Space Wireless Battery | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BBraun | Space Infusion Pump family (Infusomat Space Infusion Pump, Perfusor Space Infusion | | | Not Affected | [link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-31 |
| BCT | BerichtenCentrale (BCE) & Integrations | | | Not Affected | [link](https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761) | This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BCT | CORSA | | | Not Affected | [link](https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761) | This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BCT | e-Invoice | | 2.10.210 | Fixed | [link](https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761) | This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BCT | IDT | | | Not Affected | [link](https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761) | This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BCT | iGEN | | | Not Affected | [link](https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761) | This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BCT | LIBER | | 1.125.3 | Fixed | [link](https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761) | This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris CC Plus Guardrails Syringe Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris CC Plus Syringe Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris Enteral Plus Syringe Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris Gateway Workstation | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris GP Plus Guardrails Volumetric Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris GP Plus Volumetric Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris PK Plus Syringe Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris Technical Utility (ATU) | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris TiVA Syringe Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | Alaris VP Plus Guardrails Volumetric Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Accuri C6 Plus | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Action Manager | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Auto-ID Module Model | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Communications Engine | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris CQI Event Reporter | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Guardrails Editor | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Infusion Central | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris neXus CC Syringe Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris neXus Editor v5.0 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris neXus GP Volumetric Pump | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris PCA Module Model 8120 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Plus Editor | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Point-of-Care Software | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Point-of-Care Unit (PCU) Model 8015 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Pump Module Model 8100 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Syringe Module Model 8110 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris System Mainetnance | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Alaris Systems Manager | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Arctic Sun Analytics | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD BACTEC 9050 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD BACTEC 9120 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD BACTEC 9240 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD BACTEC FX | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD BACTEC FX40 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD BACTEC MGIT | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Care Coordination Engine (CCE) | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Cato | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD COR | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Diabetes Care App Cloud | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD EpiCenter | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACS Lyse Wash Assistant | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACS Sample Prep Assistant (SPA) III | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACS Workflow Manager | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSAria Fusion | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSAria II | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSAria III | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSCalibur | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSCanto 10-color | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSCanto 10-color clinical | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSCanto II (w Diva 9.0) | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSCanto II clinical | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSCelesta | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSCount | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSDuet | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSLink | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSLyric | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSMelody | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSPresto | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSVerse | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSVia | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSymphony A1 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSymphony A3 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSymphony A5 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD FACSymphony S6 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HD Check System | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight Clinical Advisor | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight Data Manager | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight Diversion Management | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight Infection Advisor | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight Inventory Optimization Analytics | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD HealthSight Medication Safety | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Intelliport | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Intelliport | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Intelliport Medication Management System | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Inventory Connect | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Kiestra InoquIA | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Kiestra InoquIA+ | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Knowledge Portal for BD Pyxis Supply | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Knowledge Portal for Infusion Technologies | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Knowledge Portal for Medication Technologies | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD MAX | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Phoenix 100 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Phoenix AP | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Phoenix M50 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Prevue II Peripheral Vascular Access System | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Probetec | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Pyxis Anesthesia Station 4000 | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Pyxis Anesthesia Station ES | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| BD | BD Pyxis CIISafe | | | Not Affected | [link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |