Normalize YAML files and update the software lists

update-C
cisagovbot 1 year ago
parent 3e8b964abd
commit ff4c3a524c
  1. 6216
      data/cisagov.yml
  2. 368
      data/cisagov_C.yml
  3. 443
      software_lists/software_list_C.md

File diff suppressed because it is too large Load Diff

@ -494,7 +494,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '7.x'
- 7.x
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -673,7 +673,7 @@ software:
cve-2021-44228:
investigated: true
affected_versions:
- '7.x'
- 7.x
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
@ -703,7 +703,7 @@ software:
cve-2021-44228:
investigated: true
affected_versions:
- '8.x'
- 8.x
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
@ -928,8 +928,8 @@ software:
unaffected_versions: []
vendor_links:
- https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134
notes: More information on pages linked bottom of blogpost (behind login).
This advisory is available to customer only and has not been reviewed by CISA.
notes: More information on pages linked bottom of blogpost (behind login). This
advisory is available to customer only and has not been reviewed by CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -959,8 +959,8 @@ software:
unaffected_versions: []
vendor_links:
- https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134
notes: More information on pages linked bottom of blogpost (behind login).
This advisory is available to customer only and has not been reviewed by CISA.
notes: More information on pages linked bottom of blogpost (behind login). This
advisory is available to customer only and has not been reviewed by CISA.
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -1065,7 +1065,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- 'All'
- All
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -1095,7 +1095,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -1124,7 +1124,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -1211,7 +1211,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -1330,7 +1330,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -1360,7 +1360,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -1660,7 +1660,7 @@ software:
affected_versions: []
fixed_versions: []
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated: false
affected_versions: []
@ -1866,7 +1866,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '4.13.1'
- 4.13.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -1896,7 +1896,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '3.0.78'
- 3.0.78
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -1926,7 +1926,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '4.13.1'
- 4.13.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -1956,7 +1956,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.13.1'
- 1.13.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -2016,7 +2016,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.7.2'
- 1.7.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -2305,7 +2305,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Aironet Access Points
product: Cisco Adaptive Security Appliance (ASA) Software
cves:
cve-2021-4104:
investigated: false
@ -2335,7 +2335,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco AireOS Wireless LAN Controllers
product: Cisco Adaptive Security Device Manager
cves:
cve-2021-4104:
investigated: false
@ -2365,7 +2365,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco AMP Virtual Private Cloud Appliance
product: Cisco Adaptive Security Virtual Appliance (ASAv)
cves:
cve-2021-4104:
investigated: false
@ -2395,7 +2395,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Adaptive Security Appliance (ASA) Software
product: Cisco Advanced Web Security Reporting Application
cves:
cve-2021-4104:
investigated: false
@ -2425,7 +2425,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Adaptive Security Device Manager
product: Cisco AireOS Wireless LAN Controllers
cves:
cve-2021-4104:
investigated: false
@ -2455,7 +2455,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Adaptive Security Virtual Appliance (ASAv)
product: Cisco Aironet Access Points
cves:
cve-2021-4104:
investigated: false
@ -2485,7 +2485,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Advanced Web Security Reporting Application
product: Cisco AMP Virtual Private Cloud Appliance
cves:
cve-2021-4104:
investigated: false
@ -2556,8 +2556,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '4.2(7r)'
- '5.2(3g)'
- 4.2(7r)
- 5.2(3g)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -2576,7 +2576,8 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM)
product: Cisco Application Policy Infrastructure Controller Enterprise Module
(APIC-EM)
cves:
cve-2021-4104:
investigated: false
@ -2647,7 +2648,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.1.0.4'
- 2.1.0.4
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -2677,8 +2678,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2021.11_1.162'
- 'ap381882'
- 2021.11_1.162
- ap381882
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -2858,9 +2859,9 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '3.0.000.115'
- '3.1.000.044'
- '3.2.000.009'
- 3.0.000.115
- 3.1.000.044
- 3.2.000.009
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3103,7 +3104,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '4.10.0.16'
- 4.10.0.16
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3163,7 +3164,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '5.5.2'
- 5.5.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3193,7 +3194,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '5.3.1'
- 5.3.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3223,7 +3224,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '5.5.2'
- 5.5.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3253,8 +3254,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.10.0.1'
- '2.9.1.3'
- 2.10.0.1
- 2.9.1.3
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3314,10 +3315,10 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '10.6.3-70'
- '10.6.3-105'
- '10.6.2-89'
- '10.4.1'
- 10.6.3-70
- 10.6.3-105
- 10.6.2-89
- 10.4.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3469,8 +3470,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.0.2'
- '3.0.1'
- 2.0.2
- 3.0.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3530,8 +3531,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.0.1'
- '3.0.1'
- 2.0.1
- 3.0.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3561,8 +3562,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.0.1'
- '3.0.1'
- 2.0.1
- 3.0.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3592,8 +3593,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '4.0.1'
- '4.1.1'
- 4.0.1
- 4.1.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3653,7 +3654,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '8.0.0.8'
- 8.0.0.8
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3683,8 +3684,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.0.1'
- '3.0.1'
- 2.0.1
- 3.0.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3714,7 +3715,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.12.2'
- 1.12.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3744,7 +3745,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '4.0.3'
- 4.0.3
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3774,12 +3775,12 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '12.0(2f)'
- '11.3(1)'
- '11.4(1)'
- '11.5(1)'
- '11.5(2)'
- '11.5(3)'
- 12.0(2f)
- 11.3(1)
- 11.4(1)
- 11.5(1)
- 11.5(2)
- 11.5(3)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3809,9 +3810,9 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.1.2.8'
- '2.2.2.8'
- '2.2.3.4'
- 2.1.2.8
- 2.2.2.8
- 2.2.3.4
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3841,8 +3842,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- 'v2.0.588'
- 'v2.2.12'
- v2.0.588
- v2.2.12
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -3932,8 +3933,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '11.5(4)SU9'
- '11.5(4)SU10'
- 11.5(4)SU9
- 11.5(4)SU10
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4025,9 +4026,9 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '5.1.3.1'
- '5.0.2.1'
- '4.1.1.1'
- 5.1.3.1
- 5.0.2.1
- 4.1.1.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4166,7 +4167,8 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Firepower Threat Defense (FTD) managed by Cisco Firepower Management Center
product: Cisco Firepower Threat Defense (FTD) managed by Cisco Firepower Management
Center
cves:
cve-2021-4104:
investigated: false
@ -4196,7 +4198,8 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Firepower Threat Defense (FTD) managed by Firepower Device Manager (FDM)
product: Cisco Firepower Threat Defense (FTD) managed by Firepower Device Manager
(FDM)
cves:
cve-2021-4104:
investigated: false
@ -4207,12 +4210,12 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '6.2.3'
- '6.4.0'
- '6.6.5'
- '6.7.0'
- '7.0.1'
- '7.1.0'
- 6.2.3
- 6.4.0
- 6.6.5
- 6.7.0
- 7.0.1
- 7.1.0
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4452,11 +4455,11 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.4 hotfix'
- '2.6 hotfix'
- '2.7 hotfix'
- '3.0 hotfix'
- '3.1 hotfix'
- 2.4 hotfix
- 2.6 hotfix
- 2.7 hotfix
- 3.0 hotfix
- 3.1 hotfix
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4486,7 +4489,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.3.2.1'
- 2.3.2.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4576,7 +4579,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.0.9-361'
- 1.0.9-361
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4756,8 +4759,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.14.5'
- '1.16.4'
- 1.14.5
- 1.16.4
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -4926,7 +4929,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meeting Management (CMM)
product: Cisco MDS 9000 Series Multilayer Switches
cves:
cve-2021-4104:
investigated: false
@ -4956,7 +4959,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meeting Server
product: Cisco Meeting Management (CMM)
cves:
cve-2021-4104:
investigated: false
@ -4986,7 +4989,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki Go Series
product: Cisco Meeting Server
cves:
cve-2021-4104:
investigated: false
@ -5016,7 +5019,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki MR Series Cloud-Managed Wireless Access Points
product: Cisco Meriaki Go Series
cves:
cve-2021-4104:
investigated: false
@ -5046,7 +5049,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki MS Series Switches
product: Cisco Meriaki MR Series Cloud-Managed Wireless Access Points
cves:
cve-2021-4104:
investigated: false
@ -5076,7 +5079,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki MT Series Sensors
product: Cisco Meriaki MS Series Switches
cves:
cve-2021-4104:
investigated: false
@ -5106,7 +5109,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki MV Series Cloud-Managed Smart Cameras
product: Cisco Meriaki MT Series Sensors
cves:
cve-2021-4104:
investigated: false
@ -5136,7 +5139,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki MX Series Cloud-Managed Security and SD-WAN
product: Cisco Meriaki MV Series Cloud-Managed Smart Cameras
cves:
cve-2021-4104:
investigated: false
@ -5166,7 +5169,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki Systems Manager
product: Cisco Meriaki MX Series Cloud-Managed Security and SD-WAN
cves:
cve-2021-4104:
investigated: false
@ -5196,7 +5199,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Meriaki Z-Series Cloud-Managed Teleworker Gateway
product: Cisco Meriaki Systems Manager
cves:
cve-2021-4104:
investigated: false
@ -5226,7 +5229,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco MDS 9000 Series Multilayer Switches
product: Cisco Meriaki Z-Series Cloud-Managed Teleworker Gateway
cves:
cve-2021-4104:
investigated: false
@ -5297,7 +5300,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '7.14.4'
- 7.14.4
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -5417,7 +5420,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '6.0.2'
- 6.0.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -5447,8 +5450,8 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '7.3.2'
- '7.3.1'
- 7.3.2
- 7.3.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -5508,10 +5511,10 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- 'nso-5.3.5.1'
- 'nso-5.4.5.2'
- 'nso-5.5.4.1'
- 'nso-5.6.3.1'
- nso-5.3.5.1
- nso-5.4.5.2
- nso-5.5.4.1
- nso-5.6.3.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -5680,7 +5683,8 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode
product: Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure
(ACI) Mode
cves:
cve-2021-4104:
investigated: false
@ -5751,7 +5755,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.1.2'
- 2.1.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -5811,7 +5815,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '6.0.2'
- 6.0.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -5871,7 +5875,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '1.1.0'
- 1.1.0
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -5964,7 +5968,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '14.4.2'
- 14.4.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -7314,10 +7318,10 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '20.3.4.1'
- '20.4.2.1'
- '20.5.1.1'
- '20.6.2.1'
- 20.3.4.1
- 20.4.2.1
- 20.5.1.1
- 20.6.2.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -7377,7 +7381,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.4.1'
- 2.4.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -7396,7 +7400,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email Encryption Add-in
product: Cisco Secure Email and Web Manager
cves:
cve-2021-4104:
investigated: false
@ -7421,12 +7425,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
notes: Formerly Cisco Content Security Management Appliance (SMA)
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email Encryption Plugin for Outlook
product: Cisco Secure Email Encryption Add-in
cves:
cve-2021-4104:
investigated: false
@ -7456,7 +7460,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email Encryption Security Plugin for Outlook
product: Cisco Secure Email Encryption Plugin for Outlook
cves:
cve-2021-4104:
investigated: false
@ -7486,7 +7490,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Secure Email and Web Manager
product: Cisco Secure Email Encryption Security Plugin for Outlook
cves:
cve-2021-4104:
investigated: false
@ -7511,7 +7515,7 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Cisco Content Security Management Appliance (SMA)
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -7846,7 +7850,7 @@ software:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Smart Software Manager On-Prem
product: Cisco Smart PHY
cves:
cve-2021-4104:
investigated: false
@ -7856,9 +7860,12 @@ software:
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
fixed_versions:
- 3.1.4
- 3.2.0
- 3.2.1
- '21.3'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
@ -7871,12 +7878,12 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: Formerly Cisco Advanced Malware Protection for Endpoints
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Cisco
product: Cisco Smart PHY
product: Cisco Smart Software Manager On-Prem
cves:
cve-2021-4104:
investigated: false
@ -7886,12 +7893,9 @@ software:
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '3.1.4'
- '3.2.0'
- '3.2.1'
- '21.3'
unaffected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
@ -7904,7 +7908,7 @@ software:
unaffected_versions: []
vendor_links:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
notes: ''
notes: Formerly Cisco Advanced Malware Protection for Endpoints
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
@ -8130,7 +8134,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.0(1p)'
- 2.0(1p)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -8160,7 +8164,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '6.8.2.0'
- 6.8.2.0
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -8670,11 +8674,11 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '11.5(1)SU7'
- '11.5(1)SU8'
- '11.5(1)SU9'
- '11.5(1)SU10'
- '11.5(1.18119-2) - 11.5(1.23162-1)'
- 11.5(1)SU7
- 11.5(1)SU8
- 11.5(1)SU9
- 11.5(1)SU10
- 11.5(1.18119-2) - 11.5(1.23162-1)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -8704,11 +8708,11 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '11.5(1)SU7'
- '11.5(1)SU8'
- '11.5(1)SU9'
- '11.5(1)SU10'
- '11.5(1.18900-16) - 11.5(1.18901-3)'
- 11.5(1)SU7
- 11.5(1)SU8
- 11.5(1)SU9
- 11.5(1)SU10
- 11.5(1.18900-16) - 11.5(1.18901-3)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -8738,11 +8742,11 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '11.5(1)SU7'
- '11.5(1)SU8'
- '11.5(1)SU9'
- '11.5(1)SU10'
- '11.5(1.18119-2) - 11.5(1.23162-1)'
- 11.5(1)SU7
- 11.5(1)SU8
- 11.5(1)SU9
- 11.5(1)SU10
- 11.5(1.18119-2) - 11.5(1.23162-1)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -8805,10 +8809,10 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '11.6(1)ES23'
- '12.0(1)ES18'
- '12.5(1)ES13'
- '12.6(1)ES03'
- 11.6(1)ES23
- 12.0(1)ES18
- 12.5(1)ES13
- 12.6(1)ES03
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -8931,7 +8935,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '10.2.1v2'
- 10.2.1v2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -8961,11 +8965,11 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '11.5(1)SU7'
- '11.5(1)SU8'
- '11.5(1)SU9'
- '11.5(1)SU10'
- '11.5(1.18119-2) - 11.5(1.23162-1)'
- 11.5(1)SU7
- 11.5(1)SU8
- 11.5(1)SU9
- 11.5(1)SU10
- 11.5(1.18119-2) - 11.5(1.23162-1)
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -9055,7 +9059,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '7.14.4'
- 7.14.4
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -9085,7 +9089,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '2.6.7'
- 2.6.7
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -9115,11 +9119,11 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '3.2.x'
- '3.4.4'
- '3.4.6'
- '4.2.0'
- '4.2.1'
- 3.2.x
- 3.4.4
- 3.4.6
- 4.2.0
- 4.2.1
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -9180,7 +9184,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '6.4 SP3'
- 6.4 SP3
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -9210,9 +9214,9 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '7.5.0.1'
- '7.4.0.1'
- '7.3.0.2'
- 7.5.0.1
- 7.4.0.1
- 7.3.0.2
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -9572,10 +9576,10 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- 'CWMS-3.0MR4SP2'
- 'CWMS-4.0MR4SP2'
- 'CWMS-3.0MR4SP3'
- 'CWMS-4.0MR4SP3'
- CWMS-3.0MR4SP2
- CWMS-4.0MR4SP2
- CWMS-3.0MR4SP3
- CWMS-4.0MR4SP3
unaffected_versions: []
cve-2021-45046:
investigated: false
@ -9695,7 +9699,7 @@ software:
investigated: true
affected_versions: []
fixed_versions:
- '3.2.1'
- 3.2.1
unaffected_versions: []
cve-2021-45046:
investigated: false

@ -33,163 +33,324 @@ NOTE: This file is automatically generated. To submit updates, please refer to
| Vendor | Product | Affected Versions | Patched Versions | Status | Vendor Links | Notes | References | Reporter | Last Updated |
| ------ | ------- | ----------------- | ---------------- | ------ | ------------ | ----- | ---------- | -------- | ------------ |
| C4b XPHONE | | | | Unknown | [link](https://www.c4b.com/de/news/log4j.php) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Campbell Scientific | All | | | Unknown | [link](https://s.campbellsci.com/documents/us/miscellaneous/log4j2-vulnerability.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-23 |
| Camunda | | | | Unknown | [link](https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Canary Labs | All | | | Unknown | [link](https://helpcenter.canarylabs.com/t/83hjjk0/log4j-vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-22 |
| Canon | Canon DR Products CXDI_NE) | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | Such as Omnera, FlexPro, Soltus | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| C4b XPHONE | All | | | Unknown | [link](https://www.c4b.com/de/news/log4j.php) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Campbell Scientific | All | | | Not Affected | [link](https://s.campbellsci.com/documents/us/miscellaneous/log4j2-vulnerability.pdf) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-23 |
| Camunda | All | | | Unknown | [link](https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Canary Labs | All | | | Not Affected | [link](https://helpcenter.canarylabs.com/t/83hjjk0/log4j-vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-22 |
| Canon | Canon DR Products (CXDI_NE) | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | Such as Omnera, FlexPro, Soltus, and more. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | CT Medical Imaging Products | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Eye-Care Products | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | iCAD | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Invia | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Medis | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Mevis | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Mirada | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | MR Medical Imaging Products | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | NM Medical Imaging Products | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Olea | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Olea Sphere | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Rialto | | 7.x | Fixed | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | Contact customer support. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Rialto Connect and Vault | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Solution Health (Cloud) | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Solution Health (On-Prem) | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Tomtec | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | UL Medical Imaging Products | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Vitrea Advanced 7.x | All | | Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Vitrea Advanced | 7.x | | Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | Contact customer support. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Vitrea Connection | 8.x | | Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | Contact customer support. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | Vitrea View | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | VL Alphenix Angio Workstation (AWS) | All | | Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | VL Infinix-i and Alphenix DFP | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | VL Infinix-i Angio Workstation (AWS) | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Canon | XR Medical Imaging Products | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| CapStorm | Copystorm | | | Unknown | | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-22 |
| CarbonBlack | | | | Unknown | [link](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Carestream | | | | Unknown | [link](https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| Carrier | | | | Unknown | [link](https://www.corporate.carrier.com/product-security/advisories-resources/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| CAS genesisWorld | | | | Unknown | [link](https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Cato Networks | | | | Unknown | [link](https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Cepheid | C360 | | | Unknown | [link](https://www.cepheid.com/en_US/legal/product-security-updates) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| Canon | Zillion | | | Not Affected | [link](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-02 |
| Carbon Black | Cloud Workload Appliance | | | Fixed | [link](https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134) | More information on pages linked bottom of blogpost (behind login). This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Carbon Black | EDR Servers | | | Fixed | [link](https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134) | More information on pages linked bottom of blogpost (behind login). This advisory is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Carestream | All | | | Not Affected | [link](https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| Carrier | | | | Not Affected | [link](https://www.corporate.carrier.com/product-security/advisories-resources/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| CAS genesisWorld | All | | | Unknown | [link](https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Cato Networks | All | | | Unknown | [link](https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Cendio | ThinLinc | | | Not Affected | [link](https://community.thinlinc.com/t/log4shell-vulnerability/286) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| Cepheid | C360 | | | Not Affected | [link](https://www.cepheid.com/en_US/legal/product-security-updates) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| Cepheid | GeneXpert | | | Unknown | [link](https://www.cepheid.com/en_US/legal/product-security-updates) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
| Cerberus FTP | | | | Unknown | [link](https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Cerberus | FTP | | | Not Affected | [link](https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Cerebrate | All | | | Not Affected | [link](https://twitter.com/cerebrateproje1/status/1470347775141421058) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Cerebro | Elasticsearch Web Admin | | | Not Affected | [link](https://github.com/lmenezes/cerebro/blob/main/conf/logback.xml#L5) | Uses logback for logging. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Chaser Systems | discrimiNAT Firewall | | | Not Affected | [link](https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Chatsworth Products | eConnect PDU | | | Not Affected | [link](https://user-images.githubusercontent.com/89155495/146845501-b2186f1b-ccce-4f3d-a2c3-373db2eed9f0.png) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | CloudGuard | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | Harmony Endpoint & Harmony Mobile | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | Harmony Endpoint | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | Harmony Mobile | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | Infinity Portal | | | Unknown | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | Quantum Security Gateway | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | Quantum Security Management | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | Where used, uses the 1.8.0\_u241 version of the JRE that protects against this attack by default. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | SMB | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | ThreatCloud | | | Unknown | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| CheckMK | | | | Unknown | [link](https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Ciphermail | | | | Unknown | [link](https://www.ciphermail.com/blog/ciphermail-gateway-and-webmail-messenger-are-not-vulnerable-to-cve-2021-44228.html) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Check Point | ThreatCloud | | | Not Affected | [link](https://supportcontent.checkpoint.com/solutions?id=sk176865) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| CheckMK | All | | | Unknown | [link](https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Chef | Automate | | | Not Affected | [link](https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j)) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
| Che