Add Cisco products through NM&P

pull/518/head
justmurphy 2 years ago committed by GitHub
parent a1fbeba030
commit debe95d0c2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
  1. 714
      data/cisagov_C.yml

@ -4235,6 +4235,36 @@ software:
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco NCS 2000 Shelf Virtualization Orchestrator
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Network Assurance Engine
cves:
@ -4247,7 +4277,434 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '6.0.2'
- '6.0.2'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Network Convergence System 1004
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '7.3.2'
- '7.3.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Network Services Orchestrator (NSO)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- 'nso-5.3.5.1'
- 'nso-5.4.5.2'
- 'nso-5.5.4.1'
- 'nso-5.6.3.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Nexus Dashboard
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '2.1.2'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Cisco Application Services Engine
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Nexus Dashboard Data Broker
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Nexus Insights
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '6.0.2'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Optical Network Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '1.1.0'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Optical Network Planner
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Packaged Contact Center Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '11.6'
- '12.0'
- '12.5'
- '12.6'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Paging Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '14.4.2'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Policy Suite
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Prime Access Registrar
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Prime Cable Provisioning
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Central for Service Providers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Prime Collaboration Assurance
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4266,7 +4723,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Network Convergence System 1004
product: Cisco Prime Collaboration Deployment
cves:
cve-2021-4104:
investigated: false
@ -4277,8 +4734,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '7.3.2'
- '7.3.1'
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4297,7 +4753,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Network Services Orchestrator (NSO)
product: Cisco Prime Collaboration Provisioning
cves:
cve-2021-4104:
investigated: false
@ -4308,10 +4764,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- 'nso-5.3.5.1'
- 'nso-5.4.5.2'
- 'nso-5.5.4.1'
- 'nso-5.6.3.1'
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4330,7 +4783,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Nexus Dashboard
product: Cisco Prime Infrastructure
cves:
cve-2021-4104:
investigated: false
@ -4341,7 +4794,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.1.2'
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4355,12 +4808,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Cisco Application Services Engine
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Nexus Dashboard Data Broker
product: Cisco Prime IP Express
cves:
cve-2021-4104:
investigated: false
@ -4370,9 +4823,39 @@ software:
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Prime License Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
@ -4390,7 +4873,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Nexus Insights
product: Cisco Prime Network
cves:
cve-2021-4104:
investigated: false
@ -4401,7 +4884,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '6.0.2'
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4420,7 +4903,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Optical Network Controller
product: Cisco Prime Network Registrar
cves:
cve-2021-4104:
investigated: false
@ -4431,7 +4914,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.1.0'
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4450,7 +4933,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Packaged Contact Center Enterprise
product: Cisco Prime Optical for Service Providers
cves:
cve-2021-4104:
investigated: false
@ -4461,10 +4944,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '11.6'
- '12.0'
- '12.5'
- '12.6'
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4483,7 +4963,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Paging Server
product: Cisco Prime Performance Manager
cves:
cve-2021-4104:
investigated: false
@ -4494,7 +4974,37 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '14.4.2'
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Prime Provisioning
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4542,6 +5052,36 @@ software:
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Process Orchestrator
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '12.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Remote PHY 120
cves:
@ -4603,7 +5143,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email Encryption Add-in
product: Cisco SD-WAN vManage
cves:
cve-2021-4104:
investigated: false
@ -4613,9 +5153,42 @@ software:
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '20.3.4.1'
- '20.4.2.1'
- '20.5.1.1'
- '20.6.2.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Agile Exchange (SAE) Core Function Pack
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '2.4.1'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
@ -4633,7 +5206,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email Encryption Plugin for Outlook
product: Cisco Secure Email Encryption Add-in
cves:
cve-2021-4104:
investigated: false
@ -4663,7 +5236,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email Encryption Security Plugin for Outlook
product: Cisco Secure Email Encryption Plugin for Outlook
cves:
cve-2021-4104:
investigated: false
@ -4693,7 +5266,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email and Web Manager
product: Cisco Secure Email Encryption Security Plugin for Outlook
cves:
cve-2021-4104:
investigated: false
@ -4718,12 +5291,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Cisco Content Security Management Appliance (SMA)
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Network Analytics
product: Cisco Secure Email and Web Manager
cves:
cve-2021-4104:
investigated: false
@ -4748,12 +5321,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Stealthwatch Enterprise, Advanced Host Group Automation (AHGA)
notes: Formerly Cisco Content Security Management Appliance (SMA)
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Network Analytics
product: Cisco Secure Endpoint
cves:
cve-2021-4104:
investigated: false
@ -4778,7 +5351,7 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Stealthwatch Enterprise, Flow Adapter
notes: Formerly Cisco Advanced Malware Protection for Endpoints
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -4808,7 +5381,7 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Stealthwatch Enterprise, Network Forensics (NFA)
notes: Formerly Stealthwatch Enterprise, Advanced Host Group Automation (AHGA)
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -4838,7 +5411,7 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Stealthwatch Enterprise, Proxy Adapter
notes: Formerly Stealthwatch Enterprise, Flow Adapter
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -4868,12 +5441,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Stealthwatch Enterprise, Cisco Secure Services Proxy (CSSP)
notes: Formerly Stealthwatch Enterprise, Network Forensics (NFA)
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Security Malware Analytics Appliance
product: Cisco Secure Network Analytics
cves:
cve-2021-4104:
investigated: false
@ -4898,12 +5471,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Cisco Threat Grid Appliance
notes: Formerly Stealthwatch Enterprise, Proxy Adapter
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Security Manager
product: Cisco Secure Network Analytics
cves:
cve-2021-4104:
investigated: false
@ -4928,12 +5501,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
notes: Formerly Stealthwatch Enterprise, Cisco Secure Services Proxy (CSSP)
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco SD-WAN vManage
product: Cisco Security Malware Analytics Appliance
cves:
cve-2021-4104:
investigated: false
@ -4943,12 +5516,9 @@ software:
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '20.3.4.1'
- '20.4.2.1'
- '20.5.1.1'
- '20.6.2.1'
unaffected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
@ -4961,12 +5531,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
notes: Formerly Cisco Threat Grid Appliance
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Agile Exchange (SAE) Core Function Pack
product: Cisco Security Manager
cves:
cve-2021-4104:
investigated: false
@ -4976,9 +5546,9 @@ software:
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '2.4.1'
unaffected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
@ -4996,7 +5566,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Endpoint
product: Cisco Smart Software Manager On-Prem
cves:
cve-2021-4104:
investigated: false
@ -5088,6 +5658,36 @@ software:
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Telemetry Broker
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Cisco Advanced Malware Protection for Endpoints
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Tetration Analytics
cves:

Loading…
Cancel
Save