From fd7beba78eda80f4344b7a220df64b22956290bf Mon Sep 17 00:00:00 2001 From: RenoutSchoen <47435302+RenoutSchoen@users.noreply.github.com> Date: Wed, 15 Jun 2022 14:22:59 +0200 Subject: [PATCH] Merge update (#889) * Update software lists * Update software lists * Update software lists * Update software lists * Update software lists --- software/software_list_0-9.md | 10 +- software/software_list_a.md | 574 ++++++++-------- software/software_list_b.md | 1156 +++++++++++++++++---------------- software/software_list_c.md | 859 ++++++++++++------------ software/software_list_d.md | 638 +++++++++--------- software/software_list_e.md | 456 ++++++------- software/software_list_f.md | 276 ++++---- software/software_list_g.md | 94 +-- software/software_list_h.md | 576 ++++++++-------- software/software_list_i.md | 1120 ++++++++++++++++---------------- software/software_list_j.md | 251 +++---- software/software_list_k.md | 66 +- software/software_list_l.md | 401 ++++++------ software/software_list_m.md | 276 ++++---- software/software_list_n.md | 211 +++--- software/software_list_o.md | 233 +++---- software/software_list_p.md | 497 +++++++------- software/software_list_q.md | 81 +-- software/software_list_r.md | 356 +++++----- software/software_list_s.md | 773 +++++++++++----------- software/software_list_t.md | 498 +++++++------- software/software_list_u.md | 105 +-- software/software_list_v.md | 266 ++++---- software/software_list_w.md | 84 +-- software/software_list_x.md | 164 ++--- software/software_list_y.md | 31 +- software/software_list_z.md | 33 +- 27 files changed, 5108 insertions(+), 4977 deletions(-) diff --git a/software/software_list_0-9.md b/software/software_list_0-9.md index 81af1902a..b92a64633 100644 --- a/software/software_list_0-9.md +++ b/software/software_list_0-9.md @@ -7,10 +7,10 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|1Password|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://1password.community/discussion/comment/622612/#Comment_622612)| -|2Bleftsparks|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/2Bleftsparks.png)| -|2n|All| | | | | | |[2n Advisory Link](https://www.2n.com/cs_CZ/novinky/produkty-2n-neohrozuje-zranitelnost-cve-2021-44228-komponenty-log4j-2)| -|3CX|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/post-407835)| +|1Password|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://1password.community/discussion/comment/622612/#Comment_622612)| +|2Bleftsparks|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/2Bleftsparks.png)| +|2n|All| | | | | ||[2n Advisory Link](https://www.2n.com/cs_CZ/novinky/produkty-2n-neohrozuje-zranitelnost-cve-2021-44228-komponenty-log4j-2)| +|3CX|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/post-407835)| |3M Health Information Systems|CGS| | |Vulnerable| | |This advisory is available to customer only and has not been reviewed by CISA.|[CGS: Log4j Software Update(login required)](https://support.3mhis.com/app/account/updates/ri/5210)| |7Signal|Sapphire| |Not vuln|Fix| | |Fix released 2021-12-14|| -|7-Zip|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/)| +|7-Zip|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/)| diff --git a/software/software_list_a.md b/software/software_list_a.md index 2c9e85030..4cd02f40d 100644 --- a/software/software_list_a.md +++ b/software/software_list_a.md @@ -7,367 +7,373 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|ABB|Alarminsight Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://search.abb.com/library/Download.aspx?DocumentID=9ADB012621&LanguageCode=en&DocumentPartId=&Action=Launch)| -|ABB|B&R Products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.br-automation.com/downloads_br_productcatalogue/assets/1639507581859-en-original-1.0.pdf)| -|ABB|Remote Service| |Not vuln|Fix| | |Details are shared with customers with an active RAP subscription|"[source](https://search.abb.com/library/Download.aspx?DocumentID=9ADB012621&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Abbott| All| | |Investigation| | | |[source](https://www.abbott.com/policies/cybersecurity/apache-Log4j.html)| -|Abbott| GLP Track System | Track Sample Manager (TSM) and Track Workflow Manager (TWM) communication interfaces | | Vulnerable | Vulnerable | Vulnerable | Abbott will provide a fix for this in a future update expected in January 2022. |[source](https://www.abbott.com/policies/cybersecurity/apache-Log4j.html)| -|Abnormal Security|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Abnormal Blog](https://abnormalsecurity.com/blog/attackers-use-email-log4j-vulnerability)| -|Accellence|All| | | | | | |[Accellence Article](https://www.accellence.de/en/articles/national-vulnerability-database-62)| +|APC by Schneider Electric|Powerchute Business Edition| | |Fix| | |Mitigation instructions to remove the affected class.|[link](https://community.exchange.se.com/t5/APC-UPS-Data-Center-Backup/Log4-versions-used-in-Powerchute-vulnerable/m-p/379866/highlight/true#M47345)| +|APC by Schneider Electric|Powerchute Network Shutdown| | |Fix| | |Mitigation instructions to remove the affected class.|[link](https://community.exchange.se.com/t5/APC-UPS-Data-Center-Backup/Log4-versions-used-in-Powerchute-vulnerable/m-p/379866/highlight/true#M47345)| +|ARC Informatique|All| | |Not vuln| | ||[link](https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1141-security-bulletin-2021-1)| +|Advanced Micro Devices (AMD)|All| | |Not vuln| | ||[link](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1034)| +|Alfresco|All| | |Not vuln| | ||[link](https://hub.alfresco.com/t5/alfresco-content-services-blog/cve-2021-44228-related-to-apache-log4j-security-advisory/ba-p/310717)| +|Atvise|All| | |Not vuln| | |The security vulnerability does NOT affect our applications and products or pose any threat. This applies to all Bachmann applications and products, including atvise solutions.|[link](https://www.atvise.com/en/articles/at-log4j-sicherheitsluecke-atvise-produkte-und-terminals-nicht-betroffen)| +|ABB|Alarminsight Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=9ADB012621&LanguageCode=en&DocumentPartId=&Action=Launch)| +|ABB|B&R Products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.br-automation.com/downloads_br_productcatalogue/assets/1639507581859-en-original-1.0.pdf)| +|ABB|Remote Service| |Not vuln|Fix| | |Details are shared with customers with an active RAP subscription|[source](https://search.abb.com/library/Download.aspx?DocumentID=9ADB012621&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Abbott|All| | |Investigation| | ||[source](https://www.abbott.com/policies/cybersecurity/apache-Log4j.html)| +|Abbott|GLP Track System|Track Sample Manager (TSM) and Track Workflow Manager (TWM) communication interfaces| |Vulnerable|Vulnerable|Vulnerable|Abbott will provide a fix for this in a future update expected in January 2022.|[source](https://www.abbott.com/policies/cybersecurity/apache-Log4j.html)| +|Abnormal Security|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Abnormal Blog](https://abnormalsecurity.com/blog/attackers-use-email-log4j-vulnerability)| +|Accellence|All| | | | | ||[Accellence Article](https://www.accellence.de/en/articles/national-vulnerability-database-62)| |Accellence Technologies|EBÜS|All|Not vuln|Workaround| | |EBÜS itself is not vulnerable to CVE-2021-44228. Although it includes several 3rd-partie software setups, which may be affected (see source for more info).|[source](https://www.accellence.de/en/articles/cve-2021-44228-62)| -|Accellence Technologies|vimacc|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.accellence.de/en/articles/cve-2021-44228-62)| +|Accellence Technologies|vimacc|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.accellence.de/en/articles/cve-2021-44228-62)| |Accellion|Kiteworks|v7.6 release|Not vuln|Fix| | |As a precaution, Kiteworks released a 7.6.1 Hotfix software update to address the vulnerability. This patch release adds the mitigation for CVE-2021-44228 contained in the Solr package as recommended by Apache Solr group. Specifically, it updates the Log4j library to a non-vulnerable version on CentOS 7 systems as well as adds the recommended option “$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true” to disable the possible attack vector on both CentOS 6 and CentOS 7.|[Kiteworks Statement](https://www.kiteworks.com/kiteworks-news/log4shell-apache-vulnerability-what-kiteworks-customers-need-to-know/)| -|Accruent|Analytics| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Asset Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|BigCenter| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|EMS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Evoco| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Expesite| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Famis 360| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Lucernex| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Maintenance Connection| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Meridian| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Single Sign On (SSO, Central Auth)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|SiteFM3| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|SiteFM4| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|Siterra| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|TMS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|VxField| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Accruent|VxMaintain/VxObserve/VxSustain| |Not vuln|Fix| | | |[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| -|Acquia|All| | | | | | |[Acquia Article](https://support.acquia.com/hc/en-us/articles/4415823329047-Apache-log4j-CVE-2021-44228)| +|Accruent|Analytics| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Asset Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|BigCenter| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|EMS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Evoco| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Expesite| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Famis 360| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Lucernex| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Maintenance Connection| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Meridian| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Single Sign On (SSO, Central Auth)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|SiteFM3| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|SiteFM4| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|Siterra| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|TMS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|VxField| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Accruent|VxMaintain/VxObserve/VxSustain| |Not vuln|Fix| | ||[source](https://www.accruent.com/resources/articles/incident-apache-log4j2)| +|Acquia|All| | | | | ||[Acquia Article](https://support.acquia.com/hc/en-us/articles/4415823329047-Apache-log4j-CVE-2021-44228)| |Acronis|All| | |Investigation| | |See further information below|[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Backup|11.7|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Cyber Backup|12.5|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Cyber Files|8.6.2 onwards|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Cyber Infrastructure|3.5 and 4.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Cyber Protect|15|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Cyber Protection Home Office|2017 onwards|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|DeviceLock DLP|9.0|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Files Connect|10.7 onwards|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|MassTransit|8.1 and 8.2|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|Acronis|Snap Deploy|5 and 6|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://security-advisory.acronis.com/advisories/SEC-3859)| -|ActiveState|All| | | | | | |[ActiveState Blog Post](https://www.activestate.com/blog/activestate-statement-java-log4j-vulnerability/)| -|Acunetix|360|All| |Not vuln| | | |[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| -|Acunetix|Agents|All| |Not vuln| | | |[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| -|Acunetix|Application|All| |Not vuln| | | |[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| -|Acunetix|IAST: ASP. NET|All| |Not vuln| | | |[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| +|Acronis|Backup|11.7|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|Cyber Backup|12.5|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|Cyber Files|8.6.2 onwards|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|Cyber Infrastructure|3.5 and 4.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|Cyber Protect|15|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|Cyber Protection Home Office|2017 onwards|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|DeviceLock DLP|9.0|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|Files Connect|10.7 onwards|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|MassTransit|8.1 and 8.2|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|Acronis|Snap Deploy|5 and 6|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://security-advisory.acronis.com/advisories/SEC-3859)| +|ActiveState|All| | | | | ||[ActiveState Blog Post](https://www.activestate.com/blog/activestate-statement-java-log4j-vulnerability/)| +|Acunetix|360|All| |Not vuln| | ||[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| +|Acunetix|Agents|All| |Not vuln| | ||[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| +|Acunetix|Application|All| |Not vuln| | ||[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| +|Acunetix|IAST: ASP. NET|All| |Not vuln| | ||[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| |Acunetix|IAST: Java|All|Not vuln|Workaround| | |AcuSensor IAST module needs attention|[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| -|Acunetix|IAST: NodeJS|All| |Not vuln| | | |[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| -|Acunetix|IAST: PHP|All| |Not vuln| | | |[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| -|Adaptec|All| | | | | | |[Adaptec Link](https://ask.adaptec.com/app/answers/detail/a_id/17523/kw/log4j)| -|Addigy|All| | | | | | |[Addigy Blog Post](https://addigy.com/blog/addigy-and-apaches-log4j2-cve-2021-44228-status/)| -|Adeptia|All| | | | | | |[Adeptia Article](https://support.adeptia.com/hc/en-us/articles/4412815509524-CVE-2021-44228-Log4j2-Vulnerability-Mitigation-)| +|Acunetix|IAST: NodeJS|All| |Not vuln| | ||[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| +|Acunetix|IAST: PHP|All| |Not vuln| | ||[source](https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/)| +|Adaptec|All| | | | | ||[Adaptec Link](https://ask.adaptec.com/app/answers/detail/a_id/17523/kw/log4j)| +|Addigy|All| | | | | ||[Addigy Blog Post](https://addigy.com/blog/addigy-and-apaches-log4j2-cve-2021-44228-status/)| +|Adeptia|All| | | | | ||[Adeptia Article](https://support.adeptia.com/hc/en-us/articles/4412815509524-CVE-2021-44228-Log4j2-Vulnerability-Mitigation-)| |Adeptia|Connect|3.3| |Workaround|Workaround|Workaround|Advisory mentioned only log4j2 and not the CVE|[source](https://enable-u.us10.list-manage.com/track/click?u=7199eb80b888255247a943e6a&id=c514b59a73&e=7171615024)| |Adeptia|Connect|3.4, 3.5| |Workaround|Workaround|Workaround|Advisory mentioned only log4j2 and not the CVE|[source](https://enable-u.us10.list-manage.com/track/click?u=7199eb80b888255247a943e6a&id=370ed2213c&e=7171615024)| |Adeptia|Suite|6.9.10, 6.9.11| |Workaround|Workaround|Workaround|Advisory mentioned only log4j2 and not the CVE|[source](https://enable-u.us10.list-manage.com/track/click?u=7199eb80b888255247a943e6a&id=6b4f074159&e=7171615024)| |Adeptia|Suite|6.9.9| |Workaround|Workaround|Workaround|Advisory mentioned only log4j2 and not the CVE|[source](https://enable-u.us10.list-manage.com/track/click?u=7199eb80b888255247a943e6a&id=3b70f3f0d2&e=7171615024)| -|Adobe|Acrobat Reader| | |Not vuln| | | |[source](https://community.adobe.com/t5/acrobat-discussions/acrobat-affected-by-apache-log4j-vulnerability-cve-2021-44228/td-p/12590329?profile.language=fr)| -|Adobe|All| | |Investigation| | | |[source](https://helpx.adobe.com/security/products/log4j-2-advisory.html)| -|Adobe|Automated Forms Conversion Service| | |Vulnerable| | | |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe|ColdFusion|All|Not vuln|Fix| | |"Patched on Dec 17th"|[source](https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html)| -|Adobe|Experience Manager 6.3 Forms on JEE|all versions from 6.3 GA to 6.3.3|Not vuln|Workaround| | | |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe|Experience Manager 6.4 Forms Designer| | |Vulnerable| | | |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe|Experience Manager 6.4 Forms on JEE|all versions from 6.4 GA to 6.4.8|Not vuln|Workaround| | | |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe|Experience Manager 6.5 Forms Designer| |Not vuln|Fix| | | |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe|Experience Manager 6.5 Forms on JEE|all versions from 6.5 GA to 6.5.11|Not vuln|Workaround| | | |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe|Experience Manager Forms on OSGi|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe|Experience Manager Forms Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| -|Adobe ColdFusion|All| | | | | | |[Adobe ColdFusion Link](https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html)| +|Adobe|Acrobat Reader| | |Not vuln| | ||[source](https://community.adobe.com/t5/acrobat-discussions/acrobat-affected-by-apache-log4j-vulnerability-cve-2021-44228/td-p/12590329?profile.language=fr)| +|Adobe|All| | |Investigation| | ||[source](https://helpx.adobe.com/security/products/log4j-2-advisory.html)| +|Adobe|Automated Forms Conversion Service| | |Vulnerable| | ||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe|ColdFusion|All|Not vuln|Fix| | |https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html Patched on Dec 17th|[source](https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html)| +|Adobe|Experience Manager 6.3 Forms on JEE|all versions from 6.3 GA to 6.3.3|Not vuln|Workaround| | ||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe|Experience Manager 6.4 Forms Designer| | |Vulnerable| | ||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe|Experience Manager 6.4 Forms on JEE|all versions from 6.4 GA to 6.4.8|Not vuln|Workaround| | ||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe|Experience Manager 6.5 Forms Designer| |Not vuln|Fix| | ||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe|Experience Manager 6.5 Forms on JEE|all versions from 6.5 GA to 6.5.11|Not vuln|Workaround| | ||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe|Experience Manager Forms on OSGi|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe|Experience Manager Forms Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://helpx.adobe.com/experience-manager/kb/aem-forms-vulnerability-cve-2021-44228.html)| +|Adobe ColdFusion|All| | | | | ||[Adobe ColdFusion Link](https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html)| |ADP|All| | |Investigation| | |Patching were needed, no signs of intrusion|[source](https://www.adp.com/about-adp/data-security/alerts/adp-vulnerability-statement-apache-log4j-vulnerability-cve-2021-44228-update.aspx)| |Advanced Systems Concepts (formally Jscape)|Active MFT| |Not vuln|Not vuln|Not vuln|Not vuln|This advisory is available to customers only and has not been reviewed by CISA|[Log4J Vulnerabilty](https://support.advsyscon.com/hc/en-us/articles/4413631831569)| |Advanced Systems Concepts (formally Jscape)|MFT| |Not vuln|Not vuln|Not vuln|Not vuln|This advisory is available to customers only and has not been reviewed by CISA|[Log4J Vulnerabilty](https://support.advsyscon.com/hc/en-us/articles/4413631831569)| |Advanced Systems Concepts (formally Jscape)|MFT Gateway| |Not vuln|Not vuln|Not vuln|Not vuln|This advisory is available to customers only and has not been reviewed by CISA|[Log4J Vulnerabilty](https://support.advsyscon.com/hc/en-us/articles/4413631831569)| |Advanced Systems Concepts (formally Jscape)|MFT Server| |Not vuln|Not vuln|Not vuln|Not vuln|This advisory is available to customers only and has not been reviewed by CISA|[Log4J Vulnerabilty](https://support.advsyscon.com/hc/en-us/articles/4413631831569)| -|AFAS|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://help.afas.nl/vraagantwoord/NL/SE/120439.htm)| -|AFAS Software|All| | | | | | |[AFAS Software Link](https://help.afas.nl/vraagantwoord/NL/SE/120439.htm)| -|AFHCAN Global LLC|AFHCANcart|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://afhcan.org/support.aspx)| -|AFHCAN Global LLC|AFHCANmobile|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://afhcan.org/support.aspx)| -|AFHCAN Global LLC|AFHCANServer|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://afhcan.org/support.aspx)| -|AFHCAN Global LLC|AFHCANsuite|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://afhcan.org/support.aspx)| -|AFHCAN Global LLC|AFHCANupdate|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://afhcan.org/support.aspx)| -|AFHCAN Global LLC|AFHCANweb|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://afhcan.org/support.aspx)| -|Agilysys|All| | | | | | |[Agilysys Link](https://info.agilysys.com/webmail/76642/2001127877/c3fda575e2313fac1f6a203dc6fc1db2439c3db0da22bde1b6c1b6747d7f0e2f)| -|Ahsay|Mobile|version 1.6+|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://wiki.ahsay.com/doku.php?id=public:announcement:cve-2021-44228_log4j)| -|Ahsay|Other products|version 8.5.4.86 (and above)|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://wiki.ahsay.com/doku.php?id=public:announcement:cve-2021-44228_log4j)| -|Ahsay|PRD|version 2.0|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://wiki.ahsay.com/doku.php?id=public:announcement:cve-2021-44228_log4j)| -|Aiden|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.meetaiden.com/knowledge-base/is-aiden-vulnerable-to-cve-2021-44228-log4j-log4shell/)| -|AIL|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://twitter.com/ail_project/status/1470373644279119875)| -|Akamai|Enterprise Application Access (EAA) connector| |Not vuln|Not vuln|Not vuln|Not vuln| || +|AFAS|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://help.afas.nl/vraagantwoord/NL/SE/120439.htm)| +|AFAS Software|All| | | | | ||[AFAS Software Link](https://help.afas.nl/vraagantwoord/NL/SE/120439.htm)| +|AFHCAN Global LLC|AFHCANcart|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://afhcan.org/support.aspx)| +|AFHCAN Global LLC|AFHCANmobile|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://afhcan.org/support.aspx)| +|AFHCAN Global LLC|AFHCANServer|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://afhcan.org/support.aspx)| +|AFHCAN Global LLC|AFHCANsuite|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://afhcan.org/support.aspx)| +|AFHCAN Global LLC|AFHCANupdate|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://afhcan.org/support.aspx)| +|AFHCAN Global LLC|AFHCANweb|8.0.7 - 8.4.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://afhcan.org/support.aspx)| +|Agilysys|All| | | | | ||[Agilysys Link](https://info.agilysys.com/webmail/76642/2001127877/c3fda575e2313fac1f6a203dc6fc1db2439c3db0da22bde1b6c1b6747d7f0e2f)| +|Ahsay|Mobile|version 1.6+|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://wiki.ahsay.com/doku.php?id=public:announcement:cve-2021-44228_log4j)| +|Ahsay|Other products|version 8.5.4.86 (and above)|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://wiki.ahsay.com/doku.php?id=public:announcement:cve-2021-44228_log4j)| +|Ahsay|PRD|version 2.0|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://wiki.ahsay.com/doku.php?id=public:announcement:cve-2021-44228_log4j)| +|Aiden|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.meetaiden.com/knowledge-base/is-aiden-vulnerable-to-cve-2021-44228-log4j-log4shell/)| +|AIL|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://twitter.com/ail_project/status/1470373644279119875)| +|Akamai|Enterprise Application Access (EAA) connector| |Not vuln|Not vuln|Not vuln|Not vuln||| |Akamai|Siem Integration Connector|<1.7.4|Not vuln|Fix|Fix|Fix|Akamai SIEM Integration Connector is vulnerable to CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105.|[source](https://developer.akamai.com/tools/integrations/siem/siem-cef-connector#release-notes)| |Akamai|Siem Splunk Connector|=>1.4.10|Not vuln|Not vuln|Not vuln|Not vuln|v1.4.11 is the new recommendation for mitigation of log4j vulnerabilities.|[source](https://splunkbase.splunk.com/app/4310/)| |Akamai|Siem Splunk Connector|<1.4.10|Not vuln|Workaround| | |Akamai SIEM Integration Connector for Splunk is not vulnerable to CVE-2021-44228. Although it includes the vulnerable Log4J component, it is not used by the connector.|[source](https://splunkbase.splunk.com/app/4310/)| -|Alcatel|All| | | | | | |[Alcatel Link](https://dokuwiki.alu4u.com/doku.php?id=log4j)| -|Alertus|Console|5.15.0|Not vuln|Fix| | | |[source](https://help.alertus.com/s/article/Security-Advisory-Log4Shell-Vulnerability?language=en_US)| -|Alexion|All| | | | | | |[Alexion Blog Post](https://alexion.nl/blog/alexion-crm-niet-vatbaar-voor-log4shell)| -|Alexion Software|Alexion CRM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://alexion.nl/blog/alexion-crm-niet-vatbaar-voor-log4shell)| -|Alfresco (Hyland)|Alfresco|All| |Not vuln| | | |[Alfresco Blog Post](https://hub.alfresco.com/t5/alfresco-content-services-blog/cve-2021-44228-related-to-apache-log4j-security-advisory/ba-p/310717)| -|AlienVault|All| | | | | | |[AlienVault Article Link](https://success.alienvault.com/s/article/are-USM-Anywhere-or-USM-Central-vulnerable-to-CVE-2021-44228)| -|Alphatron|AMiSconnect| | |Not vuln| | | |[source](https://www.alphatronmedical.com/home.html)| +|Alcatel|All| | | | | ||[Alcatel Link](https://dokuwiki.alu4u.com/doku.php?id=log4j)| +|Alertus|Console|5.15.0|Not vuln|Fix| | ||[source](https://help.alertus.com/s/article/Security-Advisory-Log4Shell-Vulnerability?language=en_US)| +|Alexion|All| | | | | ||[Alexion Blog Post](https://alexion.nl/blog/alexion-crm-niet-vatbaar-voor-log4shell)| +|Alexion Software|Alexion CRM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://alexion.nl/blog/alexion-crm-niet-vatbaar-voor-log4shell)| +|Alfresco (Hyland)|Alfresco|All| |Not vuln| | ||[Alfresco Blog Post](https://hub.alfresco.com/t5/alfresco-content-services-blog/cve-2021-44228-related-to-apache-log4j-security-advisory/ba-p/310717)| +|AlienVault|All| | | | | ||[AlienVault Article Link](https://success.alienvault.com/s/article/are-USM-Anywhere-or-USM-Central-vulnerable-to-CVE-2021-44228)| +|Alphatron|AMiSconnect| | |Not vuln| | ||[source](https://www.alphatronmedical.com/home.html)| |Alphatron|Custo diagnostics|5.4 to 5.6| |Vulnerable| | |Potentially vulnerable through the HL7 and DICOM communication interfaces|[source](https://www.alphatronmedical.com/home.html)| -|Alphatron|JiveX| | |Not vuln| | | |[source](https://www.alphatronmedical.com/home.html)| -|Alphatron|Zorgbericht| | |Not vuln| | | |[source](https://www.alphatronmedical.com/home.html)| -|Alphatron Medical|All| | | | | | |[Alphatron Medical Website](https://www.alphatronmedical.com/home.html)| +|Alphatron|JiveX| | |Not vuln| | ||[source](https://www.alphatronmedical.com/home.html)| +|Alphatron|Zorgbericht| | |Not vuln| | ||[source](https://www.alphatronmedical.com/home.html)| +|Alphatron Medical|All| | | | | ||[Alphatron Medical Website](https://www.alphatronmedical.com/home.html)| |Amazon|AMS| |Not vuln|Fix| | |Work in progress, portion of customers may still be vulnerable. Actively monitoring this issue, and are working on addressing it for any AMS services which use Log4j2|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|API Gateway| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Athena| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|API Gateway| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Athena| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Athena JDBC driver| |Not vuln|Not vuln|Not vuln|Not vuln|All versions vended to customers were not affected|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS|Linux 1,2|Not vuln|Not vuln|Not vuln|Not vuln|"Notes: Amazon Linux 1 had aws apitools which were Java based but these were deprecated in 2015 AWS Forum. AMIs used to inspect and verify (base spin ups) - amzn-ami-hvm-2018.03.0.20200318.1-x86_64-gp2 and amzn2-ami-kernel-5.10-hvm-2.0.20211201.0-x86_64-gp2"|| -|Amazon|AWS API Gateway|All|Not vuln|Fix| | | |[Amazon AWS Link](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS AppFlow| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS|Linux 1,2|Not vuln|Not vuln|Not vuln|Not vuln|Notes: Amazon Linux 1 had aws apitools which were Java based but these were deprecated in 2015 https://forums.aws.amazon.com/thread.jspa?threadID=323611 AWS Forum. AMIs used to inspect and verify (base spin ups) - amzn-ami-hvm-2018.03.0.20200318.1-x86_64-gp2 and amzn2-ami-kernel-5.10-hvm-2.0.20211201.0-x86_64-gp2|| +|Amazon|AWS API Gateway|All|Not vuln|Fix| | ||[Amazon AWS Link](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS AppFlow| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS AppSync| |Not vuln|Fix| | |Updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS AWS Certificate Manager| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS AWS Certificate Manager Private CA| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS AWS Service Catalog| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS AWS Certificate Manager| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS AWS Certificate Manager Private CA| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS AWS Service Catalog| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS CloudHSM|3.4.1|Not vuln|Fix| | |CloudHSM JCE SDK 3.4.1 or higher is not vulnerable|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS CodeBuild| |Not vuln|Fix| | |Updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS CodePipeline| |Not vuln|Fix| | |Updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS Connect|All|Not vuln|Fix| | |Vendors recommend evaluating components of the environment outside of the Amazon Connect service boundary, which may require separate/additional customer mitigation|[Vendor Link](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS Directory Service| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS DynamoDB| |Not vuln|Fix| | | |[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS EKS, ECS, Fargate| |Not vuln|Fix| | |"To help mitigate the impact of the open-source Apache “Log4j2"" utility (CVE-2021-44228 and CVE-2021-45046) security issues on customers’ containers, Amazon EKS, Amazon ECS, and AWS Fargate are deploying a Linux-based update (hot-patch). This hot-patch will require customer opt-in to use, and disables JNDI lookups from the Log4J2 library in customers’ containers. These updates are available as an Amazon Linux package for Amazon ECS customers, as a DaemonSet for Kubernetes users on AWS, and will be in supported AWS Fargate platform versions"|[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS Directory Service| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS DynamoDB| |Not vuln|Fix| | ||[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS EKS, ECS, Fargate| |Not vuln|Fix| | |To help mitigate the impact of the open-source Apache “Log4j2"" utility (CVE-2021-44228 and CVE-2021-45046) security issues on customers’ containers, Amazon EKS, Amazon ECS, and AWS Fargate are deploying a Linux-based update (hot-patch). This hot-patch will require customer opt-in to use, and disables JNDI lookups from the Log4J2 library in customers’ containers. These updates are available as an Amazon Linux package for Amazon ECS customers, as a DaemonSet for Kubernetes users on AWS, and will be in supported AWS Fargate platform versions|[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS Elastic Beanstalk| |Not vuln|Not vuln|Not vuln|Not vuln|Default configuration of application's usage of Log4j versions is not vulnerable|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS ElastiCache| |Not vuln|Fix| | | |[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS ELB| |Not vuln|Fix| | | |[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS ElastiCache| |Not vuln|Fix| | ||[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS ELB| |Not vuln|Fix| | ||[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS Fargate| |Not vuln|Not vuln|Not vuln|Not vuln|Opt-in hot-patch to mitigate the Log4j issue in JVM layer will be available as platform versions|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/) [hotpatch](https://aws.amazon.com/blogs/opensource/hotpatch-for-apache-log4j/)| |Amazon|AWS Glue| |Not vuln|Fix| | |Has been updated. Vulnerable only if ETL jobs load affected versions of Apache Log4j|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS Greengrass| |Not vuln|Fix| | |Updates for all Greengrass V2 components Stream Manager (2.0.14) and Secure Tunneling (1.0.6) are available. For Greengrass versions 1.10.x and 1.11.x, an update for the Stream Manager feature is included in Greengrass patch versions 1.10.5 and 1.11.5|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS Inspector| |Not vuln|Fix| | | |[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS IoT SiteWise Edge| |Not vuln|Fix| | |"Updates for all AWS IoT SiteWise Edge components that use Log4j were made available; OPC-UA collector (v2.0.3), Data processing pack (v2.0.14), and Publisher (v2.0.2)"|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS Inspector| |Not vuln|Fix| | ||[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS IoT SiteWise Edge| |Not vuln|Fix| | |Updates for all AWS IoT SiteWise Edge components that use Log4j were made available; OPC-UA collector (v2.0.3), Data processing pack (v2.0.14), and Publisher (v2.0.2)|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS Kinesis Data Stream| |Not vuln|Fix| | |We are actively patching all sub-systems that use Log4j2 by applying updates. The Kinesis Client Library (KCL) version 2.X and the Kinesis Producer Library (KPL) are not impacted. For customers using KCL 1.x, we have released an updated version and we strongly recommend that all KCL version 1.x customers upgrade to KCL version 1.14.5 (or higher)|[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS KMS| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS KMS| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS Lambda| |Not vuln|Fix| | |Vulnerable when using aws-lambda-java-log4j2|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS Polly| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS QuickSight| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS Polly| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS QuickSight| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS RDS| |Not vuln|Fix| | |Amazon RDS and Amazon Aurora have been updated to mitigate the issues identified in CVE-2021-44228|[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS S3| |Not vuln|Fix| | | |[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS SDK| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS Secrets Manager| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS S3| |Not vuln|Fix| | ||[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS SDK| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS Secrets Manager| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|AWS SNS| |Not vuln|Fix| | |Amazon SNS systems that serve customer traffic are patched against the Log4j2 issue. We are working to apply the Log4j2 patch to sub-systems that operate separately from SNS’s systems that serve customer traffic|[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS SQS| |Not vuln|Fix| | | |[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS Systems Manager| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS Systems Manager Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|AWS Textract| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS SQS| |Not vuln|Fix| | ||[Update for Apache Log4j2 Issue (CVE-2021-44228)](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS Systems Manager| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS Systems Manager Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|AWS Textract| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Chime| |Not vuln|Fix| | |Amazon Chime and Chime SDK services have been updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Cloud Directory| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|CloudFront| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|CloudWatch| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Cognito| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Connect| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Cloud Directory| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|CloudFront| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|CloudWatch| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Cognito| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Connect| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Corretto| |Not vuln|Not vuln|Not vuln|Not vuln|10/19 release distribution does not include Log4j. Vulnerable only if customer's applications use affected versions of Apache Log4j|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|DocumentDB| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|DocumentDB| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|DynamoDB| |Not vuln|Fix| | |DynamoDB and DynamoDB Accelerator have been updated|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|EC2| |Not vuln|Fix| | |Packages for Amazon Linux 1 and 2 not affected, package for Amazon Linux 2022 is|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/) [fix](https://alas.aws.amazon.com/cve/html/CVE-2021-44228.html)| |Amazon|ECR Public| |Not vuln|Fix| | |Amazon-owned images published under a Verified Account on Amazon ECR Public are not affected by the Log4j issue|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|ECS| |Not vuln|Not vuln|Not vuln|Not vuln|As an Amazon Linux package, opt-in hot-patch to mitigate the Log4j issue in JVM layer is available|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/) [hotpatch](https://aws.amazon.com/blogs/opensource/hotpatch-for-apache-log4j/)| |Amazon|EKS| |Not vuln|Not vuln|Not vuln|Not vuln|As a DaemonSet, opt-in hot-patch to mitigate the Log4j issue in JVM layer is available|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/) [hotpatch](https://aws.amazon.com/blogs/opensource/hotpatch-for-apache-log4j/)| |Amazon|Elastic Load Balancing| |Not vuln|Fix| | |Services have been updated. All Elastic Load Balancers, as well as Classic, Application, Network and Gateway, are not affected by this Log4j issue|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|ElastiCache| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|ElastiCache| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|EMR| |Not vuln|Fix| | |Many customers are estimated to be vulnerable. Vulnerable only if affected EMR releases are used and untrusted sources are configured to be processed|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|EventBridge| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Fraud Detector| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Inspector| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Inspector Classic| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Kafka (MSK)| |Not vuln|Fix| | |"Applying updates as required, portion of customers may still be vulnerable. Some MSK-specific service components use Log4j > 2.0.0 library and are being patched where needed"|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Kendra| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Keyspaces (for Apache Cassandra)| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|EventBridge| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Fraud Detector| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Inspector| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Inspector Classic| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Kafka (MSK)| |Not vuln|Fix| | |Applying updates as required, portion of customers may still be vulnerable. Some MSK-specific service components use Log4j > 2.0.0 library and are being patched where needed|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Kendra| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Keyspaces (for Apache Cassandra)| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Kinesis| |Not vuln|Fix| | |Update for Kinesis Agent is available|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Kinesis Data Analytics| |Not vuln|Fix| | |Updates are available. See source for more information|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Kinesis Data Streams| |Not vuln|Fix| | |KCL 2.x, KCL 1.14.5 or higher, and KPL are not vulnerable|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Lake Formation| |Not vuln|Fix| | |Update in progress, portion of customers may still be vulnerable. AWS Lake Formation service hosts are being updated to the latest version of Log4j|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Lex| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Lex| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Linux 1 (AL1)| |Not vuln|Not vuln|Not vuln|Not vuln|By default not vulnerable. Opt-in hot-patch to mitigate the Log4j in JVM layer issue is available|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/) [hotpatch](https://aws.amazon.com/blogs/opensource/hotpatch-for-apache-log4j/)| |Amazon|Linux 2 (AL2)| |Not vuln|Fix| | |By default not vulnerable, and a new version of Amazon Kinesis Agent which is part of AL2 addresses the Log4j issue. Opt-in hot-patch to mitigate the Log4j issue in JVM layer is available|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/) [hotpatch](https://aws.amazon.com/blogs/opensource/hotpatch-for-apache-log4j/)| -|Amazon|Lookout for Equipment| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Macie| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Macie Classic| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Managed Workflows for Apache Airflow (MWAA)| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|MemoryDB for Redis| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Monitron| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|MQ| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Neptune| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Lookout for Equipment| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Macie| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Macie Classic| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Managed Workflows for Apache Airflow (MWAA)| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|MemoryDB for Redis| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Monitron| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|MQ| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Neptune| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|NICE| |Not vuln|Fix| | |Recommended to update EnginFrame or Log4j library|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|OpenSearch|R20211203-P2|Not vuln|Fix| | |Update released, customers need to update their clusters to the fixed release|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Pinpoint| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|RDS|Rolling update has completed|Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|RDS Aurora|Rolling update has completed|Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|RDS for Oracle| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Redshift| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Rekognition| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Route53| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|S3| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Pinpoint| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|RDS|Rolling update has completed|Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|RDS Aurora|Rolling update has completed|Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|RDS for Oracle| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Redshift| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Rekognition| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Route53| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|S3| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|SageMaker| |Not vuln|Fix| | |Completed patching for the Apache Log4j2 issue (CVE-2021-44228). Vulnerable only if customer's applications use affected versions of Apache Log4j|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |Amazon|Simple Notification Service (SNS)| |Not vuln|Fix| | |Systems that serve customer traffic are patched against the Log4j2 issue. Working to apply the patch to sub-systems that operate separately from SNS’s systems that serve customer traffic.|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Simple Queue Service (SQS)| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Simple Workflow Service (SWF)| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Single Sign-On| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Step Functions| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Timestream| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|Translate| |Not vuln|Not vuln|Not vuln|Not vuln|"Service not identified on AWS Log4j Security Bulletin"|[Amazon Translate](https://aws.amazon.com/translate/)| -|Amazon|VPC| |Not vuln|Fix| | | |[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|Amazon|WorkSpaces/AppStream 2.0| |Not vuln|Fix| | |"Not affected with default configurations. WorkDocs Sync client versions 1.2.895.1 and older within Windows WorkSpaces, which contain the Log4j component, are vulnerable; For update instruction, see source for more info"|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Simple Queue Service (SQS)| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Simple Workflow Service (SWF)| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Single Sign-On| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Step Functions| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Timestream| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|Translate| |Not vuln|Not vuln|Not vuln|Not vuln|Service not identified on https://aws.amazon.com/security/security-bulletins/AWS-2021-006/ AWS Log4j Security Bulletin|[Amazon Translate](https://aws.amazon.com/translate/)| +|Amazon|VPC| |Not vuln|Fix| | ||[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|Amazon|WorkSpaces/AppStream 2.0| |Not vuln|Fix| | |Not affected with default configurations. WorkDocs Sync client versions 1.2.895.1 and older within Windows WorkSpaces, which contain the Log4j component, are vulnerable; For update instruction, see source for more info|[source](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| |AMD|All| |Not vuln|Not vuln|Not vuln|Not vuln|Currently, no AMD products have been identified as affected. AMD is continuing its analysis.|[AMD Advisory Link](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1034)| -|Anaconda|All|4.10.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://docs.conda.io/projects/conda/en/latest/index.html)| -|AOMEI|All Products| | |Not vuln| | | |[source](https://www.aomeitech.com/forum/index.php?p=/discussion/7651/aomei-and-log4j)| -|Apache|ActiveMQ Artemis|All|Not vuln|Not vuln|Not vuln|Not vuln|"ActiveMQ Artemis does not use Log4j for logging. However, Log4j 1.2.17 is included in the Hawtio-based web console application archive (i.e. web/console.war/WEB-INF/lib). Although this version of Log4j is not impacted by CVE-2021-44228 future versions of Artemis will be updated so that the Log4j jar is no longer included in the web console application archive. See ARTEMIS-3612 for more information on that task."|[ApacheMQ - Update on CVE-2021-4428](https://activemq.apache.org/news/cve-2021-44228)| +|Anaconda|All|4.10.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://docs.conda.io/projects/conda/en/latest/index.html)| +|AOMEI|All| | |Not vuln| | ||[source](https://www.aomeitech.com/forum/index.php?p=/discussion/7651/aomei-and-log4j)| +|Apache|ActiveMQ Artemis|All|Not vuln|Not vuln|Not vuln|Not vuln|ActiveMQ Artemis does not use Log4j for logging. However, Log4j 1.2.17 is included in the Hawtio-based web console application archive (i.e. /cisagov/log4j-affected-db/blob/develop/web/console.war/WEB-INF/lib"">web/console.war/WEB-INF/lib). Although this version of Log4j is not impacted by CVE-2021-44228 future versions of Artemis will be updated so that the Log4j jar is no longer included in the web console application archive. See https://issues.apache.org/jira/browse/ARTEMIS-3612 ARTEMIS-3612 for more information on that task.|[ApacheMQ - Update on CVE-2021-4428](https://activemq.apache.org/news/cve-2021-44228)| |Apache|Airflow| |Not vuln|Not vuln|Not vuln|Not vuln|Airflow is written in Python|[Apache Airflow](https://github.com/apache/airflow/tree/main/airflow)| |Apache|Archiva|<2.2.6|Not vuln|Fix| | |Fixed in 2.2.6|[source](https://blogs.apache.org/security/entry/cve-2021-44228) [fix](https://lists.apache.org/thread/bmvhs0jxhf4vxcjxyhozm058pchykcqx)| -|Apache|Camel|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://camel.apache.org/blog/2021/12/log4j2/)| -|Apache|Camel 2| |Not vuln|Not vuln|Not vuln|Not vuln| |[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| -|Apache|Camel JBang|<=3.1.4| |Vulnerable| | | |[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| -|Apache|Camel K| |Not vuln|Not vuln|Not vuln|Not vuln| |[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| +|Apache|Camel|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://camel.apache.org/blog/2021/12/log4j2/)| +|Apache|Camel 2| |Not vuln|Not vuln|Not vuln|Not vuln||[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| +|Apache|Camel JBang|<=3.1.4| |Vulnerable| | ||[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| +|Apache|Camel K| |Not vuln|Not vuln|Not vuln|Not vuln||[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| |Apache|Camel Karaf| | |Vulnerable| | |The Karaf team is aware of this and are working on a new Karaf 4.3.4 release with updated log4j.|[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| -|Apache|Camel Quarkus| |Not vuln|Not vuln|Not vuln|Not vuln| |[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| -|Apache|CamelKafka Connector| |Not vuln|Not vuln|Not vuln|Not vuln| |[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| -|Apache|Cassandra|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://lists.apache.org/thread/2rngylxw8bjos6xbo1krp29m9wn2hhdr)| -|Apache|Druid|0.22.1|Not vuln|Fix| | | |[source](https://github.com/apache/druid/pull/12051)| -|Apache|Dubbo|All|Not vuln|Fix| | | |[source](https://github.com/apache/dubbo/issues/9380)| -|Apache|Flink|1.15.0, 1.14.2, 1.13.5, 1.12.7, 1.11.6|Not vuln|Fix| | | |[source](https://flink.apache.org/news/2021/12/16/log4j-patch-releases.html)| +|Apache|Camel Quarkus| |Not vuln|Not vuln|Not vuln|Not vuln||[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| +|Apache|CamelKafka Connector| |Not vuln|Not vuln|Not vuln|Not vuln||[APACHE CAMEL AND CVE-2021-44228 (LOG4J)](https://camel.apache.org/blog/2021/12/log4j2/)| +|Apache|Cassandra|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://lists.apache.org/thread/2rngylxw8bjos6xbo1krp29m9wn2hhdr)| +|Apache|Druid|0.22.1|Not vuln|Fix| | ||[source](https://github.com/apache/druid/pull/12051)| +|Apache|Dubbo|All|Not vuln|Fix| | ||[source](https://github.com/apache/dubbo/issues/9380)| +|Apache|Flink|1.15.0, 1.14.2, 1.13.5, 1.12.7, 1.11.6|Not vuln|Fix| | ||[source](https://flink.apache.org/news/2021/12/16/log4j-patch-releases.html)| |Apache|Fortress|< 2.0.7|Not vuln|Fix| | |Fixed in 2.0.7|[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|Geode|1.14.0|Not vuln|Fix| | |Fixed in 1.12.6, 1.13.5, 1.14.1|[source](https://cwiki.apache.org/confluence/plugins/servlet/mobile?contentId=66849544#ReleaseNotes-1.14.1)| -|Apache|Guacamole|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://guacamole.apache.org/security/)| -|Apache|Hadoop| |Not vuln|Not vuln|Not vuln|Not vuln|"Uses log4j 1.x. Are plans to migrate to log4j2 but never performed"|[source](https://blogs.apache.org/security/entry/cve-2021-44228)| +|Apache|Guacamole|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://guacamole.apache.org/security/)| +|Apache|Hadoop| |Not vuln|Not vuln|Not vuln|Not vuln|Uses log4j 1.x. Are https://issues.apache.org/jira/plugins/servlet/mobile#issue/HADOOP-12956 plans to migrate to log4j2 but never performed|[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|HBase| | |Vulnerable| | |Fix is committed, but not yet released|[source](https://github.com/apache/hbase/pull/3933)| |Apache|Hive|4.x|Not vuln|Fix| | |Fix in 4.x|[source](https://issues.apache.org/jira/browse/HIVE-25795)| -|Apache|James|3.6.0| |Vulnerable| | | |[source](https://twitter.com/dlitchfield/status/1469809966785564675)| +|Apache|James|3.6.0| |Vulnerable| | ||[source](https://twitter.com/dlitchfield/status/1469809966785564675)| |Apache|Jena|< 4.3.1|Not vuln|Fix| | |Fixed in 4.3.1|[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|JMeter|Any| |Vulnerable| | |Manual Bypass|[source](https://github.com/apache/jmeter/pull/680#issuecomment-993204248)| -|Apache|JSPWiki|2.11.1|Not vuln|Fix| | | |[source](https://jspwiki-wiki.apache.org/Wiki.jsp?page=Log4J-CVE-2021-44228)| +|Apache|JSPWiki|2.11.1|Not vuln|Fix| | ||[source](https://jspwiki-wiki.apache.org/Wiki.jsp?page=Log4J-CVE-2021-44228)| |Apache|Kafka|All|Workaround|Not vuln|Not vuln|Not vuln|Uses Log4j 1.2.17|[source](https://kafka.apache.org/cve-list)| -|Apache|Karaf| | |Vulnerable| | |"Depends on PAX logging which is affected"|[source](https://mail-archives.apache.org/mod_mbox/karaf-dev/202112.mbox/browser)| -|Apache|Log4j|< 2.15.0|Not vuln|Fix| | | |[Log4j – Apache Log4j Security Vulnerabilities](https://logging.apache.org/log4j/2.x/security.html)| -|Apache|Log4j 1.x|All|Workaround|Not vuln|Not vuln|Not vuln| |[source](https://access.redhat.com/security/cve/CVE-2021-4104)| -|Apache|Log4j 2|2.3.1, 2.12.3, 2.17.0|Not vuln|Fix|Fix|Fix| |[source](https://logging.apache.org/log4j/2.x/security.html)| -|Apache|Maven|All| |Not vuln| | | |[source](https://blogs.apache.org/security/entry/cve-2021-44228)| +|Apache|Karaf| | |Vulnerable| | |Depends on https://github.com/ops4j/org.ops4j.pax.logging/issues/414"">PAX logging which is affected|[source](https://mail-archives.apache.org/mod_mbox/karaf-dev/202112.mbox/browser)| +|Apache|Log4j|< 2.15.0|Not vuln|Fix| | ||[Log4j – Apache Log4j Security Vulnerabilities](https://logging.apache.org/log4j/2.x/security.html)| +|Apache|Log4j 1.x|All|Workaround|Not vuln|Not vuln|Not vuln||[source](https://access.redhat.com/security/cve/CVE-2021-4104)| +|Apache|Log4j 2|2.3.1, 2.12.3, 2.17.0|Not vuln|Fix|Fix|Fix||[source](https://logging.apache.org/log4j/2.x/security.html)| +|Apache|Maven|All| |Not vuln| | ||[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|NiFi|All|Not vuln|Fix| | |Fixed in 1.15.1, 1.16.0|[source](https://issues.apache.org/jira/browse/NIFI-9474)| |Apache|OFBiz|< 18.12.03|Not vuln|Fix| | |Fixed in 18.12.03|[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|Ozone|< 1.2.1|Not vuln|Fix| | |Fixed in 1.2.1|[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|SkyWalking|< 8.9.1|Not vuln|Fix| | |Fixed in 8.9.1|[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|SOLR|7.4.0 to 7.7.3, 8.0.0 to 8.11.0|Not vuln|Fix| | |Fixed in 8.11.1, Versions before 7.4 also vulnerable when using several configurations|[source](https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228)| |Apache|Spark|All|Not vuln|Not vuln|Not vuln|Not vuln|Uses log4j 1.x|[source](https://lists.apache.org/thread/wwm13b9764vjms5t8n96j6jklys49cyr)| -|Apache|Struts|2.5.28| |Vulnerable| | | |[source](https://struts.apache.org/announce-2021#a20211212-2)| +|Apache|Struts|2.5.28| |Vulnerable| | ||[source](https://struts.apache.org/announce-2021#a20211212-2)| |Apache|Struts 2|Versions before 2.5.28.1|Not vuln|Fix| | |The Apache Struts group is pleased to announce that Struts 2.5.28.1 is available as a “General Availability” release. The GA designation is our highest quality grade. This release addresses Log4j vulnerability CVE-2021-45046 by using the latest Log4j 2.12.2 version (Java 1.7 compatible).|[Apache Struts Announcements](https://struts.apache.org/announce-2021)| |Apache|Tapestry|5.7.3| |Vulnerable| | |Uses Log4j|[source](https://tapestry.apache.org/logging.html)| -|Apache|Tika|2.0.0 and up| |Vulnerable| | | |[source](https://tika.apache.org/2.0.0/index.html)| -|Apache|Tomcat| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tomcat.apache.org/tomcat-9.0-doc/logging.html)| -|Apache|TrafficControl| | |Vulnerable| | | |[source](https://blogs.apache.org/security/entry/cve-2021-44228)| +|Apache|Tika|2.0.0 and up| |Vulnerable| | ||[source](https://tika.apache.org/2.0.0/index.html)| +|Apache|Tomcat| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tomcat.apache.org/tomcat-9.0-doc/logging.html)| +|Apache|TrafficControl| | |Vulnerable| | ||[source](https://blogs.apache.org/security/entry/cve-2021-44228)| |Apache|Zookeeper| |Not vuln|Not vuln|Not vuln|Not vuln|Zookeeper uses Log4j 1.2 version|[source](https://issues.apache.org/jira/browse/ZOOKEEPER-4423)| |Apereo|CAS|6.3.x & 6.4.x|Not vuln|Fix| | |Other versions still in active maintainance might need manual inspection|[source](https://apereo.github.io/2021/12/11/log4j-vuln/)| -|Apereo|Opencast|< 9.10, < 10.6|Not vuln|Fix| | | |[source](https://github.com/opencast/opencast/security/advisories/GHSA-mf4f-j588-5xm8)| -|Apigee|Edge and OPDK products|All version|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://status.apigee.com/incidents/3cgzb0q2r10p)| -|Apollo|All| | | | | | |[Apollo Community Link](https://community.apollographql.com/t/log4j-vulnerability/2214)| -|Appdynamics|All| | | | | | |[Appdynamics Advisory Link](https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability)| -|Appeon|PowerBuilder|Appeon PowerBuilder 2017-2021 regardless of product edition| |Vulnerable| | | || -|AppGate|All| | | | | | |[AppGate Blog Post](https://www.appgate.com/blog/appgate-sdp-unaffected-by-log4j-vulnerability)| -|Appian|All| |Not vuln|Fix| | | |[source](https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228)| -|Appian|Platform|All|Not vuln|Fix| | | |"[KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 & CVE-2021-45046)](https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerabilities-cve-2021-44228-cve-2021-45046)"| -|Application Performance Ltd|DBMarlin|Not Affected| | | | | || -|Application Performance Ltd|DBMarlin| |Not vuln|Not vuln|Not vuln|Not vuln| |[Common Vulnerabilities Apache log4j Vulnerability CVE-2021-4428](https://docs.dbmarlin.com/docs/faqs/frequently-asked-questions/?_ga=2.72968147.1563671049.1639624574-1296952804.1639624574#apache-log4j-vulnerability-cve-2021-4428)| -|APPSHEET|All| | | | | | |[APPSHEET Community Link](https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976)| -|Aptible|All|Search 5.x|Not vuln|Fix| | | |[source](https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4)| -|Aqua Security|All| | | | | | |[Aqua Security Google Doc](https://docs.google.com/document/d/e/2PACX-1vSmFR3oHPXOih1wENKd7RXn0dsHzgPUe91jJwDTsaVxJtcJEroktWNLq7BMUx9v7oDZRHqLVgkJnqCm/pub)| -|Arbiter Systems|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Arbiter Systems Advisory Link](https://www.arbiter.com/news/index.php?id=4403)| -|Arca Noae|All| | | | | | |[Arca Noae Link](https://www.arcanoae.com/apache-log4j-vulnerability-cve-2021-44228/)| -|Arcserve|Backup|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|Arcserve|Continuous Availability|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|Arcserve|Email Archiving|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|Arcserve|ShadowProtect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|Arcserve|ShadowXafe|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|Arcserve|Solo|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|Arcserve|StorageCraft OneXafe|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|Arcserve|UDP|6.5-8.3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.storagecraft.com/s/article/Log4J-Update)| -|ArcticWolf|All| | | | | | |[ArcticWolf Blog Post](https://arcticwolf.com/resources/blog/log4j)| -|Arduino|IDE|1.8.17|Not vuln|Fix| | | |[source](https://support.arduino.cc/hc/en-us/articles/4412377144338-Arduino-s-response-to-Log4j2-vulnerability-CVE-2021-44228)| -|Ariba|All| | | | | | |"[Ariba Annoucement](https://connectsupport.ariba.com/sites#announcements-display&/Event/908469)"| -|Arista|All| | | | | | |[Arista Advisory Notice](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| -|Arista Networks|Analytics Node for Converged Cloud Fabric (formerly Big Cloud Fabric)|>7.0.0| |Vulnerable| | | |[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| -|Arista Networks|Analytics Node for DANZ Monitoring Fabric (formerly Big Monitoring Fabric)|>7.0.0| |Vulnerable| | | |[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| -|Arista Networks|CloudVision Portal|>2019.1.0| |Vulnerable| | | |[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| -|Arista Networks|CloudVision Wi-Fi, virtual appliance or physical appliance|>8.8| |Vulnerable| | | |[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| -|Arista Networks|Embedded Analytics for Converged Cloud Fabric (formerly Big Cloud Fabric)|>5.3.0| |Vulnerable| | | |[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| -|Aruba Networks|IntroSpect| versions 2.5.0.0 to 2.5.0.6| |Fix| | | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|AirWave Management Platform| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|Analytics and Location Engine| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|ArubaOS Wi-Fi Controllers and Gateways| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|ArubaOS SD-WAN Gateways| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|ArubasOS-CX Switches| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|ArubasOS-S Switches| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|Central / Central On-Premises| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|ClearPass Policy Manager| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|EdgeConnect| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|Fabric Composer (AFC) and Plexxi Composable Fabrice Manager (CFM)| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|HP ProCurve Switches| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|Instant / Instant Access Points| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|Instant On| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|Legacy GMS products|All|Fix |Fix |Fix | | |[advbisory](https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf)| -|Aruba Networks|Legacy NX, VX, VRX| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|NetEdit| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|Silver Peak Orchestrator|All|Fix |Fix |Fix | | |[advbisory](https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf)| -|Aruba Networks|User Experience Insight (UXI)| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Aruba Networks|VIA Clients| |Not vuln |Not vuln|Not vuln |Not vuln | |[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| -|Ataccama|All| | | | | | |[Ataccama Link](https://www.ataccama.com/files/log4j2-vulnerability-cve-2021-44228-fix.pdf)| -|Atera|All| | | | | | |[Atera Link](https://www.reddit.com/r/atera/comments/rh7xb1/apache_log4j_2_security_advisory_update/)| +|Apereo|Opencast|< 9.10, < 10.6|Not vuln|Fix| | ||[source](https://github.com/opencast/opencast/security/advisories/GHSA-mf4f-j588-5xm8)| +|Apigee|Edge and OPDK products|All version|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://status.apigee.com/incidents/3cgzb0q2r10p)| +|Apollo|All| | | | | ||[Apollo Community Link](https://community.apollographql.com/t/log4j-vulnerability/2214)| +|Appdynamics|All| | | | | ||[Appdynamics Advisory Link](https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability)| +|Appeon|PowerBuilder|Appeon PowerBuilder 2017-2021 regardless of product edition| |Vulnerable| | ||| +|AppGate|All| | | | | ||[AppGate Blog Post](https://www.appgate.com/blog/appgate-sdp-unaffected-by-log4j-vulnerability)| +|Appian|All| |Not vuln|Fix| | ||[source](https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerability-cve-2021-44228)| +|Appian|Platform|All|Not vuln|Fix| | ||[KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 & CVE-2021-45046)](https://community.appian.com/support/w/kb/2511/kb-2204-information-about-the-log4j2-security-vulnerabilities-cve-2021-44228-cve-2021-45046)| +|Application Performance Ltd|DBMarlin|Not Affected| | | | ||| +|Application Performance Ltd|DBMarlin| |Not vuln|Not vuln|Not vuln|Not vuln||[Common Vulnerabilities Apache log4j Vulnerability CVE-2021-4428](https://docs.dbmarlin.com/docs/faqs/frequently-asked-questions/?_ga=2.72968147.1563671049.1639624574-1296952804.1639624574#apache-log4j-vulnerability-cve-2021-4428)| +|APPSHEET|All| | | | | ||[APPSHEET Community Link](https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976)| +|Aptible|All|Search 5.x|Not vuln|Fix| | ||[source](https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4)| +|Aqua Security|All| | | | | ||[Aqua Security Google Doc](https://docs.google.com/document/d/e/2PACX-1vSmFR3oHPXOih1wENKd7RXn0dsHzgPUe91jJwDTsaVxJtcJEroktWNLq7BMUx9v7oDZRHqLVgkJnqCm/pub)| +|Arbiter Systems|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Arbiter Systems Advisory Link](https://www.arbiter.com/news/index.php?id=4403)| +|Arca Noae|All| | | | | ||[Arca Noae Link](https://www.arcanoae.com/apache-log4j-vulnerability-cve-2021-44228/)| +|Arcserve|Backup|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|Arcserve|Continuous Availability|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|Arcserve|Email Archiving|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|Arcserve|ShadowProtect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|Arcserve|ShadowXafe|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|Arcserve|Solo|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|Arcserve|StorageCraft OneXafe|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|Arcserve|UDP|6.5-8.3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.storagecraft.com/s/article/Log4J-Update)| +|ArcticWolf|All| | | | | ||[ArcticWolf Blog Post](https://arcticwolf.com/resources/blog/log4j)| +|Arduino|IDE|1.8.17|Not vuln|Fix| | ||[source](https://support.arduino.cc/hc/en-us/articles/4412377144338-Arduino-s-response-to-Log4j2-vulnerability-CVE-2021-44228)| +|Ariba|All| | | | | ||[Ariba Annoucement](https://connectsupport.ariba.com/sites#announcements-display&/Event/908469)| +|Arista|All| | | | | ||[Arista Advisory Notice](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| +|Arista Networks|Analytics Node for Converged Cloud Fabric (formerly Big Cloud Fabric)|>7.0.0| |Vulnerable| | ||[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| +|Arista Networks|Analytics Node for DANZ Monitoring Fabric (formerly Big Monitoring Fabric)|>7.0.0| |Vulnerable| | ||[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| +|Arista Networks|CloudVision Portal|>2019.1.0| |Vulnerable| | ||[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| +|Arista Networks|CloudVision Wi-Fi, virtual appliance or physical appliance|>8.8| |Vulnerable| | ||[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| +|Arista Networks|Embedded Analytics for Converged Cloud Fabric (formerly Big Cloud Fabric)|>5.3.0| |Vulnerable| | ||[source](https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070)| +|Aruba Networks|IntroSpect|versions 2.5.0.0 to 2.5.0.6| |Fix| | ||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|AirWave Management Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|Analytics and Location Engine| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|ArubaOS Wi-Fi Controllers and Gateways| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|ArubaOS SD-WAN Gateways| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|ArubasOS-CX Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|ArubasOS-S Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|Central / Central On-Premises| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|ClearPass Policy Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|EdgeConnect| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|Fabric Composer (AFC) and Plexxi Composable Fabrice Manager (CFM)| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|HP ProCurve Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|Instant / Instant Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|Instant On| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|Legacy GMS products|All|Fix|Fix|Fix| ||[advbisory](https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf)| +|Aruba Networks|Legacy NX, VX, VRX| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|NetEdit| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|Silver Peak Orchestrator|All|Fix|Fix|Fix| ||[advbisory](https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf)| +|Aruba Networks|User Experience Insight (UXI)| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Aruba Networks|VIA Clients| |Not vuln|Not vuln|Not vuln|Not vuln||[advbisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt)| +|Ataccama|All| | | | | ||[Ataccama Link](https://www.ataccama.com/files/log4j2-vulnerability-cve-2021-44228-fix.pdf)| +|Atera|All| | | | | ||[Atera Link](https://www.reddit.com/r/atera/comments/rh7xb1/apache_log4j_2_security_advisory_update/)| |Atlassian|Bamboo Server & Data Center|On prem| |Vulnerable| | |Only vulnerable when using non-default config, cloud version fixed|[source](https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html)| -|Atlassian|BitBucket Server|On prem|Not vuln|Workaround| | | |[source](https://community.atlassian.com/t5/Bamboo-questions/Re-log4j-zero-day/qaq-p/1886739/comment-id/30819#M30819)| +|Atlassian|BitBucket Server|On prem|Not vuln|Workaround| | ||[source](https://community.atlassian.com/t5/Bamboo-questions/Re-log4j-zero-day/qaq-p/1886739/comment-id/30819#M30819)| |Atlassian|Bitbucket Server & Data Center|All|Not vuln|Fix| | |This product is not vulnerable to remote code execution but may leak information due to the bundled Elasticsearch component being vulnerable.|[Multiple Products Security Advisory - Log4j Vulnerable To Remote Code Execution - CVE-2021-44228](https://confluence.atlassian.com/security/multiple-products-security-advisory-log4j-vulnerable-to-remote-code-execution-cve-2021-44228-1103069934.html)| |Atlassian|Confluence Server & Data Center|On prem| |Vulnerable| | |Only vulnerable when using non-default config, cloud version fixed|[source](https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html)| -|Atlassian|Confluence-CIS CSAT Pro|v1.7.1| |Vulnerable| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| -|Atlassian|Confluence-CIS WorkBench| | |Not vuln| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| -|Atlassian|Confluence-CIS-CAT Lite|v4.13.0| |Vulnerable| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| -|Atlassian|Confluence-CIS-CAT Pro Assessor v3 Full and Dissolvable|v3.0.77| |Vulnerable| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| -|Atlassian|Confluence-CIS-CAT Pro Assessor v4|v4.13.0| |Vulnerable| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| -|Atlassian|Confluence-CIS-CAT Pro Assessor v4 Service|v1.13.0| |Vulnerable| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| -|Atlassian|Confluence-CIS-CAT Pro Dashboard| | |Not vuln| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| -|Atlassian|Confluence-CIS-Hosted CSAT| | |Not vuln| | | |[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS CSAT Pro|v1.7.1| |Vulnerable| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS WorkBench| | |Not vuln| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS-CAT Lite|v4.13.0| |Vulnerable| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS-CAT Pro Assessor v3 Full and Dissolvable|v3.0.77| |Vulnerable| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS-CAT Pro Assessor v4|v4.13.0| |Vulnerable| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS-CAT Pro Assessor v4 Service|v1.13.0| |Vulnerable| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS-CAT Pro Dashboard| | |Not vuln| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| +|Atlassian|Confluence-CIS-Hosted CSAT| | |Not vuln| | ||[source](https://cisecurity.atlassian.net/wiki/spaces/SCFKB/pages/2434301961/CIS+Products+and+Log4j+Vulnerability)| |Atlassian|Crowd Server & Data Center|On prem| |Vulnerable| | |Only vulnerable when using non-default config, cloud version fixed|[source](https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html)| |Atlassian|Crucible|On prem| |Vulnerable| | |Only vulnerable when using non-default config, cloud version fixed|[source](https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html)| |Atlassian|Fisheye|On prem| |Vulnerable| | |Only vulnerable when using non-default config, cloud version fixed|[source](https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html)| |Atlassian|Jira Server & Data Center|On prem| |Vulnerable| | |Only vulnerable when using non-default config, cloud version fixed|[source](https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html)| -|Attivo networks|All| | | | | | |[Attivo Networks Advisory](https://www.attivonetworks.com/wp-content/uploads/2021/12/Log4j_Vulnerability-Advisory-211213-4.pdf)| -|AudioCodes|All| | | | | | |[AudioCodes Link](https://services.audiocodes.com/app/answers/kbdetail/a_id/2225)| -|Autodesk|All| | |Investigation| | | |[source](https://www.autodesk.com/trust/overview)| -|Automation Anywhere|Automation 360 Cloud| |Not vuln|Fix| | | |[source](https://apeople.automationanywhere.com/s/article/A360-Cloud-Zero-day-in-the-Log4j-Java-library)| -|Automation Anywhere|Automation 360 On Premise| |Not vuln|Workaround| | | |[source](https://apeople.automationanywhere.com/s/article/A360-On-Premise-Update-regarding-CVE-2021-44228-related-to-0-day-in-the-Apache-Log4j2-Java-library)| -|Automation Anywhere|Automation Anywhere|11.3.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://apeople.automationanywhere.com/s/article/AA-11-x-Update-regarding-CVE-2021-44228-related-to-0-day-in-the-Apache-Log4j2-Java-library)| -|Automation Anywhere|Automation Anywhere|11.x, <11.3.x|Not vuln|Workaround|Workaround|Workaround| |[source](https://apeople.automationanywhere.com/s/article/AA-11-x-Update-regarding-CVE-2021-44228-related-to-0-day-in-the-Apache-Log4j2-Java-library)| -|Automox|All| | | | | | |[Automox Blog Post](https://blog.automox.com/log4j-critical-vulnerability-scores-a-10)| -|Autopsy|All| | | | | | |[Autopsy Link](https://www.autopsy.com/autopsy-and-log4j-vulnerability/)| -|Auvik|All| | | | | | |[Auvik Status Link](https://status.auvik.com/incidents/58bfngkz69mj)| -|Avantra SYSLINK|All| | | | | | |[Avantra SYSLINK Article](https://support.avantra.com/support/solutions/articles/44002291388-cve-2021-44228-log4j-2-vulnerability)| -|Avaya|All| | | | | | |[source](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Analytics|3.5, 3.6, 3.6.1, 3.7, 4| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Attivo networks|All| | | | | ||[Attivo Networks Advisory](https://www.attivonetworks.com/wp-content/uploads/2021/12/Log4j_Vulnerability-Advisory-211213-4.pdf)| +|AudioCodes|All| | | | | ||[AudioCodes Link](https://services.audiocodes.com/app/answers/kbdetail/a_id/2225)| +|Autodesk|All| | |Investigation| | ||[source](https://www.autodesk.com/trust/overview)| +|Automation Anywhere|Automation 360 Cloud| |Not vuln|Fix| | ||[source](https://apeople.automationanywhere.com/s/article/A360-Cloud-Zero-day-in-the-Log4j-Java-library)| +|Automation Anywhere|Automation 360 On Premise| |Not vuln|Workaround| | ||[source](https://apeople.automationanywhere.com/s/article/A360-On-Premise-Update-regarding-CVE-2021-44228-related-to-0-day-in-the-Apache-Log4j2-Java-library)| +|Automation Anywhere|All|11.3.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://apeople.automationanywhere.com/s/article/AA-11-x-Update-regarding-CVE-2021-44228-related-to-0-day-in-the-Apache-Log4j2-Java-library)| +|Automation Anywhere|All|11.x, <11.3.x|Not vuln|Workaround|Workaround|Workaround||[source](https://apeople.automationanywhere.com/s/article/AA-11-x-Update-regarding-CVE-2021-44228-related-to-0-day-in-the-Apache-Log4j2-Java-library)| +|Automox|All| | | | | ||[Automox Blog Post](https://blog.automox.com/log4j-critical-vulnerability-scores-a-10)| +|Autopsy|All| | | | | ||[Autopsy Link](https://www.autopsy.com/autopsy-and-log4j-vulnerability/)| +|Auvik|All| | | | | ||[Auvik Status Link](https://status.auvik.com/incidents/58bfngkz69mj)| +|Avantra SYSLINK|All| | | | | ||[Avantra SYSLINK Article](https://support.avantra.com/support/solutions/articles/44002291388-cve-2021-44228-log4j-2-vulnerability)| +|Avaya|All| | | | | ||[source](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Analytics|3.5, 3.6, 3.6.1, 3.7, 4| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| |Avaya|Aura for OneCloud Private| | |Vulnerable| | |Avaya is scanning and monitoring its OneCloud Private environments as part of its management activities. Avaya will continue to monitor this fluid situation and remediations will be made as patches become available, in accordance with appropriate change processes.|[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Application Enablement Services|8.1.3.2, 8.1.3.3, 10.1| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Contact Center|7.0.2, 7.0.3, 7.1, 7.1.1, 7.1.2| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Device Services|8.0.1, 8.0.2, 8.1.3| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Device Services|8, 8.1, 8.1.4, 8.1.5| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Media Server|8.0.0, 8.0.1, 8.0.2| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Presence Services|10.1, 7.1.2, 8, 8.0.1, 8.0.2, 8.1, 8.1.1, 8.1.2, 8.1.3, 8.1.4| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Session Manager|10.1, 7.1.3, 8, 8.0.1, 8.1, 8.1.1, 8.1.2, 8.1.3| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® System Manager|10.1, 8.1.3| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Aura® Web Gateway|3.11[P], 3.8.1[P], 3.8[P], 3.9.1 [P], 3.9[P]| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Breeze™|3.7, 3.8, 3.8.1| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Business Rules Engine|3.4, 3.5, 3.6, 3.7| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Callback Assist|5, 5.0.1| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Contact Center Select|7.0.2, 7.0.3, 7.1, 7.1.1, 7.1.2| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Control Manager|9.0.2, 9.0.2.1| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|CRM Connector - Connected Desktop|2.2| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Device Enablement Service|3.1.22| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Device Enrollment Service|3.1| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Equinox™ Conferencing|9.1.2| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Interaction Center|7.3.9| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|IP Office™ Platform|11.0.4, 11.1, 11.1.1, 11.1.2| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Meetings|9.1.10, 9.1.11, 9.1.12| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|one cloud private -UCaaS - Mid Market Aura|1| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|OneCloud-Private|2| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Proactive Outreach Manager|3.1.2, 3.1.3, 4, 4.0.1| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Session Border Controller for Enterprise|8.0.1, 8.1, 8.1.1, 8.1.2, 8.1.3|Not vuln|Fix| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Social Media Hub| | |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|Avaya|Workforce Engagement|5.3| |Vulnerable| | | |[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| -|AVEPOINT|All| | | | | | |[AVEPOINT Notification](https://www.avepoint.com/company/java-zero-day-vulnerability-notification)| -|AVM|All|devices, firmware, software incl. MyFritz Service| |Not vuln| | | |[source](https://en.avm.de/service/current-security-notifications/)| -|AvTech RoomAlert|All| | | | | | |[AvTech RoomAlert Article](https://avtech.com/articles/23124/java-exploit-room-alert-link/)| -|AWS New|All| | | | | | |[AWS New Security Bulletin](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| -|AXIS|OS|All| |Not vuln| | | |[source](https://help.axis.com/axis-os)| -|AXON|All| | | | | | |[AXON Link](https://my.axon.com/s/trust/response-to-log4j2-vuln?language=en_US)| -|AXS Guard|All| | | | | | |[AXS Guard Blog Post](https://www.axsguard.com/en_US/blog/security-news-4/log4j-vulnerability-77)| -|Axways Applications|All| | | | | | |[Axways Applications Link](https://support.axway.com/news/1331/lang/en)| +|Avaya|Aura® Application Enablement Services|8.1.3.2, 8.1.3.3, 10.1| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® Contact Center|7.0.2, 7.0.3, 7.1, 7.1.1, 7.1.2| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® Device Services|8.0.1, 8.0.2, 8.1.3| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® Device Services|8, 8.1, 8.1.4, 8.1.5| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® Media Server|8.0.0, 8.0.1, 8.0.2| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® Presence Services|10.1, 7.1.2, 8, 8.0.1, 8.0.2, 8.1, 8.1.1, 8.1.2, 8.1.3, 8.1.4| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® Session Manager|10.1, 7.1.3, 8, 8.0.1, 8.1, 8.1.1, 8.1.2, 8.1.3| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® System Manager|10.1, 8.1.3| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Aura® Web Gateway|3.11[P], 3.8.1[P], 3.8[P], 3.9.1 [P], 3.9[P]| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Breeze™|3.7, 3.8, 3.8.1| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Business Rules Engine|3.4, 3.5, 3.6, 3.7| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Callback Assist|5, 5.0.1| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Contact Center Select|7.0.2, 7.0.3, 7.1, 7.1.1, 7.1.2| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Control Manager|9.0.2, 9.0.2.1| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|CRM Connector - Connected Desktop|2.2| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Device Enablement Service|3.1.22| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Device Enrollment Service|3.1| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Equinox™ Conferencing|9.1.2| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Interaction Center|7.3.9| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|IP Office™ Platform|11.0.4, 11.1, 11.1.1, 11.1.2| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Meetings|9.1.10, 9.1.11, 9.1.12| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|one cloud private -UCaaS - Mid Market Aura|1| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|OneCloud-Private|2| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Proactive Outreach Manager|3.1.2, 3.1.3, 4, 4.0.1| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Session Border Controller for Enterprise|8.0.1, 8.1, 8.1.1, 8.1.2, 8.1.3|Not vuln|Fix| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Social Media Hub| | |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|Avaya|Workforce Engagement|5.3| |Vulnerable| | ||[Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security](https://support.avaya.com/helpleft/getGenericDetails?detailId=1399839287609)| +|AVEPOINT|All| | | | | ||[AVEPOINT Notification](https://www.avepoint.com/company/java-zero-day-vulnerability-notification)| +|AVM|All|devices, firmware, software incl. MyFritz Service| |Not vuln| | ||[source](https://en.avm.de/service/current-security-notifications/)| +|AvTech RoomAlert|All| | | | | ||[AvTech RoomAlert Article](https://avtech.com/articles/23124/java-exploit-room-alert-link/)| +|AWS New|All| | | | | ||[AWS New Security Bulletin](https://aws.amazon.com/security/security-bulletins/AWS-2021-006/)| +|AXIS|OS|All| |Not vuln| | ||[source](https://help.axis.com/axis-os)| +|AXON|All| | | | | ||[AXON Link](https://my.axon.com/s/trust/response-to-log4j2-vuln?language=en_US)| +|AXS Guard|All| | | | | ||[AXS Guard Blog Post](https://www.axsguard.com/en_US/blog/security-news-4/log4j-vulnerability-77)| +|Axways Applications|All| | | | | ||[Axways Applications Link](https://support.axway.com/news/1331/lang/en)| diff --git a/software/software_list_b.md b/software/software_list_b.md index ec6a26634..c6cf5c616 100644 --- a/software/software_list_b.md +++ b/software/software_list_b.md @@ -7,602 +7,604 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|B. Braun|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory/b-braun-statement-on-Apache_Log4j.html)| -|B&R Industrial Automation|APROL| |Not vuln|Not vuln|Not vuln|Not vuln| |"[B&R Statement](https://www.br-automation.com/downloads_br_productcatalogue/assets/1639507581859-en-original-1.0.pdf)"| +|Best Practical|Request Tracker (RT)| | |Not vuln| | ||[link](https://bestpractical.com/blog/2021/12/request-tracker-rt-and-request-tracker-for-incident-response-rtir-do-not-use-log4j)| +|Best Practical|Request Tracker for Incident Response (RTIR)| | |Not vuln| | ||[link](https://bestpractical.com/blog/2021/12/request-tracker-rt-and-request-tracker-for-incident-response-rtir-do-not-use-log4j)| +|B. Braun|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory/b-braun-statement-on-Apache_Log4j.html)| +|B&R Industrial Automation|APROL| |Not vuln|Not vuln|Not vuln|Not vuln||[B&R Statement](https://www.br-automation.com/downloads_br_productcatalogue/assets/1639507581859-en-original-1.0.pdf)| |Backblaze|Cloud|N/A (SaaS)|Not vuln|Fix| | |Cloud service patched|[source](https://help.backblaze.com/hc/en-us/articles/4412580603419)| -|BackBox|All| | | | | | |[BackBox Update](https://updates.backbox.com/V6.5/Docs/CVE-2021-44228.pdf)| -|Balbix|All| | | | | | |[Balbix Blog Post](https://www.balbix.com/blog/broad-exposure-to-log4shell-cve-2021-44228-highlights-how-the-attack-surface-has-exploded/)| -|Baramundi Products|All| | | | | | |[Baramundi Products Forum](https://forum.baramundi.com/index.php?threads/baramundi-produkte-von-log4shell-schwachstelle-in-log4j-nicht-betroffen.12539/#post-62875)| -|Barco|Demetra| |Investigation|Investigation|Investigation|Investigation| |[source](https://www.barco.com/en/support/knowledge-base/KB12495)| -|Barco|OpSpace|1.8 - 1.9.4.1|Not vuln|Fix|Vulnerable|Vulnerable| |[source](https://www.barco.com/en/support/knowledge-base/KB12493)| -|Barco|Other products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.barco.com/en/support/knowledge-base/KB12495)| -|Barracuda|All| | | | | | |[Barracuda Link](https://www.barracuda.com/company/legal/trust-left)| +|BackBox|All| | | | | ||[BackBox Update](https://updates.backbox.com/V6.5/Docs/CVE-2021-44228.pdf)| +|Balbix|All| | | | | ||[Balbix Blog Post](https://www.balbix.com/blog/broad-exposure-to-log4shell-cve-2021-44228-highlights-how-the-attack-surface-has-exploded/)| +|Baramundi Products|All| | | | | ||[Baramundi Products Forum](https://forum.baramundi.com/index.php?threads/baramundi-produkte-von-log4shell-schwachstelle-in-log4j-nicht-betroffen.12539/#post-62875)| +|Barco|Demetra| |Investigation|Investigation|Investigation|Investigation||[source](https://www.barco.com/en/support/knowledge-base/KB12495)| +|Barco|OpSpace|1.8 - 1.9.4.1|Not vuln|Fix|Vulnerable|Vulnerable||[source](https://www.barco.com/en/support/knowledge-base/KB12493)| +|Barco|Other products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.barco.com/en/support/knowledge-base/KB12495)| +|Barracuda|All| | | | | ||[Barracuda Link](https://www.barracuda.com/company/legal/trust-left)| |Basis Technology|Autopsy|4.18.0 onwards|Not vuln|Workaround| | |version 4.18.0 onwards use Apache Solr 8|[source](https://www.autopsy.com/autopsy-and-log4j-vulnerability)| -|Baxter|All| | | | | | |[Baxter Advisory Link](https://www.baxter.com/sites/g/files/ebysai746/files/2021-12/Apache_Log4j_Vulnerability.pdf)| -|BBraun|APEX® Compounder| |Not vuln|Not vuln|Not vuln|Not vuln| |[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| -|BBraun|DoseTrac® Server, DoseLink™ Server, and Space® Online Suite Server software| |Not vuln|Not vuln|Not vuln|Not vuln| |[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| -|BBraun|Outlook® Safety Infusion System Pump family| |Not vuln|Not vuln|Not vuln|Not vuln| |[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| -|BBraun|Pinnacle® Compounder| |Not vuln|Not vuln|Not vuln|Not vuln| |[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| -|BBraun|Pump, SpaceStation, and Space® Wireless Battery)| |Not vuln|Not vuln|Not vuln|Not vuln| |[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| -|BBraun|Space® Infusion Pump family (Infusomat® Space® Infusion Pump, Perfusor® Space® Infusion| |Not vuln|Not vuln|Not vuln|Not vuln| |[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| -|BCT|BerichtenCentrale (BCE) & Integrations| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| -|BCT|CORSA| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| +|Baxter|All| | | | | ||[Baxter Advisory Link](https://www.baxter.com/sites/g/files/ebysai746/files/2021-12/Apache_Log4j_Vulnerability.pdf)| +|BBraun|APEX® Compounder| |Not vuln|Not vuln|Not vuln|Not vuln||[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| +|BBraun|DoseTrac® Server, DoseLink™ Server, and Space® Online Suite Server software| |Not vuln|Not vuln|Not vuln|Not vuln||[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| +|BBraun|Outlook® Safety Infusion System Pump family| |Not vuln|Not vuln|Not vuln|Not vuln||[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| +|BBraun|Pinnacle® Compounder| |Not vuln|Not vuln|Not vuln|Not vuln||[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| +|BBraun|Pump, SpaceStation, and Space® Wireless Battery)| |Not vuln|Not vuln|Not vuln|Not vuln||[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| +|BBraun|Space® Infusion Pump family (Infusomat® Space® Infusion Pump, Perfusor® Space® Infusion| |Not vuln|Not vuln|Not vuln|Not vuln||[BBraun Advisory Link](https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf)| +|BCT|BerichtenCentrale (BCE) & Integrations| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| +|BCT|CORSA| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| |BCT|e-Invoice|2.10.210|Not vuln|Fix|Fix|Fix|Details are shared on BCT portal.|[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| -|BCT|IDT| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| -|BCT|iGEN| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| +|BCT|IDT| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| +|BCT|iGEN| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| |BCT|LIBER|1.125.3|Not vuln|Fix|Fix|Not vuln|Details are shared on BCT portal.|[source](https://support.bctsoftware.com/hc/nl/articles/4413416591761)| -|BD|® LSR II|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|® Research Cloud|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Accuri™ C6 Plus|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Auto-ID Module Model|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ CC Plus Syringe Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Communications Engine|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ CQI Event Reporter|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Enteral Plus Syringe Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Gateway Workstation|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ GP Plus Guardrails™ Volumetric Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ GP Plus Volumetric Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Guardrails™ Editor|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Infusion Central|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ neXus CC Syringe Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ neXus Editor v5.0|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ neXus GP Volumetric Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ PCA Module Model 8120|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ PK Plus Syringe Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Plus Editor|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Point-of-Care Software|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Point-of-Care Unit (PCU) Model 8015|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Pump Module Model 8100|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Syringe Module Model 8110|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ System Maintenance|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Systems Manager|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ Technical Utility (ATU)|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ TiVA Syringe Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™ VP Plus Guardrails™ Volumetric Pump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Alaris™CCPlusGuardrails™SyringePump|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Arctic Sun™ 5000 Temperature Management System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Arctic Sun™ 6000 Stat Temperature Management System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Arctic Sun™ Analytics| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Assurity Linc™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|BACTEC™ 9050/9120/9240|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|BACTEC™ FX|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|BACTEC™ FX40|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|BACTEC™ MGIT™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Care Coordination Engine (CCE)|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Cato™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|COR™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|CoreLite|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Diabetes Care App Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|EnCor Enspire® Breast Biopsy System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|EnCor Ultra® Breast Biopsy System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|EpiCenter™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACS™ Lyse Wash Assistant|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACS™ Sample Prep Assistant (SPA) III|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACS™ Workflow Manager|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSAria™ Fusion|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSAria™ II|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSAria™ III|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSCanto™ 10-color|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSCanto™ 10-color clinical|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSCanto™ II (w Diva 9.0)|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSCanto™ II clinical|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSCelesta™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSDuet™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSLink™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSLyric™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSMelody™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSPresto™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSVia™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSymphony™ A1|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSymphony™ A3 / A5|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FACSymphony™ S6|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FlowJo™ Portal|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FlowJo™ Software|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FocalPoint™ APPS instrument|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FocalPoint™ APPS workstation|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|FocalPoint™ LLS/SLS/GSRS|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|HD Check system|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|HealthSight™ Clinical Advisor| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|HealthSight™ Data Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|HealthSight™ Diversion Management| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|HealthSight™ Infection Advisor| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|HealthSight™ Inventory Optimization Analytics| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|HealthSight™ Medication Safety| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Influx™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Intelliport™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Intelliport™ Medication Management System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Kiestra™ InoqulA|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Kiestra™ InoqulA+|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Knowledge Portal for Pyxis™ Supply| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Knowledge Portal for Infusion Technologies| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Knowledge Portal for Medication Technologies| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|LSRFortessa™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|LSRFortessa™ X-20|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|MAX™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Phoenix™ 100|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Phoenix™ AP|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Phoenix™ M50|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|PleurX|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Prevue™ II Peripheral Vascular Access System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Probetec™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ Anesthesia Station 4000|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ Anesthesia Station ES|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ CIISafe™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ CUBIE™ System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ ES System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ IV Prep|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ Logistics (Pyxis™ Pharmogistics™)|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ Med Link Queue & Waste|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ MedBank|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ MedStation™ 4000 System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ MedStation™ ES|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ Order Viewer|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ ParAssist|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ PARx™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ PharmoPack™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ ReadyMed|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ SupplyStation™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ Tissue & Implant Management System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Pyxis™ Track and Deliver|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|QUANTAFLO™ Peripheral Arterial Disease Test|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Remote Support Services (RSS)|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Restock Order|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Rhapsody™ Single-Cell Analysis System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Rowa™ - Dose (Windows 10 platform)|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Rowa™ - Dose (Windows 7 Workstations only)|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Rowa™ - ProLog|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Rowa™ - Smart|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Rowa™ - Vmax|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Rowa™ Pouch Packaging Systems|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Sensica™ Urine Output System|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|SeqGeq™ Software|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Sherlock 3CG™ Standalone Tip Confirmation Systems|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Site~Rite Prevue® PICC Ultrasound Systems|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Site~Rite Prevue® Plus Ultrasound Systems|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Site~Rite™ 8 Ultrasound Systems|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Specimen Collection Verification|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Synapsys™ Informatics Solution| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Totalys™ DataLink|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Totalys™ Multiprocessor|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Totalys™ SlidePrep|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Veritor™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Veritor™ COVID At Home Solution Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Viper™ LT|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|BD|Viper™ XTR™|All| |Not vuln|Not vuln| | |[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| -|Beckman Coulter|Blood Bank|PK7300, PK7400| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Chemistry Systems|AU Models (DxC700AU, AU480, AU640, AU680, AU 2700, AU5400, AU5800, AU5800)| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Chemistry Systems|Unicel DxC 600, Unicel DxC 800| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Hematology|Ac•T Family, Ac•T 5diff| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Hematology|DxH 500/520/560, 600, 800, 900, 690T, SMS, SMS II| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Hematology|HmX, HmX AL| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Hematology|LH 500, LH750, LH780, LH785, LH Slidemaker, LH Slidestraine| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Immunoassay Systems|Access 2, Unicel DxI 600, Unicel DxI 800| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|BD|® LSR II|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|® Research Cloud|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Accuri™ C6 Plus|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Auto-ID Module Model|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ CC Plus Syringe Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Communications Engine|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ CQI Event Reporter|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Enteral Plus Syringe Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Gateway Workstation|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ GP Plus Guardrails™ Volumetric Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ GP Plus Volumetric Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Guardrails™ Editor|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Infusion Central|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ neXus CC Syringe Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ neXus Editor v5.0|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ neXus GP Volumetric Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ PCA Module Model 8120|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ PK Plus Syringe Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Plus Editor|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Point-of-Care Software|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Point-of-Care Unit (PCU) Model 8015|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Pump Module Model 8100|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Syringe Module Model 8110|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ System Maintenance|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Systems Manager|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ Technical Utility (ATU)|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ TiVA Syringe Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™ VP Plus Guardrails™ Volumetric Pump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Alaris™CCPlusGuardrails™SyringePump|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Arctic Sun™ 5000 Temperature Management System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Arctic Sun™ 6000 Stat Temperature Management System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Arctic Sun™ Analytics| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Assurity Linc™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|BACTEC™ 9050/9120/9240|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|BACTEC™ FX|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|BACTEC™ FX40|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|BACTEC™ MGIT™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Care Coordination Engine (CCE)|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Cato™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|COR™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|CoreLite|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Diabetes Care App Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|EnCor Enspire® Breast Biopsy System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|EnCor Ultra® Breast Biopsy System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|EpiCenter™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACS™ Lyse Wash Assistant|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACS™ Sample Prep Assistant (SPA) III|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACS™ Workflow Manager|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSAria™ Fusion|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSAria™ II|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSAria™ III|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSCanto™ 10-color|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSCanto™ 10-color clinical|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSCanto™ II (w Diva 9.0)|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSCanto™ II clinical|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSCelesta™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSDuet™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSLink™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSLyric™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSMelody™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSPresto™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSVia™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSymphony™ A1|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSymphony™ A3 / A5|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FACSymphony™ S6|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FlowJo™ Portal|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FlowJo™ Software|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FocalPoint™ APPS instrument|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FocalPoint™ APPS workstation|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|FocalPoint™ LLS/SLS/GSRS|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|HD Check system|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|HealthSight™ Clinical Advisor| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|HealthSight™ Data Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|HealthSight™ Diversion Management| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|HealthSight™ Infection Advisor| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|HealthSight™ Inventory Optimization Analytics| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|HealthSight™ Medication Safety| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Influx™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Intelliport™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Intelliport™ Medication Management System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Kiestra™ InoqulA|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Kiestra™ InoqulA+|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Knowledge Portal for Pyxis™ Supply| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Knowledge Portal for Infusion Technologies| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Knowledge Portal for Medication Technologies| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|LSRFortessa™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|LSRFortessa™ X-20|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|MAX™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Phoenix™ 100|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Phoenix™ AP|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Phoenix™ M50|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|PleurX|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Prevue™ II Peripheral Vascular Access System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Probetec™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ Anesthesia Station 4000|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ Anesthesia Station ES|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ CIISafe™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ CUBIE™ System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ ES System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ IV Prep|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ Logistics (Pyxis™ Pharmogistics™)|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ Med Link Queue & Waste|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ MedBank|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ MedStation™ 4000 System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ MedStation™ ES|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ Order Viewer|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ ParAssist|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ PARx™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ PharmoPack™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ ReadyMed|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ SupplyStation™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ Tissue & Implant Management System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Pyxis™ Track and Deliver|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|QUANTAFLO™ Peripheral Arterial Disease Test|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Remote Support Services (RSS)|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Restock Order|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Rhapsody™ Single-Cell Analysis System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Rowa™ - Dose (Windows 10 platform)|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Rowa™ - Dose (Windows 7 Workstations only)|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Rowa™ - ProLog|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Rowa™ - Smart|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Rowa™ - Vmax|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Rowa™ Pouch Packaging Systems|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Sensica™ Urine Output System|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|SeqGeq™ Software|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Sherlock 3CG™ Standalone Tip Confirmation Systems|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Site~Rite Prevue® PICC Ultrasound Systems|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Site~Rite Prevue® Plus Ultrasound Systems|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Site~Rite™ 8 Ultrasound Systems|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Specimen Collection Verification|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Synapsys™ Informatics Solution| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Totalys™ DataLink|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Totalys™ Multiprocessor|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Totalys™ SlidePrep|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Veritor™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Veritor™ COVID At Home Solution Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[BD Advisory Link](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Viper™ LT|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|BD|Viper™ XTR™|All| |Not vuln|Not vuln| ||[source](https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j)| +|Beckman Coulter|Blood Bank|PK7300, PK7400| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Chemistry Systems|AU Models (DxC700AU, AU480, AU640, AU680, AU 2700, AU5400, AU5800, AU5800)| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Chemistry Systems|Unicel DxC 600, Unicel DxC 800| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Hematology|Ac•T Family, Ac•T 5diff| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Hematology|DxH 500/520/560, 600, 800, 900, 690T, SMS, SMS II| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Hematology|HmX, HmX AL| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Hematology|LH 500, LH750, LH780, LH785, LH Slidemaker, LH Slidestraine| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Immunoassay Systems|Access 2, Unicel DxI 600, Unicel DxI 800| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| |Beckman Coulter|Information Systems|DxONE Insights| |Fix|Fix| |The Log4j patch has been applied.|[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Information Systems|DxONE Inventory Manager| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Information Systems|DxONE Workflow Manager| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Information Systems|PROService, RAP Box| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Information Systems|REMISOL ADVANCE| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Lab Automation|AutoMate 1200, 1250, 2500, 2550| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Lab Automation|DxA 5000, DxA 5000 Fit| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Lab Automation|Ipaw, ISB (Intelligent Sample Banking), Sorting Drive| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Lab Automation|Power Express, Power Processor, Power Link| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Information Systems|DxONE Inventory Manager| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Information Systems|DxONE Workflow Manager| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Information Systems|PROService, RAP Box| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Information Systems|REMISOL ADVANCE| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Lab Automation|AutoMate 1200, 1250, 2500, 2550| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Lab Automation|DxA 5000, DxA 5000 Fit| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Lab Automation|Ipaw, ISB (Intelligent Sample Banking), Sorting Drive| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Lab Automation|Power Express, Power Processor, Power Link| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| |Beckman Coulter|Microbiology|LabPro Workstation and Database Computers| |Workaround|Workaround| |See source for instructions|[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Microbiology|MicroScan autoSCAN-4, HighFlexX Software, WalkAway 40 SI, ,WalkAway 96 SI, WalkAway 40 plus, WalkAway 96 plus, DxM WalkAway 1040 , DxM WalkAway 1096, DxM Autoplak| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Nephelometry|IMMAGE 800| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Urinalysis|DxU (DxUm, DxUc, DxU Workcell)| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beckman Coulter|Urinalysis|iRICELL, iQ Workcell, iChemVELOCITY, iQ200| |Not Vuln|Not Vuln| | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| -|Beijer Electronics|acirro+| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|BFI frequency inverters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|BSD servo drives| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|CloudVPN| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|FnIO-G and M Distributed IO| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|iX Developer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|Nexto modular PLC| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|Nexto Xpress compact controller| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| -|Beijer Electronics|WARP Engineering Studio| |Not vuln|Not vuln|Not vuln|Not vuln| |[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beckman Coulter|Microbiology|MicroScan autoSCAN-4, HighFlexX Software, WalkAway 40 SI, ,WalkAway 96 SI, WalkAway 40 plus, WalkAway 96 plus, DxM WalkAway 1040 , DxM WalkAway 1096, DxM Autoplak| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Nephelometry|IMMAGE 800| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Urinalysis|DxU (DxUm, DxUc, DxU Workcell)| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beckman Coulter|Urinalysis|iRICELL, iQ Workcell, iChemVELOCITY, iQ200| |Not Vuln|Not Vuln| ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|Beijer Electronics|acirro+| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|BFI frequency inverters| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|BSD servo drives| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|CloudVPN| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|FnIO-G and M Distributed IO| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|iX Developer| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|Nexto modular PLC| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|Nexto Xpress compact controller| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| +|Beijer Electronics|WARP Engineering Studio| |Not vuln|Not vuln|Not vuln|Not vuln||[Beijer Electronics Advisory Link](https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell)| |Belden|all Hirschmann networking devices and software tools| | |Not vuln| | |Hirschmann is a brand of Belden|[source](https://hirschmann-support.belden.com/file.php/18672XKMWSCRYGG186719202C5BA4/Hirschmann_Statement_Log4j_Vulnerability_Dec2021.pdf)| -|Bender|All| | | | | | |[Bender Link](https://www.bender.de/en/cert)| -|Bender GmbH und Co. KG|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.bender.de/en/cert)| -|Best Practical Request Tracker (RT) and Request Tracker for Incident Response (RTIR)|All| | | | | | |[Vendor Link](https://bestpractical.com/blog/2021/12/request-tracker-rt-and-request-tracker-for-incident-response-rtir-do-not-use-log4j)| -|BeyondTrust|Privilege Management Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542)| -|BeyondTrust|Privilege Management Reporting| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542)| -|BeyondTrust|Privilege Management Reporting in BeyondInsight|21.2|Not vuln|Fix| | | |[Security Advisory – Apache Log4j2 CVE 2021-44228 (Log4Shell)](https://www.beyondtrust.com/blog/entry/security-advisory-apache-log4j2-cve-2021-44228-log4shell)| -|BeyondTrust|Secure Remote Access appliances| |Not vuln|Not vuln|Not vuln|Not vuln| |[Security Advisory – Apache Log4j2 CVE 2021-44228 (Log4Shell)](https://www.beyondtrust.com/blog/entry/security-advisory-apache-log4j2-cve-2021-44228-log4shell)| -|BeyondTrust Bomgar|All| | | | | | |[BeyondTrust Bomgar Link](https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542)| -|BigBlueButton|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/bigbluebutton/bigbluebutton/issues/13897)| -|BioJava|Java library for processing biological data|6.0.3|Not vuln|Fix|Fix|Fix| |[source](https://github.com/biojava/biojava/releases/tag/biojava-6.0.4)| -|BioMerieux|All| | |Investigation| | | |[BioMerieux Advisory Link](https://www.biomerieux.com/en/cybersecurity-data-privacy)| -|BisectHosting|All| | | | | | |[BisectHosting Link](https://www.bisecthosting.com/clients/index.php?rp=/knowledgebase/205/Java-Log4j-Vulnerability.html)| -|Bitdefender|GravityZone On-Premises| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability)| -|Bitnami|All| |Not vuln|Fix| | | |[source](https://docs.bitnami.com/general/security/security-2021-12-10/)| -|BitNami By VMware|All| | | | | | |[BitNami By VMware](https://docs.bitnami.com/general/security/security-2021-12-10/)| -|BitRise|All| | | | | | |[BitRise Post](https://blog.bitrise.io/post/bitrises-response-to-log4j-vulnerability-cve-2021-44228)| -|Bitwarden|All|All| |Not vuln| | | |[source](https://community.bitwarden.com/t/log4j-log4shell-cve-is-bitwarden-affected-due-to-docker-image/36177)| -|Biztory|Fivetran| |Not vuln|Not vuln|Not vuln|Not vuln| |[Apache Log4j2 Vulnerability - Updates For Biztory Clients](https://www.biztory.com/blog/apache-log4j2-vulnerability)| -|Black Kite|All| | | | | | |[Black Kite Link](https://blackkite.com/log4j-rce-vulnerability-log4shell-puts-millions-at-risk/)| -|BlackBerry| 2FA|All|Not vuln|Workaround| | | |[source](https://support.blackberry.com/community/s/article/90708)| -|BlackBerry|Enterprise Mobility Server|2.12 and above|Not vuln|Workaround| | | |[source](https://support.blackberry.com/community/s/article/90708)| -|BlackBerry|Workspaces On-prem Server|All|Not vuln|Workaround| | | |[source](https://support.blackberry.com/community/s/article/90708)| -|Blancco|All| | | | | | |[Blancco Support Link](https://support.blancco.com/display/NEWS/2021/12/12/CVE-2021-44228+-+Critical+vulnerability+in+Apache+Log4j+library)| -|BleftSign|All| | | | | | |[BleftSign Link](https://bleftsign.atlassian.net/wiki/spaces/DOC/pages/370679198/Security+Statement+Log4J+Meltdown+and+Spectre+Vulnerabilities#SecurityStatement%3ALog4J%2CMeltdownandSpectreVulnerabilities-JavaApacheLog4j)| -|Bluemind| All|3.5.x and 4.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://twitter.com/bluemind/status/1470379923034578946?s=20)| -|Blumira|All| | | | | | |[Blumira Link](https://www.blumira.com/cve-2021-44228-log4shell/)| -|BMC|3270 SUPEROPTIMIZER/CI|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|3270 SUPEROPTIMIZER/CICS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Apptune for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Backup and Recovery for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Batch Optimizer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Capacity Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Catalog Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Catalog Manager for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Change Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Change Manager for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Change Manager for IMS for DBCTL|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Change Manager for IMS TM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Change Manager Virtual Terminal for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Check for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Command Center for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Command Center for Security|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Console management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Copy for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Cost Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Data Packer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Database Administration for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Database Advisor for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Database Integrity for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Database Performance for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Datastream for Ops|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for McAfee DAM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for Ops Insight|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for z/Linux|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for z/OS GSIP Package|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender for z/VM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Defender TCP/IP Receiver|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI DevOps for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Energizer for IMS Connect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Enterprise Connector|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Extended Terminal Assist for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Fast Path Indexer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Fast Path Online Analyzer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Fast Path Online Image Copy for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Fast Path Online Reorg for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Fast Path Online Restructure for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Fast Path Recovery for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Fast Path Restart for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Large Object Management for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Load for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI LOBMaster for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Log Analyzer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Log Master for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Message Advisor for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Online Reorg for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|AMI Ops Automation|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Automation for Capping|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Common Rest API (CRA)|2.0|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops for Networks|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Infrastructure (MVI) - CRA|7.0|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Insight|1.0|Not vuln|Vulnerable|Vulnerable|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Insight|1.2|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for CICS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for CMF|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for IMS Offline|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for IMS Online|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for IP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for JE|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for MQ|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for USS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for WAS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops Monitor SYSPROG Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Ops UI|1.1|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Partitioned Database Facility for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Pointer Checker for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Pool Advisor for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Products| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|AMI Recover for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Recovery for VSAM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Recovery Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Reorg For Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Reorg for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Security Administrator|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Security Policy Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Security Privileged Access Manager (also called BMC AMI Security Breakglass)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Security Privileged Access Manager (BMC AMI Security Breakglass)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Security Self Service Password Reset|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI SQL Explorer for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI SQL Performance for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Stats for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Storage|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Unload for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Utilities for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Utility Management for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AMI Utility Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Application Accelerator for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Application Restart Control for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Application Restart Control for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Application Restart Control for VSAM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|AR System|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Bladelogic Database Automation|20.19.01, 20.19.02, 20.19.03, 20.20.01 20.20.02|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Bladelogic Database Automation|8.9.03|Not vuln|Vulnerable|Vulnerable|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Change Accumulation Plus|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Check Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Client Gateway (Kaazing)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Client Management|21.02.00, 21.02.01, 21.02.02|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Cloud Lifecycle Management| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|CMDB|All|Investigation|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Compuware Abend-Aid|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Application Audit|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware DevEnterprise|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Enterprise Common Components (ECC)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Enterprise Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Enterprise Services (CES)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware File-AID Data Privacy|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware File-AID Data Solutions|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware File-AID for DB2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware File-AID for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware File-AID/MVS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware File-AID/RDX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Hiperstation ALL Product Offerings|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware ISPW|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware iStrobe|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Program Analyzer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Storage Backup and Recovery|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Storage Migration|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Storage Performance|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Strobe|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware ThruPut Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Topaz Connect (including NXPromote)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Topaz Enterprise Data|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Topaz for Java Performance|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Topaz for Total Test|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Topaz Program Analysis|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Topaz Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Xpediter/CICS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Xpediter/Code Coverage|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Xpediter/TSO and IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware Xpediter/Xchange|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Compuware zAdviser|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Concurrent Reorg Facility|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Conditional Image Copy|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|Bender|All| | | | | ||[Bender Link](https://www.bender.de/en/cert)| +|Bender GmbH und Co. KG|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.bender.de/en/cert)| +|Best Practical Request Tracker (RT) and Request Tracker for Incident Response (RTIR)|All| | | | | ||[Vendor Link](https://bestpractical.com/blog/2021/12/request-tracker-rt-and-request-tracker-for-incident-response-rtir-do-not-use-log4j)| +|BeyondTrust|Privilege Management Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542)| +|BeyondTrust|Privilege Management Reporting| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542)| +|BeyondTrust|Privilege Management Reporting in BeyondInsight|21.2|Not vuln|Fix| | ||[Security Advisory – Apache Log4j2 CVE 2021-44228 (Log4Shell)](https://www.beyondtrust.com/blog/entry/security-advisory-apache-log4j2-cve-2021-44228-log4shell)| +|BeyondTrust|Secure Remote Access appliances| |Not vuln|Not vuln|Not vuln|Not vuln||[Security Advisory – Apache Log4j2 CVE 2021-44228 (Log4Shell)](https://www.beyondtrust.com/blog/entry/security-advisory-apache-log4j2-cve-2021-44228-log4shell)| +|BeyondTrust Bomgar|All| | | | | ||[BeyondTrust Bomgar Link](https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542)| +|BigBlueButton|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/bigbluebutton/bigbluebutton/issues/13897)| +|BioJava|Java library for processing biological data|6.0.3|Not vuln|Fix|Fix|Fix||[source](https://github.com/biojava/biojava/releases/tag/biojava-6.0.4)| +|BioMerieux|All| | |Investigation| | ||[BioMerieux Advisory Link](https://www.biomerieux.com/en/cybersecurity-data-privacy)| +|BisectHosting|All| | | | | ||[BisectHosting Link](https://www.bisecthosting.com/clients/index.php?rp=/knowledgebase/205/Java-Log4j-Vulnerability.html)| +|Bitdefender|GravityZone On-Premises| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability)| +|Bitnami|All| |Not vuln|Fix| | ||[source](https://docs.bitnami.com/general/security/security-2021-12-10/)| +|BitNami By VMware|All| | | | | ||[BitNami By VMware](https://docs.bitnami.com/general/security/security-2021-12-10/)| +|BitRise|All| | | | | ||[BitRise Post](https://blog.bitrise.io/post/bitrises-response-to-log4j-vulnerability-cve-2021-44228)| +|Bitwarden|All|All| |Not vuln| | ||[source](https://community.bitwarden.com/t/log4j-log4shell-cve-is-bitwarden-affected-due-to-docker-image/36177)| +|Biztory|Fivetran| |Not vuln|Not vuln|Not vuln|Not vuln||[Apache Log4j2 Vulnerability - Updates For Biztory Clients](https://www.biztory.com/blog/apache-log4j2-vulnerability)| +|Black Kite|All| | | | | ||[Black Kite Link](https://blackkite.com/log4j-rce-vulnerability-log4shell-puts-millions-at-risk/)| +|BlackBerry| 2FA|All|Not vuln|Workaround| | ||[source](https://support.blackberry.com/community/s/article/90708)| +|BlackBerry|Enterprise Mobility Server|2.12 and above|Not vuln|Workaround| | ||[source](https://support.blackberry.com/community/s/article/90708)| +|BlackBerry|Workspaces On-prem Server|All|Not vuln|Workaround| | ||[source](https://support.blackberry.com/community/s/article/90708)| +|Blancco|All| | | | | ||[Blancco Support Link](https://support.blancco.com/display/NEWS/2021/12/12/CVE-2021-44228+-+Critical+vulnerability+in+Apache+Log4j+library)| +|BleftSign|All| | | | | ||[BleftSign Link](https://bleftsign.atlassian.net/wiki/spaces/DOC/pages/370679198/Security+Statement+Log4J+Meltdown+and+Spectre+Vulnerabilities#SecurityStatement%3ALog4J%2CMeltdownandSpectreVulnerabilities-JavaApacheLog4j)| +|Bluemind| All|3.5.x and 4.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://twitter.com/bluemind/status/1470379923034578946?s=20)| +|Blumira|All| | | | | ||[Blumira Link](https://www.blumira.com/cve-2021-44228-log4shell/)| +|BMC|3270 SUPEROPTIMIZER/CI|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|3270 SUPEROPTIMIZER/CICS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Apptune for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Backup and Recovery for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Batch Optimizer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Capacity Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Catalog Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Catalog Manager for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Change Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Change Manager for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Change Manager for IMS for DBCTL|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Change Manager for IMS TM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Change Manager Virtual Terminal for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Check for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Command Center for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Command Center for Security|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Console management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Copy for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Cost Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Data Packer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Database Administration for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Database Advisor for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Database Integrity for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Database Performance for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Datastream for Ops|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for McAfee DAM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for Ops Insight|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for z/Linux|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for z/OS GSIP Package|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender for z/VM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Defender TCP/IP Receiver|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI DevOps for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Energizer for IMS Connect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Enterprise Connector|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Extended Terminal Assist for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Fast Path Indexer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Fast Path Online Analyzer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Fast Path Online Image Copy for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Fast Path Online Reorg for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Fast Path Online Restructure for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Fast Path Recovery for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Fast Path Restart for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Large Object Management for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Load for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI LOBMaster for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Log Analyzer for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Log Master for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Message Advisor for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Online Reorg for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|AMI Ops Automation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Automation for Capping|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Common Rest API (CRA)|2.0|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops for Networks|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Infrastructure (MVI) - CRA|7.0|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Insight|1.0|Not vuln|Vulnerable|Vulnerable|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Insight|1.2|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for CICS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for CMF|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for IMS Offline|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for IMS Online|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for IP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for JE|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for MQ|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for USS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for WAS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops Monitor SYSPROG Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Ops UI|1.1|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Partitioned Database Facility for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Pointer Checker for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Pool Advisor for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Products| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|AMI Recover for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Recovery for VSAM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Recovery Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Reorg For Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Reorg for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Security Administrator|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Security Policy Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Security Privileged Access Manager (also called BMC AMI Security Breakglass)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Security Privileged Access Manager (BMC AMI Security Breakglass)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Security Self Service Password Reset|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI SQL Explorer for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI SQL Performance for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Stats for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Storage|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Unload for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Utilities for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Utility Management for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AMI Utility Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Application Accelerator for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Application Restart Control for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Application Restart Control for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Application Restart Control for VSAM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|AR System|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Bladelogic Database Automation|20.19.01, 20.19.02, 20.19.03, 20.20.01 20.20.02|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Bladelogic Database Automation|8.9.03|Not vuln|Vulnerable|Vulnerable|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Change Accumulation Plus|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Check Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Client Gateway (Kaazing)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Client Management|21.02.00, 21.02.01, 21.02.02|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Cloud Lifecycle Management| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|CMDB|All|Investigation|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Compuware Abend-Aid|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Application Audit|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware DevEnterprise|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Enterprise Common Components (ECC)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Enterprise Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Enterprise Services (CES)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware File-AID Data Privacy|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware File-AID Data Solutions|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware File-AID for DB2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware File-AID for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware File-AID/MVS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware File-AID/RDX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Hiperstation ALL Product Offerings|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware ISPW|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware iStrobe|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Program Analyzer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Storage Backup and Recovery|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Storage Migration|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Storage Performance|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Strobe|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware ThruPut Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Topaz Connect (including NXPromote)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Topaz Enterprise Data|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Topaz for Java Performance|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Topaz for Total Test|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Topaz Program Analysis|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Topaz Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Xpediter/CICS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Xpediter/Code Coverage|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Xpediter/TSO and IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware Xpediter/Xchange|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Compuware zAdviser|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Concurrent Reorg Facility|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Conditional Image Copy|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| |BMC|Control-M|9.0.18.x, 9.0.19.x, 9.0.20.x|Not vuln|Workaround|Workaround|Investigation|ETA Dec 30, 2021|[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|COPE for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|DASD Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|DASD Manager Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Data Accelerator Compression|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Db2 Plus Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender Agent Configuration Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender Agent for SAP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender Agent for Unix/Linux|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender Agent for Windows|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender App for Splunk|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender SIEM Correlation Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender SIEM for Motorola|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender SIEM for NNT|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender SyslogDefender|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Defender Windows Agent for Splunk|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Delta IMS DB/DC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Delta IMS Virtual Terminal|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Discovery|12.0.x, 20.08.x, 21.05.x, 21.3.x|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Discovery for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|ExceptionReporter|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Extended Buffer Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Fast Path Analyzer/EP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Fast Path Reorg/EP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Fast Reorg Facility|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Fast Reorg Facility/EP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FASTCPK|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FATSCOPY|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDR|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDR/UPSTREAM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDRABR|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDRERASE|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDRMOVE|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDRPAS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDRPASVM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|FDRREORG|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Footprints|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Automation Console| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Business Workflows|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Client Management| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Cloud Cost| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Cloud Security| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix CMDB| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Continuous Optimization| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Continuous Optimization – Agents|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Continuous Optimization (REE)|21.3.x|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Control-M| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| +|BMC|COPE for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|DASD Manager for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|DASD Manager Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Data Accelerator Compression|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Db2 Plus Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender Agent Configuration Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender Agent for SAP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender Agent for Unix/Linux|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender Agent for Windows|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender App for Splunk|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender SIEM Correlation Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender SIEM for Motorola|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender SIEM for NNT|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender SyslogDefender|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Defender Windows Agent for Splunk|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Delta IMS DB/DC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Delta IMS Virtual Terminal|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Discovery|12.0.x, 20.08.x, 21.05.x, 21.3.x|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Discovery for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|ExceptionReporter|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Extended Buffer Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Fast Path Analyzer/EP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Fast Path Reorg/EP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Fast Reorg Facility|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Fast Reorg Facility/EP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FASTCPK|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FATSCOPY|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDR|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDR/UPSTREAM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDRABR|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDRERASE|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDRMOVE|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDRPAS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDRPASVM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|FDRREORG|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Footprints|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Automation Console| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Business Workflows|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Client Management| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Cloud Cost| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Cloud Security| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix CMDB| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Continuous Optimization| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Continuous Optimization – Agents|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Continuous Optimization (REE)|21.3.x|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Control-M| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| |BMC|Helix Data Manager|2.7, 21.05, 21.3.x|Not vuln|Vulnerable|Vulnerable|Investigation|ETA Dec 21, 2021|[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Digital Workplace| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Discovery|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Discovery Outpost|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix ITSM|< 21.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Digital Workplace| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Discovery|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Discovery Outpost|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix ITSM|< 21.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| |BMC|Helix ITSM|21.x|Not vuln|Vulnerable|Vulnerable|Investigation|ETA Dec 23, 2021|[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Knowledge Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix Operations Management with AIOps| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Platform|All|Not vuln|Vulnerable|Vulnerable|Vulnerable| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Helix platform| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Remediate| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Remedyforce| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|Helix Virtual Agent| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|IAM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Image Copy Plus|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|ITSM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|License Usage Collection Utility|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|LOADPLUS for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|LOADPLUS for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|LOADPLUS/EP for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Local Copy Plus|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MainView Explorer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MainView Middleware Administrator|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MainView Middleware Monitor|9.1|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MainView Transaction Analyzer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MainView Vistapoint & Energizer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MAXM Reorg for IMS with Online/Defrag Feature|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MAXM Reorg/EP for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|MAXM Reorg/EP for IMS with Online/Defrag Feature|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Mid-Tier|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Next Generation Logger (NGL)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Opertune for DB2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Knowledge Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix Operations Management with AIOps| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Platform|All|Not vuln|Vulnerable|Vulnerable|Vulnerable||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Helix platform| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Remediate| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Remedyforce| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|Helix Virtual Agent| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|IAM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Image Copy Plus|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|ITSM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|License Usage Collection Utility|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|LOADPLUS for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|LOADPLUS for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|LOADPLUS/EP for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Local Copy Plus|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MainView Explorer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MainView Middleware Administrator|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MainView Middleware Monitor|9.1|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MainView Transaction Analyzer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MainView Vistapoint & Energizer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MAXM Reorg for IMS with Online/Defrag Feature|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MAXM Reorg/EP for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|MAXM Reorg/EP for IMS with Online/Defrag Feature|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Mid-Tier|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Next Generation Logger (NGL)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Opertune for DB2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| |BMC|Partner KMs Hardware Sentry Open Telemetry Collector|1.0|Not vuln|Workaround|Workaround|Investigation|ETA Dec 22, 2021|[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| |BMC|Partner KMs Storage All-in-One ETL for BMC TrueSight Capacity Optimization|1.6|Not vuln|Workaround|Workaround|Investigation|ETA Dec 22, 2021|[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| |BMC|Partner KMs Storage Analyzer KM for PATROL|1.2|Not vuln|Workaround|Workaround|Investigation|ETA Dec 22, 2021|[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|PATROL Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|PATROL Agent (TSOM & BHOM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Patrol for Linux KM|20.05.01|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Patrol for Sybase|20.02.02|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|PATROL Knowledge Modules - PATROL KM (except Sybase and Linux)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Plus Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Prefix Resolution Plus|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Prefix Update for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Recovery Advisor for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Recovery Manager for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Recovery Plus for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Release Package and Deployment|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Release Process Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Remedy ITSM (IT Service Management)| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| +|BMC|PATROL Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|PATROL Agent (TSOM & BHOM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Patrol for Linux KM|20.05.01|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Patrol for Sybase|20.02.02|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|PATROL Knowledge Modules - PATROL KM (except Sybase and Linux)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Plus Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Prefix Resolution Plus|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Prefix Update for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Recovery Advisor for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Recovery Manager for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Recovery Plus for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Release Package and Deployment|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Release Process Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Remedy ITSM (IT Service Management)| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| |BMC|Remedy Smart Reporting|20.02.x, 20.08.x, 21.05.x, 21.3.x|Not vuln|Vulnerable|Vulnerable|Investigation|ETA Dec 21, 2021|[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Reorg Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Resident Security Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|RSSO Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|RSSO Auth Proxy|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|RSSO DataTransfer tool|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|RSSO Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Runtime Component System (RTCS)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Secondary Index Utility|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Secondary Index Utility/EP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|SLM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|SmartIT|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Snapshot Upgrade Feature|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|SRM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Track-It!|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Automation Console|19.1|Not vuln|Vulnerable|Vulnerable|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Automation Console|20.02, 20.02.01, 20.08.00, 20.08.01, 21.02.00, 21.02.01, 21.3|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Automation for Networks|20.02.00, 20.02.01, 20.02.02, 20.02.03, 21.08.00|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Automation for Servers| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|TrueSight Automation for Servers - Data Warehouse|20.02.01, 21.02, 21.3.00|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Capacity Optimization|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Capacity Optimization - Agents|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Infrastructure Management| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|TrueSight Operations Management| | |Investigation| | | |"[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)"| -|BMC|TrueSight Operations Management Reporting|11.3.02|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Operations Management: App Visibility Manager|11.3.03|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Operations Management: Infrastructure Management|11.3.05|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Operations Management: IT Data Analytics|11.3.02|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Operations Management: Presentation Server|11.3.02,11.3.03 , 11.3.04, 11.3.05|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Orchestration|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Server Automation|20.02.01, 21.02, 21.02.01, 21.3.00|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Smart Reporting|11.3.02|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TrueSight Smart Reporting Platform|20.02.02|Not vuln|Workaround|Workaround|Investigation| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|TSCO For Mainframes|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|ULTRAOPT/CICS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|ULTRAOPT/IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|Unload Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|UNLOAD PLUS for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|UNLOAD PLUS/EP for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|User Interface Middleware (UIM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|UXF for IMS (non product)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|VSAM Optimization|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|BMC|zDetect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| -|Bosch|Bosch IoT suite| | |Not vuln| | | |[source](https://bosch-iot-suite.com/news/apache-log4j-rce-vulnerability/)| -|Bosch Rexroth|Bosch IoT gateway|3.7.0|Fix|Fix|Fix|Fix| |[source](https://psirt.bosch.com/security-advisories/bosch-sa-572602.html)| -|Bosch Security Systems|PRAESENSA PRA-APAS|1.0.32| |Fix| | | |[source](https://media.boschsecurity.com/fs/media/pb/security_advisories/BOSCH-SA-993110-BT.pdf)| -|Bosch Security Systems|Other products| | |Not vuln| | | |[source](https://www.boschsecurity.com/xc/en/support/product-security/)| -|Boston Scientific|Heart Connect Tablet|3933| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LATITUDE Clarity™|7260| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LATITUDE Consult™|6297| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|BMC|Reorg Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Resident Security Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|RSSO Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|RSSO Auth Proxy|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|RSSO DataTransfer tool|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|RSSO Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Runtime Component System (RTCS)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Secondary Index Utility|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Secondary Index Utility/EP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|SLM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|SmartIT|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Snapshot Upgrade Feature|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|SRM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Track-It!|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Automation Console|19.1|Not vuln|Vulnerable|Vulnerable|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Automation Console|20.02, 20.02.01, 20.08.00, 20.08.01, 21.02.00, 21.02.01, 21.3|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Automation for Networks|20.02.00, 20.02.01, 20.02.02, 20.02.03, 21.08.00|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Automation for Servers| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|TrueSight Automation for Servers - Data Warehouse|20.02.01, 21.02, 21.3.00|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Capacity Optimization|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Capacity Optimization - Agents|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Infrastructure Management| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|TrueSight Operations Management| | |Investigation| | ||[BMC Security Advisory for CVE-2021-44228 Log4Shell Vulnerability - Blogs & Documents - BMC Community](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability)| +|BMC|TrueSight Operations Management Reporting|11.3.02|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Operations Management: App Visibility Manager|11.3.03|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Operations Management: Infrastructure Management|11.3.05|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Operations Management: IT Data Analytics|11.3.02|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Operations Management: Presentation Server|11.3.02,11.3.03 , 11.3.04, 11.3.05|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Orchestration|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Server Automation|20.02.01, 21.02, 21.02.01, 21.3.00|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Smart Reporting|11.3.02|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TrueSight Smart Reporting Platform|20.02.02|Not vuln|Workaround|Workaround|Investigation||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|TSCO For Mainframes|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|ULTRAOPT/CICS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|ULTRAOPT/IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|Unload Plus for Db2|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|UNLOAD PLUS for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|UNLOAD PLUS/EP for IMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|User Interface Middleware (UIM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|UXF for IMS (non product)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|VSAM Optimization|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|BMC|zDetect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-cve202145046-log4shell-vulnerability)| +|Bosch|IoT suite| | |Not vuln| | ||[source](https://bosch-iot-suite.com/news/apache-log4j-rce-vulnerability/)| +|Bosch Rexroth|Bosch IoT gateway|3.7.0|Fix|Fix|Fix|Fix||[source](https://psirt.bosch.com/security-advisories/bosch-sa-572602.html)| +|Bosch Security Systems|PRAESENSA PRA-APAS|1.0.32| |Fix| | ||[source](https://media.boschsecurity.com/fs/media/pb/security_advisories/BOSCH-SA-993110-BT.pdf)| +|Bosch Security Systems|Other products| | |Not vuln| | ||[source](https://www.boschsecurity.com/xc/en/support/product-security/)| +|Boston Scientific|Heart Connect Tablet|3933| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|LATITUDE Clarity™|7260| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|LATITUDE Consult™|6297| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| |Boston Scientific|LATITUDE Link™|6215|Not vuln|Workaround| | |Customer action needed to secure customer system.|[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LATITUDE™ Classic|6488| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LATITUDE™ Communicators|6280, 6288, 6290, 6299, 6420, 6443, 6468, 6476, 6496, 6498| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LATITUDE™ EMR Secure Courier Client|6455, 6624| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LATITUDE™ NXT|6446, 6447, 6448, 6449, 6460| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LATITUDE™ Programmer & Apps|3300| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|LUX-Dx™ Clinic Assistant App|2935, 6256| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|MyLATITUDE™ Patient App| | |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|myLUX™ Patient App|2925, 6259| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Boston Scientific|ZOOM™ Programmer & Apps|3120| |Not vuln| | | |[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| -|Box|All| | | | | | |[Box Blog Post](https://blog.box.com/boxs-statement-recent-log4j-vulnerability-cve-2021-44228)| -|Brainworks|All| | | | | | |[Brainworks Link](https://www.brainworks.de/log4j-exploit-kerio-connect-workaround/)| -|Brian Pangburn|SwingSet|< 4.0.6|Not vuln|Fix| | | |[source](https://github.com/bpangburn/swingset/releases/tag/swingset-4.0.6)| -|Broadcom|Advanced Secure Gateway (ASG)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Automic Automation| | | | | | |[Broadcome Automic Automation Link](https://knowledge.broadcom.com/external/article?articleId=230308)| -|Broadcom|BCAAA| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|CA Advanced Authentication|9.1 & 9.1.01 & 9.1.02|Not vuln|Workaround| | | |[source](https://knowledge.broadcom.com/external/article?articleId=230301)| -|Broadcom|CA Risk Authentication| | |Vulnerable| | | || -|Broadcom|CA Strong Authentication| | |Vulnerable| | | || +|Boston Scientific|LATITUDE™ Classic|6488| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|LATITUDE™ Communicators|6280, 6288, 6290, 6299, 6420, 6443, 6468, 6476, 6496, 6498| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|LATITUDE™ EMR Secure Courier Client|6455, 6624| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|LATITUDE™ NXT|6446, 6447, 6448, 6449, 6460| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|LATITUDE™ Programmer & Apps|3300| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|LUX-Dx™ Clinic Assistant App|2935, 6256| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|MyLATITUDE™ Patient App| | |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|myLUX™ Patient App|2925, 6259| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Boston Scientific|ZOOM™ Programmer & Apps|3120| |Not vuln| | ||[source](https://www.bostonscientific.com/en-US/customer-service/product-security/product-security-information.html)| +|Box|All| | | | | ||[Box Blog Post](https://blog.box.com/boxs-statement-recent-log4j-vulnerability-cve-2021-44228)| +|Brainworks|All| | | | | ||[Brainworks Link](https://www.brainworks.de/log4j-exploit-kerio-connect-workaround/)| +|Brian Pangburn|SwingSet|< 4.0.6|Not vuln|Fix| | ||[source](https://github.com/bpangburn/swingset/releases/tag/swingset-4.0.6)| +|Broadcom|Advanced Secure Gateway (ASG)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Automic Automation| | | | | ||[Broadcome Automic Automation Link](https://knowledge.broadcom.com/external/article?articleId=230308)| +|Broadcom|BCAAA| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|CA Advanced Authentication|9.1 & 9.1.01 & 9.1.02|Not vuln|Workaround| | ||[source](https://knowledge.broadcom.com/external/article?articleId=230301)| +|Broadcom|CA Risk Authentication| | |Vulnerable| | ||| +|Broadcom|CA Strong Authentication| | |Vulnerable| | ||| |Broadcom|Cloud Workload Assurance (CWA)| | |Fix|Fix| |The complete remediation was deployed on Dec 23.|[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| |Broadcom|Cloud Workload Protection (CWP)| | |Fix|Fix| |The complete remediation was deployed on Dec 23.|[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| |Broadcom|Cloud Workload Protection for Storage (CWP:S)| | |Fix|Fix| |The complete remediation was deployed on Dec 23.|[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| -|Broadcom|CloudSOC Cloud Access Security Broker (CASB)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Content Analysis (CA)| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Content Analysis (CA)(SEPM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Critical System Protection (CSP)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Data Center Security (DCS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Data Loss Prevention (DLP)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|CloudSOC Cloud Access Security Broker (CASB)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Content Analysis (CA)| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Content Analysis (CA)(SEPM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Critical System Protection (CSP)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Data Center Security (DCS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Data Loss Prevention (DLP)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| |Broadcom|Email Security Service (ESS)| |Not vuln|Fix| | |An initial remediation was deployed on Dec 13. Further investigation showed that the initial remediation is no longer considered sufficient. The complete remediation was deployed on Dec 17|[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Ghost Solution Suite (GSS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|HSM Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Ghost Solution Suite (GSS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|HSM Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| |Broadcom|Industrial Control System Protection (ICSP)| |Not vuln|Not vuln|Fix|Not vuln|Further investigation showed that the initial remediation is no longer considered sufficient. The complete remediation was deployed on Dec 21.|[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| -|Broadcom|Information Centric Analytics (ICA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Information Centric Tagging (ICT)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Integrated Cyber Defense Exchange (ICDx)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Integrated Cyber Defense Manager (ICDm)| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Integrated Secure Gateway (ISG)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Intelligence Services / WebFilter / WebPulse| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|IT Analytics (ITA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|IT Management Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Layer7 API Developer Portal|4.4, 4.5, 5.0 & 5.0 CR1, 5.0.2 & 5.0.2.1|Not vuln|Workaround|Workaround| | |[source](https://knowledge.broadcom.com/external/article?articleId=230205) | -|Broadcom|Layer7 API Developer Portal SaaS|5.0.3|Not vuln|Workaround|Workaround| | |[source](https://knowledge.broadcom.com/external/article?articleId=230205) | -|Broadcom|Layer7 API Gateway|9.4, 10.0, 10.1|Not vuln|Workaround|Workaround| | |[source](https://knowledge.broadcom.com/external/article?articleId=230205) | -|Broadcom|Layer7 Live API Creator|5.4, 5.1-5.3 (EOS)|Not vuln|Workaround| | | |[source](https://knowledge.broadcom.com/external/article?articleId=230205)| -|Broadcom|Layer7 Mobile API Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|LiveUpdate Administrator (LUA)|2.3.10| |Fix|Fix| | |[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| -|Broadcom|Management Center (MC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Mirror Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|PacketShaper (PS) S-Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|PolicyCenter (PC) S-Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Privileged Access Manager| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Privileged Access Manager Server Control| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Privileged Identity Manager| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|ProxySG| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Reporter| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Secure Access Cloud (SAC) | | |Fix| | | |[source](https://knowledge.broadcom.com/external/article/230359) | -|Broadcom|Security Analytics (SA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|ServiceDesk| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|SiteMinder (CA Single Sign-On) |12.8.x Policy Server, 12.8.04 or later Administrative UI, 12.8.x Access Gateway, 12.8.x SDK, 12.7 and 12.8 ASA Agents|Not vuln|Workaround|Not vuln|Not vuln| | [source](https://knowledge.broadcom.com/external/article?articleId=230270) | -|Broadcom|SSL Visibility (SSLV)| | |Investigation| | | |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Advanced Authentication|9.1, 9.1.01, 9.1.02|Not vuln|Fix|Fix|Fix| |[source](https://knowledge.broadcom.com/external/article?articleId=230301) | -|Broadcom|Symantec Control Compliance Suite (CCS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Directory| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Information Centric Analytics (ICA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Information Centric Tagging (ICT)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Integrated Cyber Defense Exchange (ICDx)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Integrated Cyber Defense Manager (ICDm)| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Integrated Secure Gateway (ISG)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Intelligence Services / WebFilter / WebPulse| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|IT Analytics (ITA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|IT Management Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Layer7 API Developer Portal|4.4, 4.5, 5.0 & 5.0 CR1, 5.0.2 & 5.0.2.1|Not vuln|Workaround|Workaround| ||[source](https://knowledge.broadcom.com/external/article?articleId=230205)| +|Broadcom|Layer7 API Developer Portal SaaS|5.0.3|Not vuln|Workaround|Workaround| ||[source](https://knowledge.broadcom.com/external/article?articleId=230205)| +|Broadcom|Layer7 API Gateway|9.4, 10.0, 10.1|Not vuln|Workaround|Workaround| ||[source](https://knowledge.broadcom.com/external/article?articleId=230205)| +|Broadcom|Layer7 Live API Creator|5.4, 5.1-5.3 (EOS)|Not vuln|Workaround| | ||[source](https://knowledge.broadcom.com/external/article?articleId=230205)| +|Broadcom|Layer7 Mobile API Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|LiveUpdate Administrator (LUA)|2.3.10| |Fix|Fix| ||[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| +|Broadcom|Management Center (MC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Mirror Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|PacketShaper (PS) S-Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|PolicyCenter (PC) S-Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Privileged Access Manager| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Privileged Access Manager Server Control| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Privileged Identity Manager| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|ProxySG| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Reporter| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Secure Access Cloud (SAC)| | |Fix| | ||[source](https://knowledge.broadcom.com/external/article/230359)| +|Broadcom|Security Analytics (SA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|ServiceDesk| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|SiteMinder (CA Single Sign-On)|12.8.x Policy Server, 12.8.04 or later Administrative UI, 12.8.x Access Gateway, 12.8.x SDK, 12.7 and 12.8 ASA Agents|Not vuln|Workaround|Not vuln|Not vuln||[source](https://knowledge.broadcom.com/external/article?articleId=230270)| +|Broadcom|SSL Visibility (SSLV)| | |Investigation| | ||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Advanced Authentication|9.1, 9.1.01, 9.1.02|Not vuln|Fix|Fix|Fix||[source](https://knowledge.broadcom.com/external/article?articleId=230301)| +|Broadcom|Symantec Control Compliance Suite (CCS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Directory| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| |Broadcom|Symantec Endpoint Detection and Response (EDR)|4.6.8|Not vuln|Fix| | |Applying patch atp-patch-generic-4.6-1 to versions 4.6.0, 4.6.5, and 4.6.7|[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793#:~:text=A%20fix%20for-,Symantec%20Endpoint%20Detection%20and%20Response%20(EDR),-On%2Dpremise%20is)| -|Broadcom|Symantec Endpoint Detection and Response (EDR) On-premise|4.6.8, 4.6.0, 4.65, 4.6.7| |Fix|Fix| | |[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793) | -|Broadcom|Symantec Endpoint Encryption (SEE)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Endpoint Protection (SEP)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793#:~:text=19%3A20%20ET%20%E2%80%93-,Symantec%20Endpoint%20Protection%20(SEP),-is%20not%20vulnerable)| -|Broadcom|Symantec Endpoint Protection (SEP) Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Endpoint Protection (SEP) for Mobile| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Endpoint Protection Manager (SEPM) |14.3| |Fix|Fix|Not vuln| | [source](https://knowledge.broadcom.com/external/article/230359) | +|Broadcom|Symantec Endpoint Detection and Response (EDR) On-premise|4.6.8, 4.6.0, 4.65, 4.6.7| |Fix|Fix| ||[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| +|Broadcom|Symantec Endpoint Encryption (SEE)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Endpoint Protection (SEP)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793#:~:text=19%3A20%20ET%20%E2%80%93-,Symantec%20Endpoint%20Protection%20(SEP),-is%20not%20vulnerable)| +|Broadcom|Symantec Endpoint Protection (SEP) Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Endpoint Protection (SEP) for Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Endpoint Protection Manager (SEPM)|14.3| |Fix|Fix|Not vuln||[source](https://knowledge.broadcom.com/external/article/230359)| |Broadcom|Symantec Endpoint Security (SES)| |Investigation|Fix| | |The complete remediation was deployed on Dec 23 for CVE-2021-44228.|[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| -|Broadcom|Symantec Identity Governance and Administration (IGA)|14.2, 14.3, 14.4|Not vuln|Workaround| | | |[source](https://knowledge.broadcom.com/external/article?articleId=230278)| -|Broadcom|Symantec Mail Security for Microsoft Exchange (SMSMSE)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Messaging Gateway (SMG)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec PGP Solutions| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Privileged Access Manager (PAM)|3.4.6, 4.0, 4.0.1|Not vuln|Fix|Fix|Not vuln| | [source](https://knowledge.broadcom.com/external/article?articleId=230405) | -|Broadcom|Symantec Privileged Access Manager (PAM) Server Control|14.1| |Workaround| | | | [source](https://knowledge.broadcom.com/external/article?articleId=230586) | -|Broadcom|Symantec Privileged Identity Manager (PIM) |12.9.x, 14.0| |Workaround|Workaround| | |[source](https://knowledge.broadcom.com/external/article?articleId=230668) [source](https://knowledge.broadcom.com/external/article?articleId=230670) | -|Broadcom|Symantec Protection Engine (SPE)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec Protection for SharePoint Servers (SPSS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Symantec VIP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Threat Defense for Active Directory (TDAD) |Unknown|Investigation| | | | |[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793) | -|Broadcom|VIP| |Not vuln|Not vuln|Not vuln|Not vuln| |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|VIP Authentication Hub|1.0 2021.Nov.03 release| |Fix| |Not vuln| | [source](https://knowledge.broadcom.com/external/article?articleId=230768) | -|Broadcom|Web Isolation (WI)| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Web Isolation (WI) Cloud| |Not vuln|Fix| | | |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Web Isolation (WI) On-premises| | |Investigation| | | |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Web Security Service (WSS)| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| -|Broadcom|Web Security Service (WSS) Reporting| |Not vuln|Fix| | | |[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793#:~:text=%C2%A0-,Web%20Security%20Service%20(WSS)%20Reporting,-CVE)| -|Broadcom|WebPulse| | |Investigation| | | |[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Identity Governance and Administration (IGA)|14.2, 14.3, 14.4|Not vuln|Workaround| | ||[source](https://knowledge.broadcom.com/external/article?articleId=230278)| +|Broadcom|Symantec Mail Security for Microsoft Exchange (SMSMSE)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Messaging Gateway (SMG)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec PGP Solutions| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Privileged Access Manager (PAM)|3.4.6, 4.0, 4.0.1|Not vuln|Fix|Fix|Not vuln||[source](https://knowledge.broadcom.com/external/article?articleId=230405)| +|Broadcom|Symantec Privileged Access Manager (PAM) Server Control|14.1| |Workaround| | ||[source](https://knowledge.broadcom.com/external/article?articleId=230586)| +|Broadcom|Symantec Privileged Identity Manager (PIM)|12.9.x, 14.0| |Workaround|Workaround| ||[source](https://knowledge.broadcom.com/external/article?articleId=230668) [source](https://knowledge.broadcom.com/external/article?articleId=230670)| +|Broadcom|Symantec Protection Engine (SPE)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec Protection for SharePoint Servers (SPSS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Symantec VIP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Threat Defense for Active Directory (TDAD)| |Investigation| | | ||[source](https://support.broadcom.com/security-advisory/content/0/0/SYMSA19793)| +|Broadcom|VIP| |Not vuln|Not vuln|Not vuln|Not vuln||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|VIP Authentication Hub|1.0 2021.Nov.03 release| |Fix| |Not vuln||[source](https://knowledge.broadcom.com/external/article?articleId=230768)| +|Broadcom|Web Isolation (WI)| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Web Isolation (WI) Cloud| |Not vuln|Fix| | ||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Web Isolation (WI) On-premises| | |Investigation| | ||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Web Security Service (WSS)| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| +|Broadcom|Web Security Service (WSS) Reporting| |Not vuln|Fix| | ||[source](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793#:~:text=%C2%A0-,Web%20Security%20Service%20(WSS)%20Reporting,-CVE)| +|Broadcom|WebPulse| | |Investigation| | ||[Broadcom Support Portal](https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793)| diff --git a/software/software_list_c.md b/software/software_list_c.md index fa98fce06..92bd72a38 100644 --- a/software/software_list_c.md +++ b/software/software_list_c.md @@ -7,455 +7,458 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|C4b XPHONE|All| | | | | | |[C4b XPHONE Link](https://www.c4b.com/de/news/log4j.php)| -|Camunda|All| | | | | | |[Camunda Forum Link](https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910)| -|Canary Labs|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Canary Labs Advisory Link](https://helpleft.canarylabs.com/t/83hjjk0/log4j-vulnerability)| -|Canon|Applications integrated with Vitrea (iCAD, Invia, Medis, Mevis, Mirada, Olea and Tomtec)| | |Not vuln| | | |[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|Canon|Canon DR Products (CXDI_NE)|Omnera, Flexpro, Soltus and more| |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|CT Medical Imaging Products| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|Easy Viz| | |Not vuln| | | |[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|Canon|Eye-Care Products| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|MR Medical Imaging Products| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|NM Medical Imaging Products| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|Olea Sphere| | |Not vuln| | | |[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| +|Campbell Scientific|All| | |Not vuln| | ||[link](https://s.campbellsci.com/documents/us/miscellaneous/log4j2-vulnerability.pdf)| +|Carrier|All| | |Not vuln| | ||[link](https://www.corporate.carrier.com/product-security/advisories-resources/)| +|CircleCI|All| | | | | ||[link](https://discuss.circleci.com/t/circleci-log4j-information-cve-2021-4422)| +|C4b XPHONE|All| | | | | ||[C4b XPHONE Link](https://www.c4b.com/de/news/log4j.php)| +|Camunda|All| | | | | ||[Camunda Forum Link](https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910)| +|Canary Labs|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Canary Labs Advisory Link](https://helpleft.canarylabs.com/t/83hjjk0/log4j-vulnerability)| +|Canon|Applications integrated with Vitrea (iCAD, Invia, Medis, Mevis, Mirada, Olea and Tomtec)| | |Not vuln| | ||[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| +|Canon|DR Products (CXDI_NE)|Omnera, Flexpro, Soltus and more| |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|CT Medical Imaging Products| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|Easy Viz| | |Not vuln| | ||[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| +|Canon|Eye-Care Products| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|MR Medical Imaging Products| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|NM Medical Imaging Products| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|Olea Sphere| | |Not vuln| | ||[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| |Canon|Rialto|7.x| |Vulnerable| | |Contact customer support|[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|Canon|Rialto Connect and Vault| | |Not vuln| | | |[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|Canon|Solution Health (Cloud)| | |Not vuln| | | |[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| +|Canon|Rialto Connect and Vault| | |Not vuln| | ||[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| +|Canon|Solution Health (Cloud)| | |Not vuln| | ||[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| |Canon|Solution Health (On-Prem)| | |Vulnerable| | |Contact customer support|[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|Canon|UL Medical Imaging Products| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|UL Medical Imaging Products| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| |Canon|Vitrea Advanced|7.x| |Vulnerable| | |See source for mitigations|[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| |Canon|Vitrea Connection|8.x| |Vulnerable| | |Contact customer support|[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|Canon|Vitrea View| | |Not vuln| | | |[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|Canon|VL Alphenix Angio Workstation (AWS)| | |Vulnerable| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|VL Infinix-i and Alphenix DFP| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|VL Infinix-i Angio Workstation (AWS)| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|XR Medical Imaging Products| | |Not vuln| | | |[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| -|Canon|Zillion| | |Not vuln| | | |[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| -|CapStorm|Copystorm| | |Investigation| | | || +|Canon|Vitrea View| | |Not vuln| | ||[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| +|Canon|VL Alphenix Angio Workstation (AWS)| | |Vulnerable| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|VL Infinix-i and Alphenix DFP| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|VL Infinix-i Angio Workstation (AWS)| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|XR Medical Imaging Products| | |Not vuln| | ||[source](https://global.medical.canon/service-support/securityinformation/apache_log4j_vulnerability)| +|Canon|Zillion| | |Not vuln| | ||[source](https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates/)| +|CapStorm|Copystorm| | |Investigation| | ||| |Carbon Black|Cloud Workload Appliance| | |Workaround| | |More information on pages linked bottom of blogpost (behind login)|[source](https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134)| |Carbon Black|EDR Servers| | |Workaround| | |More information on pages linked bottom of blogpost (behind login)|[source](https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134)| -|CarbonBlack|All| | | | | | |[CarbonBlack Advisory](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|CareStream|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy)| -|CAS genesisWorld|All| | | | | | |[CAS genesisWorld Link](https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446)| -|CaseWare|Cloud|All|Not vuln|Fix| | | |[source](https://www.caseware.com/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities)| -|CaseWare|IDEA|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.caseware.com/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities)| -|CaseWare|WorkingPapers|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.caseware.com/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities)| -|Catalogic|CloudCasa|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cloudcasa.io/forum/topic/no-apache-log4j-issues-in-cloudcasa)| -|Cato Networks|All| | | | | | |[Cato Networks Blog Post](https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/)| -|Cendio|ThinLinc|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.thinlinc.com/t/log4shell-vulnerability/286)| -|Cepheid|C360| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cepheid.com/en_US/legal/product-security-updates)| -|Cepheid|GeneXpert| | |Investigation| | | |[source](https://www.cepheid.com/en_US/legal/product-security-updates)| -|Cerberus|FTP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability)| -|Cerberus FTP|All| | | | | | |[Cerberus Article](https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability)| -|Cerebrate|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://twitter.com/cerebrateproje1/status/1470347775141421058)| +|CarbonBlack|All| | | | | ||[CarbonBlack Advisory](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|CareStream|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy)| +|CAS genesisWorld|All| | | | | ||[CAS genesisWorld Link](https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446)| +|CaseWare|Cloud|All|Not vuln|Fix| | ||[source](https://www.caseware.com/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities)| +|CaseWare|IDEA|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.caseware.com/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities)| +|CaseWare|WorkingPapers|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.caseware.com/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities)| +|Catalogic|CloudCasa|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cloudcasa.io/forum/topic/no-apache-log4j-issues-in-cloudcasa)| +|Cato Networks|All| | | | | ||[Cato Networks Blog Post](https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/)| +|Cendio|ThinLinc|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.thinlinc.com/t/log4shell-vulnerability/286)| +|Cepheid|C360| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cepheid.com/en_US/legal/product-security-updates)| +|Cepheid|GeneXpert| | |Investigation| | ||[source](https://www.cepheid.com/en_US/legal/product-security-updates)| +|Cerberus|FTP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability)| +|Cerberus FTP|All| | | | | ||[Cerberus Article](https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability)| +|Cerebrate|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://twitter.com/cerebrateproje1/status/1470347775141421058)| |Cerebro|Elasticsearch Web Admin|All|Not vuln|Not vuln|Not vuln|Not vuln|Uses logback for logging|[source](https://github.com/lmenezes/cerebro/blob/main/conf/logback.xml#L5)| -|Chaser Systems|discrimiNAT Firewall|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected)| -|Chatsworth Products|eConnect PDU|Not vuln|Not vuln|Not vuln|Not vuln| |"source"|| -|Check Point|CloudGuard|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| -|Check Point|Harmony Endpoint & Harmony Mobile|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| -|Check Point|Infinity Portal|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| -|Check Point|Quantum Security Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| -|Check Point|Quantum Security Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| -|Check Point|SMB|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| -|Check Point|ThreatCloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| -|CheckMK|All| | | | | | |[CheckMK Forum](https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3)| -|Chef|Automate|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j))| -|Chef|Backend|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j))| -|Chef|Infra Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j))| -|Ciphermail|All| | | | | | |[Ciphermail Blog Post](https://www.ciphermail.com/blog/ciphermail-gateway-and-webmail-messenger-are-not-vulnerable-to-cve-2021-44228.html)| -|CIS|CAT Lite|4.13.1| |Fix|Fix|Fix| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|CIS|CAT Pro Assessor v3 Full and Dissolvable|3.0.78| |Fix|Fix|Fix| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|CIS|CAT Pro Assessor v4|4.13.1| |Fix|Fix|Fix| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|CIS|CAT Pro Assessor v4 Service|1.13.1| |Fix|Fix|Fix| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|CIS|CAT Pro Dashboard| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|CIS|CSAT Pro|1.7.2| |Fix|Fix|Fix| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|CIS|Hosted CSAT| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|CIS|WorkBench| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| -|Cisco|ACI Multi-Site Orchestrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|ACI Virtual Edge| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Adaptive Security Appliance (ASA) Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Adaptive Security Device Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Adaptive Security virual Appliance (ASAv) |All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Advanced Web Security Reporting Application|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|AireOS Wireless LAN Controllers|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 1560 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 1810 Series OfficeExtend Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 1810w Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 1815 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 1830 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 1850 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 2800 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet 3800 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Aironet Access Points|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|AMP Virtual Private Cloud Appliance|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|AnyConnect Secure Mobility Client|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|AppDynamics|Multiple|Not vuln|Fix|Fix|Not vuln|See advisory for complete list of fixed versions per component|[source](https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability) | -|Cisco|AppDynamics with Cisco Secure Application|Multiple|Not vuln|Fix|Fix|Not vuln||[source](https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability) | -|Cisco|Application Policy Infrastructure Controller (APIC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Application Policy Infrastructure Controller (APIC) - Network Insights Base App|4.2(7r), 5.2(3g) | |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Application Policy Infrastructure Controller Enterprise Module (APIC-EM) |All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|ASR 5000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Automated Subsea Tuning|2.1.0| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Broadcloud Calling| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|BroadWorks|2021.11_1.162, ap381882| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Business 100 and 200 Series Access Points|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Business 220 Series Smart Switches|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Business 250 Series Smart Switches|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Business 350 Series Managed Switches|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Business Dashboard|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Business Process Automation|3.0.000.115, 3.1.000.044, 3.2.000.009| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Business Wireless|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Call Studio|11.6(2), 12.0(1), 12.5(1), 12.6(1) | |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Catalyst 9100 Series Access Points|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Catalyst 9800 Series Wireless Controllers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cisco 220 Series Smart Plus Switches|All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cisco 250 Series Smart Switches|All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cisco 350 Series Series Managed Switches|All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cisco 5000 Series Enterprise Network Compute system (ENCS) |All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cisco 550 Series Stackable Managed Switches|All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cloud Connect|12.6(1) | |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cloud Email Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cloud Services Platform 2100|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cloud Services Platform 5000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|CloudCenter|4.10.0.16| |Fix|Fix|Not vuln|Fixes should be available from 23 Dec 2021|[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|CloudCenter Action Orchestrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|CloudCenter Cost Optimizer|5.5.2| |Fix|Fix| | |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|CloudCenter Suite Admin|5.3.1| |Fix|Fix| | |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|CloudCenter Workload Manager|5.5.2| |Fix| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -| Cisco | Cloudlock | All versions | | Fix | Fix | Not vuln | |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -| Cisco | Cloudlock for Government | All versions | | Fix | Fix | Not vuln | |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cognitive Intelligence| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -| Cisco | Collaboration Experience Service (CES) | All versions | | Not vuln | Not vuln | Not vuln ||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -| Cisco | Collaboration Experience Service Management (CESM) | All versions | | Not vuln | Not vuln | Not vuln ||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Common Services Platform Collector (CSPC) |2.10.0, 2.9.1.3| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Computer Telephony Integration Object Server (CTIOS)| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|ConfD| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Connected Grid Device Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Connected Mobile Experiences (CMX) |10.6.3-70, 10.6.3-105, 10.6.2-89, 10.4.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Connectivity| | |Not vuln| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Contact Center Domain Manager (CCDM) |12.5(1) ES6, 12.6(1) ES3| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Contact Center Management Portal (CCMP) |12.5(1) ES6, 12.6(1) ES3| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Container Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Content Security Management Appliance (SMA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Change Automation|All versions| |Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -| Cisco | Crosswork Cloud | All versions | | Not vuln | Not vuln | Not vuln ||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Data Gateway|2.0.2, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -| Cisco | Crosswork Health Insights | All versions | | Not vuln | Not vuln | Not vuln ||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Network Controller|2.0.1, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Optimization Engine|2.0.1, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Platform Infrastructure|4.0.1, 4.1.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Situation Manager|8.0.0.8| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Service Health| All versions| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Crosswork Zero Touch Provisioning (ZTP) |2.0.1, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|CX Cloud|All versions| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|CX Cloud Agent Software|1.12.2| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Cyber Vision Sensor Management Extension|4.0.3| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Data Center Network Manager (DCNM) |12.0(2d), 11.5(3), 11.5(2), 11.5(1), 11.4(1), 11.3(1) | |Vulnerable|Vulnerable|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Defense Orchestrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|DNA Assurance| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|DNA Center|2.2.2.8, 2.1.2.8, 2.2.3.4| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|DNA Spaces|2.5, 2.8.2, 2.11.0, 2.13.3|Not vuln|Fix| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|DNA Spaces Connector|v2.0.588, v2.2.12| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Duo| |Not vuln|Fix| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|duo network gateway (on-prem/self-hosted)| | |Investigation| | | || -|Cisco|DUO network gateway (on-prem/self-hosted)| | |Investigation| | | || -|Cisco|Duo Security for Government|All versions| |Fix|Fix|Not vuln| | [source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) | -|Cisco|Elastic Services Controller (ESC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Email Security Appliance (ESA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Emergency Responder|11.5(4)SU9, 11.5(4)SU10| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Enterprise Chat and Email|12.0(1), 12.5(1), 12.6(1) | |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Enterprise NFV Infrastructure Software (NFVIS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|eSIM Flex|All versions| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Evolved Programmable Network Manager| 5.1.3.1| |Fix|Fix|Not vuln| |[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Evolved Programmable Network Manager| < 5.0.2.1, < 4.1.1.1| |Vulnerable|Vulnerable|Not vuln|Fix should be available from 13 Jan 2022|[source](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Exony Virtualized Interaction Manager (VIM)| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Expressway Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Extensible Network Controller (XNC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Finesse| < 12.6(1)ES03 | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Firepower 4100 Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Firepower 9300 Security Appliances| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Firepower Management Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Firepower Threat Defense (FTD) managed by FDM|6.2.3 hotfix, 6.4.0 hotfix, 6.6.5 hotfix, 6.7.0 hotfix, 7.0.1 hotfix, 7.1.0 hotfix| |Fix| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|General Cisco Disclaimer|Cisco is updating their advisory three times a day, please keep their website in your watchlist. We will try to update accordingly| | | | | || -|Cisco|GGSN Gateway GPRS Support Node| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Hosted Collaboration Mediation Fulfillment| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|HyperFlex System| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Chaser Systems|discrimiNAT Firewall|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected)| +|Chatsworth Products|eConnect PDU|Not vuln|Not vuln|Not vuln|Not vuln| |https://user-images.githubusercontent.com/89155495/146845501-b2186f1b-ccce-4f3d-a2c3-373db2eed9f0.png|| +|Check Point|CloudGuard|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| +|Check Point|Harmony Endpoint & Harmony Mobile|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| +|Check Point|Infinity Portal|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| +|Check Point|Quantum Security Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| +|Check Point|Quantum Security Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| +|Check Point|SMB|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| +|Check Point|ThreatCloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcontent.checkpoint.com/solutions?id=sk176865)| +|CheckMK|All| | | | | ||[CheckMK Forum](https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3)| +|Chef|Automate|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j))| +|Chef|Backend|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j))| +|Chef|Infra Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j))| +|Ciphermail|All| | | | | ||[Ciphermail Blog Post](https://www.ciphermail.com/blog/ciphermail-gateway-and-webmail-messenger-are-not-vulnerable-to-cve-2021-44228.html)| +|CIS|CAT Lite|4.13.1| |Fix|Fix|Fix||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|CIS|CAT Pro Assessor v3 Full and Dissolvable|3.0.78| |Fix|Fix|Fix||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|CIS|CAT Pro Assessor v4|4.13.1| |Fix|Fix|Fix||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|CIS|CAT Pro Assessor v4 Service|1.13.1| |Fix|Fix|Fix||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|CIS|CAT Pro Dashboard| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|CIS|CSAT Pro|1.7.2| |Fix|Fix|Fix||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|CIS|Hosted CSAT| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|CIS|WorkBench| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961)| +|Cisco|ACI Multi-Site Orchestrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|ACI Virtual Edge| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Adaptive Security Appliance (ASA) Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Adaptive Security Device Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Adaptive Security virual Appliance (ASAv)|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Advanced Web Security Reporting Application|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|AireOS Wireless LAN Controllers|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 1560 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 1810 Series OfficeExtend Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 1810w Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 1815 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 1830 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 1850 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 2800 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet 3800 Series Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Aironet Access Points|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|AMP Virtual Private Cloud Appliance|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|AnyConnect Secure Mobility Client|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|AppDynamics|Multiple|Not vuln|Fix|Fix|Not vuln|See advisory for complete list of fixed versions per component|[source](https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability)| +|Cisco|AppDynamics with Cisco Secure Application|Multiple|Not vuln|Fix|Fix|Not vuln||[source](https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability)| +|Cisco|Application Policy Infrastructure Controller (APIC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Application Policy Infrastructure Controller (APIC) - Network Insights Base App|4.2(7r), 5.2(3g)| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Application Policy Infrastructure Controller Enterprise Module (APIC-EM)|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|ASR 5000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Automated Subsea Tuning|2.1.0| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Broadcloud Calling| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|BroadWorks|2021.11_1.162, ap381882| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Business 100 and 200 Series Access Points|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Business 220 Series Smart Switches|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Business 250 Series Smart Switches|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Business 350 Series Managed Switches|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Business Dashboard|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Business Process Automation|3.0.000.115, 3.1.000.044, 3.2.000.009| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Business Wireless|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Call Studio|11.6(2), 12.0(1), 12.5(1), 12.6(1)| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Catalyst 9100 Series Access Points|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Catalyst 9800 Series Wireless Controllers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|220 Series Smart Plus Switches|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|250 Series Smart Switches|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|350 Series Series Managed Switches|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|5000 Series Enterprise Network Compute system (ENCS)|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|550 Series Stackable Managed Switches|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cloud Connect|12.6(1)| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cloud Email Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cloud Services Platform 2100|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cloud Services Platform 5000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|CloudCenter|4.10.0.16| |Fix|Fix|Not vuln|Fixes should be available from 23 Dec 2021|[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|CloudCenter Action Orchestrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|CloudCenter Cost Optimizer|5.5.2| |Fix|Fix| ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|CloudCenter Suite Admin|5.3.1| |Fix|Fix| ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|CloudCenter Workload Manager|5.5.2| |Fix| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cloudlock|All| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cloudlock for Government|All| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cognitive Intelligence| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Collaboration Experience Service (CES)|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Collaboration Experience Service Management (CESM)|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Common Services Platform Collector (CSPC)|2.10.0, 2.9.1.3| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Computer Telephony Integration Object Server (CTIOS)| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|ConfD| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Connected Grid Device Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Connected Mobile Experiences (CMX)|10.6.3-70, 10.6.3-105, 10.6.2-89, 10.4.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Connectivity| | |Not vuln| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Contact Center Domain Manager (CCDM)|12.5(1) ES6, 12.6(1) ES3| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Contact Center Management Portal (CCMP)|12.5(1) ES6, 12.6(1) ES3| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Container Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Content Security Management Appliance (SMA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Change Automation|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Cloud|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Data Gateway|2.0.2, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Health Insights|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Network Controller|2.0.1, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Optimization Engine|2.0.1, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Platform Infrastructure|4.0.1, 4.1.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Situation Manager|8.0.0.8| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Service Health|All| |Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Crosswork Zero Touch Provisioning (ZTP)|2.0.1, 3.0.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|CX Cloud|All| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|CX Cloud Agent Software|1.12.2| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Cyber Vision Sensor Management Extension|4.0.3| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Data Center Network Manager (DCNM)|12.0(2d), 11.5(3), 11.5(2), 11.5(1), 11.4(1), 11.3(1)| |Vulnerable|Vulnerable|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Defense Orchestrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|DNA Assurance| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|DNA Center|2.2.2.8, 2.1.2.8, 2.2.3.4| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|DNA Spaces|2.5, 2.8.2, 2.11.0, 2.13.3|Not vuln|Fix| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|DNA Spaces Connector|v2.0.588, v2.2.12| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Duo| |Not vuln|Fix| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|duo network gateway (on-prem/self-hosted)| | |Investigation| | ||| +|Cisco|DUO network gateway (on-prem/self-hosted)| | |Investigation| | ||| +|Cisco|Duo Security for Government|All| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Elastic Services Controller (ESC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Email Security Appliance (ESA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Emergency Responder|11.5(4)SU9, 11.5(4)SU10| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Enterprise Chat and Email|12.0(1), 12.5(1), 12.6(1)| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Enterprise NFV Infrastructure Software (NFVIS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|eSIM Flex|All| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Evolved Programmable Network Manager|5.1.3.1| |Fix|Fix|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Evolved Programmable Network Manager|< 5.0.2.1, < 4.1.1.1| |Vulnerable|Vulnerable|Not vuln|Fix should be available from 13 Jan 2022|[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Exony Virtualized Interaction Manager (VIM)| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Expressway Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Extensible Network Controller (XNC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Finesse|< 12.6(1)ES03| |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Firepower 4100 Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Firepower 9300 Security Appliances| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Firepower Management Center| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Firepower Threat Defense (FTD) managed by FDM|6.2.3 hotfix, 6.4.0 hotfix, 6.6.5 hotfix, 6.7.0 hotfix, 7.0.1 hotfix, 7.1.0 hotfix| |Fix| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|General Cisco Disclaimer|Cisco is updating their advisory three times a day, please keep their website in your watchlist. We will try to update accordingly| | | | ||| +|Cisco|GGSN Gateway GPRS Support Node| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Hosted Collaboration Mediation Fulfillment| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|HyperFlex System| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| |Cisco|Identity Services Engine (ISE)|2.4 hotfix, 2.6 hotfix, 2.7 hotfix, 3.0 hotfix, 3.1 hotfix| |Fix| | |Fix expected on Dec 17th|[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Integrated Management Controller (IMC) Supervisor|2.3.2.1| |Fix| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Intersight| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Intersight Virtual Appliance| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|IOS and IOS XE Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|IOS XR Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|IoT Field Network Director (formerly Connected Grid Network Management System)| | |Investigation| | | |[Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|IoT Field Network Director (formerly Cisco Connected Grid Network Management System)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|IoT Operations Dashboard| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|IOx Fog Director| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|IP Services Gateway (IPSG)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Jabber Guest|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Kinetic for Cities| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Managed Services Accelerator (MSX) Network Access Control Service| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|MDS 9000 Series Multilayer Switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meeting Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki GO| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki MR| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki MS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki MT| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki MV| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki MX| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki System Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Meraki Z-Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|MME Mobility Management Entity| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Mobility Services Engine| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Mobility Unified Reporting and Analytics System| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Modeling Labs| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Network Assessment (CNA) Tool| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Network Assurance Engine| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Network Convergence System 2000 Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Network Planner| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Integrated Management Controller (IMC) Supervisor|2.3.2.1| |Fix| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Intersight| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Intersight Virtual Appliance| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|IOS and IOS XE Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|IOS XR Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|IoT Field Network Director (formerly Connected Grid Network Management System)| | |Investigation| | ||[Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|IoT Field Network Director (formerly Cisco Connected Grid Network Management System)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|IoT Operations Dashboard| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|IOx Fog Director| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|IP Services Gateway (IPSG)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Jabber Guest|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Kinetic for Cities| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Managed Services Accelerator (MSX) Network Access Control Service| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|MDS 9000 Series Multilayer Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meeting Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki GO| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki MR| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki MS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki MT| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki MV| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki MX| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki System Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Meraki Z-Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|MME Mobility Management Entity| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Mobility Services Engine| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Mobility Unified Reporting and Analytics System| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Modeling Labs| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Network Assessment (CNA) Tool| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Network Assurance Engine| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Network Convergence System 2000 Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Network Planner| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| |Cisco|Network Services Orchestrator (NSO)|< nso-5.3.5.1, nso-5.4.5.2, nso-5.5.4.1, nso-5.6.3.1| |Vulnerable| | |Fixes expected 17-Dec|[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus 3000 Series Switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus 5500 Platform Switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus 5600 Platform Switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus 6000 Series Switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus 7000 Series Switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus 9000 Series Switches in standalone NX-OS mode| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus Dashboard (formerly Application Services Engine)| | |Investigation| | | |[Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus 3000 Series Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus 5500 Platform Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus 5600 Platform Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus 6000 Series Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus 7000 Series Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus 9000 Series Switches in standalone NX-OS mode| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus Dashboard (formerly Application Services Engine)| | |Investigation| | ||[Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| |Cisco|Nexus Dashboard (formerly Cisco Application Services Engine)|<2.1.2| |Vulnerable| | |Fixes expected 7-Jan-2022|[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus Data Broker| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Nexus Insights| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Optical Network Planner| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Packaged Contact Center Enterprise| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Paging Server| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Paging Server (InformaCast)| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|PDSN/HA Packet Data Serving Node and Home Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|PGW Packet Data Network Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Policy Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Access Registrar| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Cable Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Central for Service Providers| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Collaboration Assurance| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Collaboration Deployment| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Collaboration Manager| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Collaboration Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Infrastructure| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime IP Express| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime License Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Network| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Network Registrar| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Optical for Service Providers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Performance Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Prime Service Catalog| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Registered Envelope Service| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|SD-WAN vEdge 1000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|SD-WAN vEdge 2000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|SD-WAN vEdge 5000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|SD-WAN vEdge Cloud Router Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|SD-WAN vManage| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Secure Network Analytics (SNA), formerly Stealthwatch| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Security Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Smart Software Manager On-Prem| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|SocialMiner|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|System Architecture Evolution Gateway (SAEGW)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|TelePresence Management Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|TelePresence Video Communication Server (VCS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Tetration Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|UCS C-Series Rack Servers - Integrated Management Controller| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|UCS Central Software|2.3.2.1| |Fix| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|UCS Director|6.8.2.0| |Fix| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|UCS Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|UCS Performance Manager| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Ultra Packet Core| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Umbrella| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Attendant Console Advanced| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Attendant Console Business Edition| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Attendant Console Department Edition| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Attendant Console Enterprise Edition| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Attendant Console Premium Edition| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Communications Domain Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Communications Manager / Cisco Unified Communications Manager Session Management Edition| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Communications Manager Cloud| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Communications Manager IM & Presence Service (formerly CUPS)| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Contact Center Enterprise| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Contact Center Enterprise - Live Data server| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Contact Center Express| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Customer Voice Portal| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Intelligence Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified Intelligent Contact Management Enterprise| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unified SIP Proxy Software| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unity Connection| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Unity Express| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Video Surveillance Media Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus Data Broker| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Nexus Insights| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Optical Network Planner| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Packaged Contact Center Enterprise| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Paging Server| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Paging Server (InformaCast)| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|PDSN/HA Packet Data Serving Node and Home Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|PGW Packet Data Network Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Policy Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Access Registrar| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Cable Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Central for Service Providers| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Collaboration Assurance| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Collaboration Deployment| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Collaboration Manager| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Collaboration Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Infrastructure| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime IP Express| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime License Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Network| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Network Registrar| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Optical for Service Providers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Performance Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Prime Service Catalog| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Registered Envelope Service| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|SD-WAN vEdge 1000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|SD-WAN vEdge 2000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|SD-WAN vEdge 5000 Series Routers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|SD-WAN vEdge Cloud Router Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|SD-WAN vManage| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Secure Network Analytics (SNA), formerly Stealthwatch| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Security Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Smart Software Manager On-Prem| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|SocialMiner|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|System Architecture Evolution Gateway (SAEGW)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|TelePresence Management Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|TelePresence Video Communication Server (VCS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Tetration Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|UCS C-Series Rack Servers - Integrated Management Controller| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|UCS Central Software|2.3.2.1| |Fix| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|UCS Director|6.8.2.0| |Fix| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|UCS Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|UCS Performance Manager| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Ultra Packet Core| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Umbrella| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Attendant Console Advanced| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Attendant Console Business Edition| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Attendant Console Department Edition| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Attendant Console Enterprise Edition| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Attendant Console Premium Edition| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Communications Domain Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Communications Manager / Cisco Unified Communications Manager Session Management Edition| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Communications Manager Cloud| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Communications Manager IM & Presence Service (formerly CUPS)| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Contact Center Enterprise| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Contact Center Enterprise - Live Data server| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Contact Center Express| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Customer Voice Portal| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Intelligence Center| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified Intelligent Contact Management Enterprise| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unified SIP Proxy Software| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unity Connection| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Unity Express| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Video Surveillance Media Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| |Cisco|Video Surveillance Operations Manager|<7.14.4| |Vulnerable| | |Fixes expected 16-Dec-2021|[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Virtual Topology System - Virtual Topology Controller (VTC) VM| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Virtualized Voice Browser| | |Investigation| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Vision Dynamic Signage Director| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|WAN Automation Engine (WAE)| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Web Security Appliance (WSA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Webex App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Webex Cloud-Connected UC (CCUC)| | |Vulnerable| | | |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Virtual Topology System - Virtual Topology Controller (VTC) VM| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Virtualized Voice Browser| | |Investigation| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Vision Dynamic Signage Director| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|WAN Automation Engine (WAE)| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Web Security Appliance (WSA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Webex App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Webex Cloud-Connected UC (CCUC)| | |Vulnerable| | ||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| |Cisco|Webex Meetings Server|CWMS-3.0MR4SP2, CWMS-4.0MR4SP2,CWMS-3.0MR4SP3, CWMS-4.0MR4SP3| |Fix| | |Fixes expected 14-Dec-2021|[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Webex Room Phone| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Webex Teams| | |Investigation| | | |[Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Wide Area Application Services (WAAS)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| -|Cisco|Wireless LAN Controller| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Webex Room Phone| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Webex Teams| | |Investigation| | ||[Vulnerability in Apache Log4j Library Affecting Cisco Products: December 2021](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Wide Area Application Services (WAAS)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| +|Cisco|Wireless LAN Controller| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://tools.cisco.com/security/left/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd)| |Citrix|ADC (NetScaler ADC) and Gateway (NetScaler Gateway)|All Platforms|Not vuln|Not vuln|Not vuln|Not vuln|Citrix continues to investigate any potential impact on Citrix-managed cloud services. If, as the investigation continues, any Citrix-managed services are found to be affected by this issue, Citrix will take immediate action to remediate the problem. Customers using Citrix-managed cloud services do not need to take any action.|[Citrix Statement](https://support.citrix.com/article/CTX335705)| -|Citrix|Analytics| | |Investigation| | | |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Application Delivery Management (NetScaler MAS)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Cloud Connector| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Connector Appliance for Cloud Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Content Collaboration (ShareFile Integration)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Analytics| | |Investigation| | ||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Application Delivery Management (NetScaler MAS)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Cloud Connector| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Connector Appliance for Cloud Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Content Collaboration (ShareFile Integration)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| |Citrix|Content Collaboration (ShareFile Integration) – Files for Windows, Files for Mac, Files for Outlook| |Not vuln|Not vuln|Not vuln|Not vuln|Citrix continues to investigate any potential impact on Citrix-managed cloud services. If, as the investigation continues, any Citrix-managed services are found to be affected by this issue, Citrix will take immediate action to remediate the problem. Customers using Citrix-managed cloud services do not need to take any action.|[Citrix Statement](https://support.citrix.com/article/CTX335705)| -|Citrix|Endpoint Management ( XenMobile Server)| |Not vuln|Fix| | |"For CVE-2021-44228 and CVE-2021-45046: Impacted–Customers are advised to apply the latest CEM rolling patch updates listed below as soon as possible to reduce the risk of exploitation. XenMobile Server 10.14 RP2; XenMobile Server 10.13 RP5; and XenMobile Server 10.12 RP10. Note: Customers who have upgraded their XenMobile Server to the updated versions are recommended not to apply the responder policy mentioned in the blog listed below to the Citrix ADC vserver in front of the XenMobile Server as it may impact the enrollment of Android devices. For CVE-2021-45105: Investigation in progress."|[Citrix Statement](https://support.citrix.com/article/CTX335705)| -|Citrix|Endpoint Management (XenMobile Server)|10.12 RP10, 10.13 RP5 and 10.14 RP2|Not vuln|Fix|Fix|Investigation| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Files for Mac| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Files for Outlook| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Files for Windows| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Hypervisor (XenServer)| | |Not vuln| | | |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|License Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|NetScaler ADC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|NetScaler Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|SD-WAN|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Sharefile| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Endpoint Management ( XenMobile Server)| |Not vuln|Fix| | |For CVE-2021-44228 and CVE-2021-45046: Impacted–Customers are advised to apply the latest CEM rolling patch updates listed below as soon as possible to reduce the risk of exploitation. https://support.citrix.com/article/CTX335763 XenMobile Server 10.14 RP2; https://support.citrix.com/article/CTX335753 XenMobile Server 10.13 RP5; and https://support.citrix.com/article/CTX335785 XenMobile Server 10.12 RP10. Note: Customers who have upgraded their XenMobile Server to the updated versions are recommended not to apply the responder policy mentioned in the blog listed below to the Citrix ADC vserver in front of the XenMobile Server as it may impact the enrollment of Android devices. For CVE-2021-45105: Investigation in progress.|[Citrix Statement](https://support.citrix.com/article/CTX335705)| +|Citrix|Endpoint Management (XenMobile Server)|10.12 RP10, 10.13 RP5 and 10.14 RP2|Not vuln|Fix|Fix|Investigation||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Files for Mac| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Files for Outlook| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Files for Windows| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Hypervisor (XenServer)| | |Not vuln| | ||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|License Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|NetScaler ADC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|NetScaler Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|SD-WAN|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Sharefile| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| |Citrix|ShareFile Storage Zones Controller| |Not vuln|Not vuln|Not vuln|Not vuln|Citrix continues to investigate any potential impact on Citrix-managed cloud services. If, as the investigation continues, any Citrix-managed services are found to be affected by this issue, Citrix will take immediate action to remediate the problem. Customers using Citrix-managed cloud services do not need to take any action.|[Citrix Statement](https://support.citrix.com/article/CTX335705)| |Citrix|Virtual Apps and Desktops (XenApp & XenDesktop)|Linux VDA 2112|Not vuln|Fix|Investigation| |Impacted – Linux VDA (non-LTSR versions only), Not vulnerable: App Layering, Delivery Controller, Director, FAS, HDX, Profile Management, PVS, Session Recording, Storefront, Studio, Windows VDA, WEM|[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Workspace| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Citrix|Workspace App|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.citrix.com/article/CTX335705)| -|Claris|All| | | | | | |[Claris Article](https://support.claris.com/s/article/CVE-2021-44228-Apache-Log4j-Vulnerability-and-Claris-products?language=en_US)| -|Clavister|EasyAccess|<= 4.1.2|Not vuln|Fix| | | |[source](https://kb.clavister.com/343410234/high-severity-vulnerability-in-apache-log4j-2)| -|Clavister|InCenter|<= 1.68.03, 2.0.0 and 2.1.0|Not vuln|Fix| | | |[source](https://kb.clavister.com/343410462/vulnerability-in-apache-log4j-2-which-is-used-in-inleft)| -|Clavister|InControl| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| -|Clavister|NetShield| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| -|Clavister|NetWall| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| -|Clavister|OneConnect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| -|Cloudera|AM2CM Tool| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Ambari|Only versions 2.x, 1.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Arcadia Enterprise|Only version 7.1.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|CDH, HDP, and HDF|Only version 6.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|CDP Operational Database (COD)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|CDP Private Cloud Base|Only version 7.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|CDS 3 Powered by Apache Spark|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|CDS 3.2 for GPUs|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Cybersecurity Platform|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Analytics Studio (DAS)| | |Investigation| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Catalog| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Engineering (CDE)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Engineering (CDE)| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Flow (CFM)| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Lifecycle Manager (DLM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Science Workbench (CDSW)|Only versions 2.x, 3.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Steward Studio (DSS)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Visualization (CDV)| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Warehouse (CDW)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Data Warehouse (CDW)| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|DataFlow (CDF)| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Edge Management (CEM)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Enterprise|Only version 6.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Flow Management (CFM)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Hortonworks Data Flow (HDF)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Hortonworks Data Platform (HDP)|Only versions 7.1.x, 2.7.x, 2.6.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Hortonworks DataPlane Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Machine Learning (CML)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Machine Learning (CML)| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Management Console|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Management Console for CDP Public Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Manager (Including Backup Disaster Recovery (BDR) and Replication Manager)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Manager (Including Backup Disaster Recovery (BDR) and Replication Manager)|Only versions 7.0.x, 7.1.x, 7.2.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Manager (Including Backup Disaster Recovery (BDR))| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Replication Manager| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Runtime (including Data Hub and all Data Hub templates)|Only versions 7.0.x, 7.1.x, 7.2.x| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|SmartSense| | |Investigation| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Stream Processing (CSP)|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Streaming Analytics (CSA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Streaming Analytics (CSA)| | |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Workload Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Workload XM|All| |Vulnerable| | | |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|Cloudera|Workload XM (SaaS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| -|CloudFlare|All| | | | | | |[CloudFlare Blog Post](https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/)| -|Cloudian HyperStore|All| | | | | | |[Cloudian Article](https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228)| -|Cloudogu|Ecosystem|All|Not vuln|Fix| | | |[Cloudogu Community](https://community.cloudogu.com/t/security-vulnerability-log4shell-cve-2021-44228/417)| -|Cloudogu|SCM-Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[SCM-Manager Blog](https://scm-manager.org/blog/posts/2021-12-13-log4shell/)| -|Cloudron|All| | | | | | |[Cloudron Forum](https://forum.cloudron.io/topic/6153/log4j-and-log4j2-library-vulnerability?lang=en-US)| -|Clover|All| | | | | | |[Clover Article](https://community.clover.com/articles/35868/apache-log4j-vulnerability-cve-2021-44228.html)| -|Cockroach Labs|CockroachDB|-|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cockroachlabs.com/docs/advisories/acve-2021-44228#statement)| -|Code42|App|8.8.1|Not vuln|Fix| | | |[Code42 Release Notification](https://success.code42.com/hc/en-us/articles/4416158712343-RELEASE-NOTIFICATION-Code42-Vulnerability-Mitigation-for-CVE-2021-44228-and-other-updates)| +|Citrix|Workspace| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Citrix|Workspace App|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.citrix.com/article/CTX335705)| +|Claris|All| | | | | ||[Claris Article](https://support.claris.com/s/article/CVE-2021-44228-Apache-Log4j-Vulnerability-and-Claris-products?language=en_US)| +|Clavister|EasyAccess|<= 4.1.2|Not vuln|Fix| | ||[source](https://kb.clavister.com/343410234/high-severity-vulnerability-in-apache-log4j-2)| +|Clavister|InCenter|<= 1.68.03, 2.0.0 and 2.1.0|Not vuln|Fix| | ||[source](https://kb.clavister.com/343410462/vulnerability-in-apache-log4j-2-which-is-used-in-inleft)| +|Clavister|InControl| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| +|Clavister|NetShield| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| +|Clavister|NetWall| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| +|Clavister|OneConnect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.clavister.com/advisories/security/clav-sa-0297-high-severity-vulnerability-in-apache-log4j-2)| +|Cloudera|AM2CM Tool| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Ambari|Only versions 2.x, 1.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Arcadia Enterprise|Only version 7.1.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|CDH, HDP, and HDF|Only version 6.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|CDP Operational Database (COD)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|CDP Private Cloud Base|Only version 7.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|CDS 3 Powered by Apache Spark|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|CDS 3.2 for GPUs|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Cybersecurity Platform|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Analytics Studio (DAS)| | |Investigation| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Catalog| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Engineering (CDE)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Engineering (CDE)| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Flow (CFM)| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Lifecycle Manager (DLM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Science Workbench (CDSW)|Only versions 2.x, 3.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Steward Studio (DSS)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Visualization (CDV)| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Warehouse (CDW)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Data Warehouse (CDW)| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|DataFlow (CDF)| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Edge Management (CEM)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Enterprise|Only version 6.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Flow Management (CFM)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Hortonworks Data Flow (HDF)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Hortonworks Data Platform (HDP)|Only versions 7.1.x, 2.7.x, 2.6.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Hortonworks DataPlane Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Machine Learning (CML)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Machine Learning (CML)| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Management Console|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Management Console for CDP Public Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Manager (Including Backup Disaster Recovery (BDR) and Replication Manager)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Manager (Including Backup Disaster Recovery (BDR) and Replication Manager)|Only versions 7.0.x, 7.1.x, 7.2.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Manager (Including Backup Disaster Recovery (BDR))| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Replication Manager| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Runtime (including Data Hub and all Data Hub templates)|Only versions 7.0.x, 7.1.x, 7.2.x| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|SmartSense| | |Investigation| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Stream Processing (CSP)|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Streaming Analytics (CSA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Streaming Analytics (CSA)| | |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Workload Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Workload XM|All| |Vulnerable| | ||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|Cloudera|Workload XM (SaaS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019)| +|CloudFlare|All| | | | | ||[CloudFlare Blog Post](https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/)| +|Cloudian HyperStore|All| | | | | ||[Cloudian Article](https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228)| +|Cloudogu|Ecosystem|All|Not vuln|Fix| | ||[Cloudogu Community](https://community.cloudogu.com/t/security-vulnerability-log4shell-cve-2021-44228/417)| +|Cloudogu|SCM-Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[SCM-Manager Blog](https://scm-manager.org/blog/posts/2021-12-13-log4shell/)| +|Cloudron|All| | | | | ||[Cloudron Forum](https://forum.cloudron.io/topic/6153/log4j-and-log4j2-library-vulnerability?lang=en-US)| +|Clover|All| | | | | ||[Clover Article](https://community.clover.com/articles/35868/apache-log4j-vulnerability-cve-2021-44228.html)| +|Cockroach Labs|CockroachDB|-|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cockroachlabs.com/docs/advisories/acve-2021-44228#statement)| +|Code42|App|8.8.1|Not vuln|Fix| | ||[Code42 Release Notification](https://success.code42.com/hc/en-us/articles/4416158712343-RELEASE-NOTIFICATION-Code42-Vulnerability-Mitigation-for-CVE-2021-44228-and-other-updates)| |Code42|Crashplan|8.8, possibly prior versions|Not vuln|Fix| | |I think, they don't specify in the notice, but we know that they released an updated Crashplan client. Possibly prior versions affected.|[Code42 Release Notification](https://success.code42.com/hc/en-us/articles/4416158712343-RELEASE-NOTIFICATION-Code42-Vulnerability-Mitigation-for-CVE-2021-44228-and-other-updates)| -|CodeBeamer|All| | | | | | |[CodeBeamer Link](https://codebeamer.com/cb/wiki/19872365)| -|CODESYS|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.codesys.com/news-events/news/article/log4j-not-used-in-codesys.html)| -|Cohesity|All| | | | | | |[Cohesity Support Link](https://support.cohesity.com/s/article/Security-Advisory-Apache-Log4j-Remote-Code-Execution-RCE-CVE-2021-44228)| -|Commvault|Cloud Apps & Oracle & MS-SQL|All supported versions|Not vuln|Fix| | | |[source](https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html)| -|Compumatica|CompuMail Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| -|Compumatica|Compuwall|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| -|Compumatica|CryptoGuard|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| -|Compumatica|MagiCtwin|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| -|Compumatica|MASC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| -|Concourse|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Concourse Community Discussion](https://github.com/concourse/concourse/discussions/7887)| -|ConcreteCMS.com|All| | | | | | |[ConcreteCMS.com Link](https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit)| +|CodeBeamer|All| | | | | ||[CodeBeamer Link](https://codebeamer.com/cb/wiki/19872365)| +|CODESYS|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.codesys.com/news-events/news/article/log4j-not-used-in-codesys.html)| +|Cohesity|All| | | | | ||[Cohesity Support Link](https://support.cohesity.com/s/article/Security-Advisory-Apache-Log4j-Remote-Code-Execution-RCE-CVE-2021-44228)| +|Commvault|Cloud Apps & Oracle & MS-SQL|All supported versions|Not vuln|Fix| | ||[source](https://documentation.commvault.com/11.24/essential/146231_security_vulnerability_and_reporting.html)| +|Compumatica|CompuMail Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| +|Compumatica|Compuwall|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| +|Compumatica|CryptoGuard|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| +|Compumatica|MagiCtwin|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| +|Compumatica|MASC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.compumatica.com/nieuws-bericht/important-information-log4j-vulnerability-compumatica-secure-networks/)| +|Concourse|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Concourse Community Discussion](https://github.com/concourse/concourse/discussions/7887)| +|ConcreteCMS.com|All| | | | | ||[ConcreteCMS.com Link](https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit)| |Confluent|Cloud| |Not vuln|Fix| | |server-side fix|[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| -|Confluent|Community Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| +|Confluent|Community Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| |Confluent|Community/Standalone Package of ksqlDB| |Not vuln|Not vuln|Not vuln|Not vuln|No exploitable conditions found, working on package without log4j2|[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| |Confluent|Connectors|see link|Not vuln|Fix| | |List of vulnerable connectors available at Confluent|[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| -|Confluent|ElasticSearch Sink Connector|<11.1.7|Not vuln|Fix| | | |[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| +|Confluent|ElasticSearch Sink Connector|<11.1.7|Not vuln|Fix| | ||[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| |Confluent|for Kubernetes|2.1.0-1 and 2.2.0-1|Not vuln|Fix| | |Only applicable to confluent-init-container|[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| -|Confluent|Google DataProc Sink Connector|<1.1.5|Not vuln|Fix| | | |[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| -|Confluent|HDFS 2 Sink Connector|<10.1.3|Not vuln|Fix| | | |[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| -|Confluent|HDFS 3 Sink Connector|<1.1.8| |Vulnerable| | | |[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| -|Confluent|Kafka Connectors| |Not vuln|Not vuln|Not vuln|Not vuln| |[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| -|Confluent|Platform|7.0.1|Not vuln|Fix| | | |[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| -|Confluent|Splunk Sink Connector|<2.05|Not vuln|Fix| | | |[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| -|Confluent|VMWare Tanzu GemFire Sink Connector|<1.0.8|Not vuln|Fix| | | |[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| -|Connect2id|server|< 12.5.1|Not vuln|Fix| | | |[source](https://connect2id.com/blog/connect2id-server-12-5-1)| -|Connectwise|Global search capability of Manage Cloud| | |Workaround| | | |[source](https://www.connectwise.com/company/trust/advisories)| -|Connectwise|Manage on-premise's Global Search| | |Workaround| | | |[source](https://www.connectwise.com/company/trust/advisories)| -|Connectwise|Marketplace| | |Workaround| | | |[source](https://www.connectwise.com/company/trust/advisories)| -|Connectwise|Perch| |Not vuln|Fix| | | |[source](https://www.connectwise.com/company/trust/advisories)| +|Confluent|Google DataProc Sink Connector|<1.1.5|Not vuln|Fix| | ||[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| +|Confluent|HDFS 2 Sink Connector|<10.1.3|Not vuln|Fix| | ||[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| +|Confluent|HDFS 3 Sink Connector|<1.1.8| |Vulnerable| | ||[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| +|Confluent|Kafka Connectors| |Not vuln|Not vuln|Not vuln|Not vuln||[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| +|Confluent|Platform|7.0.1|Not vuln|Fix| | ||[source](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability)| +|Confluent|Splunk Sink Connector|<2.05|Not vuln|Fix| | ||[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| +|Confluent|VMWare Tanzu GemFire Sink Connector|<1.0.8|Not vuln|Fix| | ||[December 2021 Log4j Vulnerabilities Advisory](https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability#impact-to-connectors)| +|Connect2id|server|< 12.5.1|Not vuln|Fix| | ||[source](https://connect2id.com/blog/connect2id-server-12-5-1)| +|Connectwise|Global search capability of Manage Cloud| | |Workaround| | ||[source](https://www.connectwise.com/company/trust/advisories)| +|Connectwise|Manage on-premise's Global Search| | |Workaround| | ||[source](https://www.connectwise.com/company/trust/advisories)| +|Connectwise|Marketplace| | |Workaround| | ||[source](https://www.connectwise.com/company/trust/advisories)| +|Connectwise|Perch| |Not vuln|Fix| | ||[source](https://www.connectwise.com/company/trust/advisories)| |Connectwise|StratoZen| | |Workaround| | |Urgent action for self-hosted versions|[source](https://www.connectwise.com/company/trust/advisories)| -|Contrast|Hosted SaaS Enviroments|All|Not vuln|Fix| | | |[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| -|Contrast|Java Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| -|Contrast|On-premises (EOP) Environments|All|Not vuln|Fix| | | |[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| -|Contrast|Scan|All|Not vuln|Fix| | | |[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| -|ContrastSecurity|All| | | | | | |[ContrastSecurity Article](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| -|ControlUp|All|All|Not vuln|Fix| | | |[source](https://status.controlup.com/incidents/qqyvh7b1dz8k)| -|Copadata|Zenon product family|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.copadata.com/en/support-services/knowledge-base-faq/pare-products-in-the-zenon-product-family-affect-4921/)| -|Coralogix|All| |Not vuln|Fix| | | |[source](https://status.coralogix.com/incidents/zzfn8t0fzdy2?u=1q9952ycm1gr)| -|Couchbase|ElasticSearch connector|< 4.3.3 & < 4.2.13|Not vuln|Fix| | | |[source](https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402)| -|Coveo|On-Premises Crawling Module| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://docs.coveo.com/en/1756/news/coveo-platform-new-features#coveo-is-not-vulnerable-to-the-apache-log4j-rce)| -|Coveo|Platform (hosted services)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://docs.coveo.com/en/1756/news/coveo-platform-new-features#coveo-is-not-vulnerable-to-the-apache-log4j-rce)| -|cPanel|All| | |Workaround| | | |[source](https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/)| -|Cradlepoint|All| | | | | | |[Cradlepoint](https://cradlepoint.com/vulnerability-alerts/cve-2021-44228-apache-log4j-security-vulnerabilities/)| -|Crestron|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Crestron Advisory](https://www.crestron.com/Security/Security_Advisories/Apache-Log4j)| -|CrushFTP|All| | | | | | |[CrushFTP Link](https://www.crushftp.com/download.html)| -|Cryptshare|.NET API|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| -|Cryptshare|for Notes|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| -|Cryptshare|for NTA 7516|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| -|Cryptshare|for Outlook|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| -|Cryptshare|Java API|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| -|Cryptshare|Robot|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| -|Cryptshare|Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| -|Cyberark|Cloud Entitlements Manager| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Endpoint Privilege Manager (EPM) - Agents| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Endpoint Privilege Manager (EPM) - EPM Server (On-Premise)| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Endpoint Privilege Manager (EPM) - Service (SaaS)| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|HTML5 Gateway| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Identity - Mobile App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Identity - On-Premise Components| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Identity - Secure Web Sessions (SWS)| |Not vuln|Fix| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Identity - Service (SaaS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Legacy Sensitive Information Management (SIM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Marketplace components - Certified and Trusted Marketplace Components| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Marketplace components - CPM Plugins| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Marketplace components - PSM Connection Components| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|On-Demand Privileges Manager (OPM)| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|PAS Self Hosted (Vault, PVWA, CPM, PSM, PSMP)| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Privilege Cloud - On-Premise Components| | |Not vuln| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Contrast|Hosted SaaS Enviroments|All|Not vuln|Fix| | ||[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| +|Contrast|Java Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| +|Contrast|On-premises (EOP) Environments|All|Not vuln|Fix| | ||[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| +|Contrast|Scan|All|Not vuln|Fix| | ||[source](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| +|ContrastSecurity|All| | | | | ||[ContrastSecurity Article](https://support.contrastsecurity.com/hc/en-us/articles/4412612486548)| +|ControlUp|All|All|Not vuln|Fix| | ||[source](https://status.controlup.com/incidents/qqyvh7b1dz8k)| +|Copadata|Zenon product family|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.copadata.com/en/support-services/knowledge-base-faq/pare-products-in-the-zenon-product-family-affect-4921/)| +|Coralogix|All| |Not vuln|Fix| | ||[source](https://status.coralogix.com/incidents/zzfn8t0fzdy2?u=1q9952ycm1gr)| +|Couchbase|ElasticSearch connector|< 4.3.3 & < 4.2.13|Not vuln|Fix| | ||[source](https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402)| +|Coveo|On-Premises Crawling Module| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://docs.coveo.com/en/1756/news/coveo-platform-new-features#coveo-is-not-vulnerable-to-the-apache-log4j-rce)| +|Coveo|Platform (hosted services)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://docs.coveo.com/en/1756/news/coveo-platform-new-features#coveo-is-not-vulnerable-to-the-apache-log4j-rce)| +|cPanel|All| | |Workaround| | ||[source](https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/)| +|Cradlepoint|All| | | | | ||[Cradlepoint](https://cradlepoint.com/vulnerability-alerts/cve-2021-44228-apache-log4j-security-vulnerabilities/)| +|Crestron|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Crestron Advisory](https://www.crestron.com/Security/Security_Advisories/Apache-Log4j)| +|CrushFTP|All| | | | | ||[CrushFTP Link](https://www.crushftp.com/download.html)| +|Cryptshare|.NET API|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| +|Cryptshare|for Notes|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| +|Cryptshare|for NTA 7516|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| +|Cryptshare|for Outlook|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| +|Cryptshare|Java API|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| +|Cryptshare|Robot|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| +|Cryptshare|Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cryptshare.com/nl/support/cryptshare-support/)| +|Cyberark|Cloud Entitlements Manager| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Endpoint Privilege Manager (EPM) - Agents| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Endpoint Privilege Manager (EPM) - EPM Server (On-Premise)| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Endpoint Privilege Manager (EPM) - Service (SaaS)| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|HTML5 Gateway| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Identity - Mobile App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Identity - On-Premise Components| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Identity - Secure Web Sessions (SWS)| |Not vuln|Fix| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Identity - Service (SaaS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Legacy Sensitive Information Management (SIM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Marketplace components - Certified and Trusted Marketplace Components| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Marketplace components - CPM Plugins| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Marketplace components - PSM Connection Components| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|On-Demand Privileges Manager (OPM)| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|PAS Self Hosted (Vault, PVWA, CPM, PSM, PSMP)| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Privilege Cloud - On-Premise Components| | |Not vuln| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| |Cyberark|Privilege Cloud - Service (SaaS)| |Not vuln|Fix| | |Mitigation applied. No further action required by customers|[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Privileged Threat Analytics (PTA)| |Not vuln|Workaround| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228) [workaround](https://cyberark-customers.force.com/s/article/PTA-CVE-2021-44228-Mitigation-for-Privilege-Threat-Analytics)| -|Cyberark|Remote Access (Alero) - Connector| |Not vuln|Fix| | | |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Remote Access (Alero) - Mobile App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Privileged Threat Analytics (PTA)| |Not vuln|Workaround| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228) [workaround](https://cyberark-customers.force.com/s/article/PTA-CVE-2021-44228-Mitigation-for-Privilege-Threat-Analytics)| +|Cyberark|Remote Access (Alero) - Connector| |Not vuln|Fix| | ||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Remote Access (Alero) - Mobile App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| |Cyberark|Remote Access (Alero) - Service (SaaS)| |Not vuln|Fix| | |Mitigation applied. No further action required by customers|[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Secrets Manager Conjur Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cyberark|Secrets Manager Credential Providers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| -|Cybereason|All Cybereason products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228)| -|CyberRes|All| | | | | | |[CyberRes Community Link](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| -|Cydar Medical|EV system| | |Not Vuln| | | |[source](https://www.cydarmedical.com/news/cydar-response-to-apache-log4j-vulnerability)| +|Cyberark|Secrets Manager Conjur Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cyberark|Secrets Manager Credential Providers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228)| +|Cybereason|All Cybereason products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228)| +|CyberRes|All| | | | | ||[CyberRes Community Link](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| +|Cydar Medical|EV system| | |Not Vuln| | ||[source](https://www.cydarmedical.com/news/cydar-response-to-apache-log4j-vulnerability)| diff --git a/software/software_list_d.md b/software/software_list_d.md index 03ff5c06b..3cf4c3bab 100644 --- a/software/software_list_d.md +++ b/software/software_list_d.md @@ -7,363 +7,383 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|DarkTrace|All| | | | | | |[DarkTrace Customer Portal](https://customerportal.darktrace.com/inside-the-soc/get-article/201)| -|Dassault Systèmes|All| | | | | | |[Dassault Systemes Link](https://kb.dsxclient.3ds.com/mashup-ui/page/resultqa?id=QA00000102301e)| -|Databricks|All| | | | | | |[Databricks Google Doc](https://docs.google.com/document/d/e/2PACX-1vREjwZk17BAHGwj5Phizi4DPFS9EIUbAMX-CswlgbFwqwKXNKZC8MrT-L6wUgfIChsSHtvd_QD3-659/pub)| -|Datadog|Agent|>=6.17.0, <=6.32.2, >=7.17.0, <=7.32.2|Not vuln|Fix| | | |[Datadog Log4j Vulnerability Update](https://www.datadoghq.com/log4j-vulnerability/)| +|Daktronics|All Sport Pro| | | | | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Dakronics Media Player| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Dakronics Web Player|DWP-1000| |Vulnerable| | |DWP-1000 is not present in our codebase, but awaiting confirmation from LG re webOS platform.|[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Data Vision Software (DVS)| | | | | |DVS has one microservice that uses Log4j, but it uses a version that is not impacted.|[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Dynamic Messaging System (DMS)| | | | | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Dynamic Messaging System - DMS Core Player| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Dynamic Messaging System - DMS Player hardware| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Dynamic Messaging System - DMS Web Player| | | | | |DMS Web Player not present in our codebase, but awaiting confirmation from LG re webOS platform.|[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|IBoot - Dataprobe IBoot Devices| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Outdoor Smartlink Devices| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Routers - Cisco Meraki Z3/Z3c Routers| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Routers - Cisco Z1 Routers| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Routers - Sierra Wireless RV50x/RV50|A-3350704| |Vulnerable| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Show Control System (SCS)| | | | | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Vanguard| | | | | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Venus 1500| | | | | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Venus Control Suite (VCS)| | | | | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Video Image Processors| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Daktronics|Webcam - Mobotix| | |Not vuln| | ||[link](https://www.daktronics.com/en-us/support/kb/000025337)| +|Digital Alert Systems|All| | | | | |Formerly Monroe Electronics, Inc.|[link](https://www.digitalalertsystems.com/default-2.htm)| +|DarkTrace|All| | | | | ||[DarkTrace Customer Portal](https://customerportal.darktrace.com/inside-the-soc/get-article/201)| +|Dassault Systèmes|All| | | | | ||[Dassault Systemes Link](https://kb.dsxclient.3ds.com/mashup-ui/page/resultqa?id=QA00000102301e)| +|Databricks|All| | | | | ||[Databricks Google Doc](https://docs.google.com/document/d/e/2PACX-1vREjwZk17BAHGwj5Phizi4DPFS9EIUbAMX-CswlgbFwqwKXNKZC8MrT-L6wUgfIChsSHtvd_QD3-659/pub)| +|Datadog|Agent|>=6.17.0, <=6.32.2, >=7.17.0, <=7.32.2|Not vuln|Fix| | ||[Datadog Log4j Vulnerability Update](https://www.datadoghq.com/log4j-vulnerability/)| |DatadogHQ|Datadog Agent|6 < 6.32.3, 7 < 7.32.3|Not vuln|Fix| | |JMX monitoring component leverages an impacted version of log4j|[source](https://www.datadoghq.com/log4j-vulnerability/)| |DatadogHQ|datadog-kafka-connect-logs|< 1.0.2|Not vuln|Fix| | |Version 1.0.2 of the library uses version 2.16.0 of Log4j.|[source](https://www.datadoghq.com/log4j-vulnerability/)| |DatadogHQ|datadog-lambda-java|< 0.3.3 or < 1.4.0|Not vuln|Fix| | |following AWS’s recommendation, library updated using the latest version of amazon-lambda-java-log4j2 (1.4.0).|[source](https://www.datadoghq.com/log4j-vulnerability/)| -|Dataminer|All| | | | | | |[Dataminer Community Link](https://community.dataminer.services/responding-to-log4shell-vulnerability/)| -|DataNet Quality Systems|WinSPC| |Not vuln|Not vuln|Not vuln|Not vuln|Note: this is not WinSCP. This is a Statistical Process Control software.|| +|Dataminer|All| | | | | ||[Dataminer Community Link](https://community.dataminer.services/responding-to-log4shell-vulnerability/)| +|DataNet Quality Systems|WinSPC| |Not vuln|Not vuln|Not vuln|Not vuln|Note: this is not WinSCP. This is a Statistical Process Control software.|| |Datev|DATEV Mittelstand Faktura and DATEV Mittelstand Faktura mit Rechnungswesen compact| |Not vuln|Fix| | |German source|[source](https://apps.datev.de/help-left/documents/1022948)| |Datev|DATEV Wages and Salaries compact| |Not vuln|Fix| | |German source|[source](https://apps.datev.de/help-left/documents/1022948)| |Datev|DATEV-SmartIT| |Not vuln|Fix| | |German source|[source](https://apps.datev.de/help-left/documents/1022948)| |Datev|DATEVasp| |Not vuln|Fix| | |German source|[source](https://apps.datev.de/help-left/documents/1022948)| |Datev|Jasper Reports| |Not vuln|Fix| | |German source|[source](https://apps.datev.de/help-left/documents/1022948)| |Datev|Lawyer's mailbox| |Not vuln|Fix| | |German source|[source](https://apps.datev.de/help-left/documents/1022948)| -|Datto|All Datto products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.datto.com/blog/dattos-response-to-log4shell)| -|DBeaver|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://dbeaver.io/2021/12/15/log4shell-vulnerability-is-not-dangerous-for-dbeaver-users/)| -|dCache.org|All| | | | | | |[dCache.org Link](https://www.dcache.org/post/log4j-vulnerability/)| -|Debian|Apache-log4j.1.2|stretch, buster, bullseye|Not vuln|Fix| | | |[source](https://security-tracker.debian.org/tracker/CVE-2021-44228)| -|Debian|Apache-log4j2|stretch, buster, bullseye|Not vuln|Fix| | | |[source](https://security-tracker.debian.org/tracker/CVE-2021-44228)| -|Decos|Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| || -|Decos|EvenementenAssistent + InkomensAssistent + Leerlingenvervoer + AIM online|All|Not vuln|Not vuln|Not vuln|Not vuln| || -|Decos|Fixi|All|Not vuln|Not vuln|Not vuln|Not vuln| || -|Decos|Integrations (StUF/ZGW/Doclogic-DataIntegrator)|All|Not vuln|Not vuln|Not vuln|Not vuln| || -|Decos|JOIN Klant Contact|All|Not vuln|Not vuln|Not vuln|Not vuln| || +|Datto|All Datto products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.datto.com/blog/dattos-response-to-log4shell)| +|DBeaver|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://dbeaver.io/2021/12/15/log4shell-vulnerability-is-not-dangerous-for-dbeaver-users/)| +|dCache.org|All| | | | | ||[dCache.org Link](https://www.dcache.org/post/log4j-vulnerability/)| +|Debian|Apache-log4j.1.2|stretch, buster, bullseye|Not vuln|Fix| | ||[source](https://security-tracker.debian.org/tracker/CVE-2021-44228)| +|Debian|Apache-log4j2|stretch, buster, bullseye|Not vuln|Fix| | ||[source](https://security-tracker.debian.org/tracker/CVE-2021-44228)| +|Decos|Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||| +|Decos|EvenementenAssistent + InkomensAssistent + Leerlingenvervoer + AIM online|All|Not vuln|Not vuln|Not vuln|Not vuln||| +|Decos|Fixi|All|Not vuln|Not vuln|Not vuln|Not vuln||| +|Decos|Integrations (StUF/ZGW/Doclogic-DataIntegrator)|All|Not vuln|Not vuln|Not vuln|Not vuln||| +|Decos|JOIN Klant Contact|All|Not vuln|Not vuln|Not vuln|Not vuln||| |Decos|JOIN Zaak & Document (on-premise)|All|Not vuln|Workaround| | |The solution contains Elasticsearch (vulnerable). Mitigating actions available on our WIKI|[source](https://decos.freshdesk.com/a/solutions/articles/17000121598?lang=nl)| |Decos|JOIN Zaak & Document (Private Cloud)|All|Not vuln|Fix| | |The SaaS hosted solution contains Logstash + Elasticsearch (vulnerable). Mitigating actions taken|[source](https://decos.freshdesk.com/a/solutions/articles/17000121598?lang=nl)| -|Deepinstinct|All| | | | | | |[Deepinstinct Link](https://www.deepinstinct.com/blog/log4shell-cve-2021-44228-what-you-need-to-know)| -|Dell|Alienware Command Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Alienware OC Controls| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Alienware On Screen Display| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Alienware Update| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Deepinstinct|All| | | | | ||[Deepinstinct Link](https://www.deepinstinct.com/blog/log4shell-cve-2021-44228-what-you-need-to-know)| +|Dell|Alienware Command Center| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Alienware OC Controls| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Alienware On Screen Display| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Alienware Update| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|APEX Console| |Not vuln|Fix|Fix|Vulnerable|Cloud environment patched|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|APEX Data Storage Services| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Cloud environment patch in progress|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Atmos| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Avamar vproxy| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Azure Stack HCI| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|BSAFE Crypto-C Micro Edition| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|BSAFE Crypto-J| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|BSAFE Micro Edition Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Calibration Assistant| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|CalMAN Powered Calibration Firmware| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|CalMAN Ready for Dell| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Centera| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Chameleon Linux Based Diagnostics| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Chassis Management Controller (CMC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|China HDD Deluxe| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Cinema Color| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Client Platforms (Latitude, OptiPlex, Alienware, Inspiron, Precision, XPS, Vostro, ChengMing) BIOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Cloud Command Repository Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Atmos| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Avamar vproxy| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Azure Stack HCI| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|BSAFE Crypto-C Micro Edition| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|BSAFE Crypto-J| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|BSAFE Micro Edition Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Calibration Assistant| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|CalMAN Powered Calibration Firmware| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|CalMAN Ready for Dell| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Centera| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Chameleon Linux Based Diagnostics| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Chassis Management Controller (CMC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|China HDD Deluxe| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Cinema Color| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Client Platforms (Latitude, OptiPlex, Alienware, Inspiron, Precision, XPS, Vostro, ChengMing) BIOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Cloud Command Repository Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|Cloud IQ| |Not vuln|Fix|Fix|Vulnerable|Cloud environment patched|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Cloud Management Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Cloud Mobility for Dell EMC Storage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Cloud Tiering Appliance| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Color Management| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Command Configure| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Command Integration Suite for System Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Command Intel vPro Out of Band| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Command Monitor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Command Power Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Command PowerShell Provider| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Command Update| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Common Event Enabler| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Connectrix (Cisco MDS 9000 switches)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Cloud Management Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Cloud Mobility for Dell EMC Storage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Cloud Tiering Appliance| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Color Management| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Command Configure| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Command Integration Suite for System Center| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Command Intel vPro Out of Band| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Command Monitor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Command Power Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Command PowerShell Provider| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Command Update| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Common Event Enabler| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Connectrix (Cisco MDS 9000 switches)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|Connectrix (Cisco MDS DCNM)| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/23/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Connectrix B-Series SANnav|2.1.1|Not vuln|Workaround|Workaround|Vulnerable|"See DSA-2021-266"|[source](https://www.dell.com/support/kbdoc/nl-nl/000194461/dsa-2021-266-dell-emc-connectrix-b-series-sannav-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|Connextrix B Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Customer Connect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|CyberSecIQ Application| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|CyberSense for PowerProtect Cyber Recovery| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Data Domain OS|7.3.0.5 to 7.7.0.6, 7.6.0.5 to 7.6.0.20, 7.3.0.5 to 7.7.0.6|Not vuln|Workaround|Workaround|Vulnerable|"See DSA-2021-274"|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Data Guardian*| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Data Protection*| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Data Recovery Environment| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Data Vault| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Data Vault for Chrome OS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Dell EMC PowerMax VMAX VMAX3 and VMAX AFA| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Dell EMC PowerSwitch Z9264F-ON BMC Dell EMC PowerSwitch Z9432F-ON BMC| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Deployment Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Digital Delivery| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Direct USB Key| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Display Manager 1.5 for Windows / macOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Display Manager 2.0 for Windows / macOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Dream Catcher| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|DUP Creation Service| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|DUP Framework (ISG)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Embedded NAS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Embedded Service Enabler| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC AppSync| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Avamar|18.2, 19.1, 19.2, 19.3, 19.4|Not vuln|Workaround|Workaround|Vulnerable|"See DSA-2021-277"|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC BSN Controller Node| |Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194631/dsa-2021-305-dell-emc-bsn-controller-node-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|Connectrix B-Series SANnav|2.1.1|Not vuln|Workaround|Workaround|Vulnerable|https://www.dell.com/support/kbdoc/nl-nl/000194461/dsa-2021-266-dell-emc-connectrix-b-series-sannav-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 See DSA-2021-266|[source](https://www.dell.com/support/kbdoc/nl-nl/000194461/dsa-2021-266-dell-emc-connectrix-b-series-sannav-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|Connextrix B Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Customer Connect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|CyberSecIQ Application| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|CyberSense for PowerProtect Cyber Recovery| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Data Domain OS|7.3.0.5 to 7.7.0.6, 7.6.0.5 to 7.6.0.20, 7.3.0.5 to 7.7.0.6|Not vuln|Workaround|Workaround|Vulnerable|See DSA-2021-274|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Data Guardian*| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Data Protection*| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Data Recovery Environment| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Data Vault| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Data Vault for Chrome OS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerMax VMAX VMAX3 and VMAX AFA| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerSwitch Z9264F-ON BMC EMC PowerSwitch Z9432F-ON BMC| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Deployment Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Digital Delivery| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Direct USB Key| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Display Manager 1.5 for Windows / macOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Display Manager 2.0 for Windows / macOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Dream Catcher| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|DUP Creation Service| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|DUP Framework (ISG)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Embedded NAS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Embedded Service Enabler| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC AppSync| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Avamar|18.2, 19.1, 19.2, 19.3, 19.4|Not vuln|Workaround|Workaround|Vulnerable|https://www.dell.com/support/kbdoc/nl-nl/000194480/dsa-2021-277-dell-emc-avamar-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 See DSA-2021-277|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC BSN Controller Node| |Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194631/dsa-2021-305-dell-emc-bsn-controller-node-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|EMC Cloud Disaster Recovery| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch pending|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Cloudboost| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC CloudLink| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Container Storage Modules| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Data Computing Appliance (DCA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Data Protection Advisor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Data Protection Central|Versions before 19.5.0.7|Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194557/dsa-2021-269-dell-emc-data-protection-central-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC Cloudboost| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC CloudLink| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Container Storage Modules| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Data Computing Appliance (DCA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Data Protection Advisor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Data Protection Central|Versions before 19.5.0.7|Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194557/dsa-2021-269-dell-emc-data-protection-central-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|EMC Data Protection Search|Versions before 19.6|Not vuln|Fix/Workaround|Fix/Workaround|Vulnerable|TBD (link will be updated when it becomes available)|[source](https://www.dell.com/support/kbdoc/nl-nl/000194629/dsa-2021-279-dell-emc-data-protection-search-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC DataIQ| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Disk Library for Mainframe| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC ECS|3.3.x, 3.4.x, 3.5.x, and 3.6.x|Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194612/dsa-2021-273-dell-emc-ecs-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC Enterprise Storage Analytics for vRealize Operations|Versions before 6.0.0, Version 6.1.0, Versions 6.2.x|Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194488/dsa-2021-278)| -|Dell|EMC GeoDrive| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC DataIQ| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Disk Library for Mainframe| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC ECS|3.3.x, 3.4.x, 3.5.x, and 3.6.x|Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194612/dsa-2021-273-dell-emc-ecs-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC Enterprise Storage Analytics for vRealize Operations|Versions before 6.0.0, Version 6.1.0, Versions 6.2.x|Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194488/dsa-2021-278)| +|Dell|EMC GeoDrive| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|EMC Integrated System for Azure Stack HCI| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Refer to DSA for product updates|[source](https://www.dell.com/support/kbdoc/nl-nl/000194622/dsa-2021-307-dell-emc-integrated-system-for-azure-stack-hci-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|EMC Integrated System for Microsoft Azure Stack Hub| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch pending|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Isilon InsightIQ| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC License Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Metro Node|Metro Node OS 7.0.x|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194630/dsa-2021)| +|Dell|EMC Isilon InsightIQ| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC License Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Metro Node|Metro Node OS 7.0.x|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194630/dsa-2021)| |Dell|EMC NetWorker|19.3.x, 19.4.x, 19.5.x|Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/20/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|EMC NetWorker Server|19.5.x 19.4.x 19.3.x| |Vulnerable| | |Patch expected by 12/20/21|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|EMC NetWorker VE|19.3.x, 19.4.x, 19.5.x|Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/20/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|EMC NetWorker Virtual Edition|19.5.x 19.4.x 19.3.x| |Vulnerable| | |Patch expected by 12/20/21|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Networking Onie| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Networking Virtual Edge Platform with VersaOS| |Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194621/dsa-2021-304-dell-emc-networking-virtual-edge-platform-with-versaos-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC OpenManage Ansible Modules| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Networking Onie| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Networking Virtual Edge Platform with VersaOS| |Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194621/dsa-2021-304-dell-emc-networking-virtual-edge-platform-with-versaos-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC OpenManage Ansible Modules| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|EMC OpenManage Enterprise Services| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/20/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC OpenManage integration for Splunk| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC OpenManage Integration for VMware vCenter| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC OpenManage Management pack for vRealize Operations| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC OpenManage Operations Connector for Micro Focus Operations Bridge Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerFlex Appliance| |Not vuln|Workaround|Workaround|Vulnerable|"See DSA-2021-293"|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerFlex Rack|RCM 3.3 train: all versions up to 3.3.11.0, RCM 3.4 train: all versions up to 3.4.6.0, RCM 3.5 train: all versions up to 3.5.6.0, RCM 3.6 train: all versions up to 3.6.2.0|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194578/dsa-2021-292-dell-powerflex-rack-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC PowerFlex Software (SDS)|3.5, 3.5.1, 3.5.1.1, 3.5.1.2, 3.5.1.3, 3.5.1.4, 3.6, 3.6.0.1, 3.6.0.2|Not vuln|Workaround|Workaround|Vulnerable|"See DSA-2021-272"|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerMax, VMAX, VMAX3, and VMAX AFA| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerPath| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerPath Management Appliance| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerProtect Cyber Recovery| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerProtect Data Manager|All versions 19.9 and earlier|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194549/dsa-2021-286-dell-emc-power-protect-data-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC PowerProtect DP Series Appliance (iDPA)|2.7.0 and earlier|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194532/dsa-2021-285-dell-emc-integrated-data-protection-appliance-powerprotect-dp-series-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC PowerScale OneFS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerShell for PowerMax| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerShell for Powerstore| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerShell for Unity| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC OpenManage integration for Splunk| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC OpenManage Integration for VMware vCenter| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC OpenManage Management pack for vRealize Operations| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC OpenManage Operations Connector for Micro Focus Operations Bridge Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerFlex Appliance| |Not vuln|Workaround|Workaround|Vulnerable|https://www.dell.com/support/kbdoc/nl-nl/000194579/dsa-2021-293-dell-powerflex-appliance-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 See DSA-2021-293|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerFlex Rack|RCM 3.3 train: all versions up to 3.3.11.0, RCM 3.4 train: all versions up to 3.4.6.0, RCM 3.5 train: all versions up to 3.5.6.0, RCM 3.6 train: all versions up to 3.6.2.0|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194578/dsa-2021-292-dell-powerflex-rack-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC PowerFlex Software (SDS)|3.5, 3.5.1, 3.5.1.1, 3.5.1.2, 3.5.1.3, 3.5.1.4, 3.6, 3.6.0.1, 3.6.0.2|Not vuln|Workaround|Workaround|Vulnerable|https://www.dell.com/support/kbdoc/nl-nl/000194548/dsa-2021-272-dell-powerflex-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 See DSA-2021-272|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerMax, VMAX, VMAX3, and VMAX AFA| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerPath| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerPath Management Appliance| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerProtect Cyber Recovery| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerProtect Data Manager|All versions 19.9 and earlier|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194549/dsa-2021-286-dell-emc-power-protect-data-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC PowerProtect DP Series Appliance (iDPA)|2.7.0 and earlier|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194532/dsa-2021-285-dell-emc-integrated-data-protection-appliance-powerprotect-dp-series-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC PowerScale OneFS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerShell for PowerMax| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerShell for Powerstore| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerShell for Unity| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|EMC PowerStore| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/23/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerSwitch Z9264F-ON BMC, Dell EMC PowerSwitch Z9432F-ON BMC| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerVault MD3 Series Storage Arrays| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC PowerVault ME4 Series Storage Arrays| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC RecoverPoint|All 5.0.x and later versions, All 5.1.x and later versions|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194531/dsa-2021-284-dell-emc-recoverpoint-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC PowerSwitch Z9264F-ON BMC, Dell EMC PowerSwitch Z9432F-ON BMC| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerVault MD3 Series Storage Arrays| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC PowerVault ME4 Series Storage Arrays| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC RecoverPoint|All 5.0.x and later versions, All 5.1.x and later versions|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194531/dsa-2021-284-dell-emc-recoverpoint-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|EMC RecoverPoint Classic|All 5.1.x and later versions| |Vulnerable| | |Patch pending|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|EMC RecoverPoint for Virtual Machine|All 5.0.x and later versions| |Vulnerable| | |Patch pending|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Repository Manager (DRM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Ruckus SmartZone 100 Controller| |Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC Ruckus SmartZone 300 Controller| |Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC Ruckus Virtual Software| |Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|EMC SourceOne| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Repository Manager (DRM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Ruckus SmartZone 100 Controller| |Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC Ruckus SmartZone 300 Controller| |Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC Ruckus Virtual Software| |Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC SourceOne| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|EMC SRM vApp|Versions before 4.6.0.2|Not vuln|Workaround|Workaround|Vulnerable|Patch expected by 1/25/2022|[source](https://www.dell.com/support/kbdoc/nl-nl/000194613/dsa-2021-301)| |Dell|EMC Streaming Data Platform| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/18/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Systems Update (DSU)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC Unisphere 360| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Systems Update (DSU)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC Unisphere 360| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|EMC Unity| |Not vuln|Workaround|Workaround|Workaround|Dell Artikelnummer: 000194826, DSA-2021-294|[source](https://www.dell.com/support/kbdoc/nl-nl/000194826/dsa-2021-294-dell-emc-unity-dell-emc-unityvsa-and-dell-emc-unity-xt-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046-and-cve-2021-45105)| -|Dell|EMC Virtual Storage Integrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC VPLEX| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC VxRail|4.5.x versions, 4.7.x versions, 7.0.x versions|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194466/dsa-2021-265-dell-emc-vxrail-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|EMC Virtual Storage Integrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC VPLEX| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC VxRail|4.5.x versions, 4.7.x versions, 7.0.x versions|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194466/dsa-2021-265-dell-emc-vxrail-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|EMC XC| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch pending|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|EMC XtremIO| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Encryption Enterprise*| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Encryption Personal*| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Endpoint Security Suite Enterprise*| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|EMC XtremIO| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Encryption Enterprise*| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Encryption Personal*| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Endpoint Security Suite Enterprise*| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|Enterprise Hybrid Cloud|4.1.2|Not vuln|Not vuln|Not vuln|Not vuln|Refer to DSA for product updates|[source](https://www.dell.com/support/kbdoc/nl-nl/000194490/dsa-2021-270-enterprise-hybrid-cloud-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|Equallogic PS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Fluid FS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Hybrid Client| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|iDRAC Service Module (iSM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|ImageAssist| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Infinity MLK (firmware)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Insights Client| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Integrated Dell Remote Access Controller (iDRAC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|ISG Accelerators| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|ISG Board & Electrical| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|ISG Comms| |Not vuln|Investigation|Investigation|Investigation| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|ISG Memory| |Not vuln|Investigation|Investigation|Investigation| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|IsilonSD Management Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|IVE-WinDiag| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Linux Assistant| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Mainframe Enablers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|MDS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Mobile Connect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Monitor ISP (Windows/Mac/Linux)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Monitor SDK| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|My Dell| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|My Dell Mobile| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|MyDell Mobile| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|NetWorker Management Console| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking BIOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking DIAG| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking N-Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking OS 10| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking OS 9| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking OS9| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking SD-WAN Edge SD-WAN| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking W-Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Networking X-Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OMIMSSC (OpenManage Integration for Microsoft System Center)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OMNIA| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Open Manage Mobile| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Open Manage Server Administrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Open Management Enterprise - Modular|Versions before 1.40.10|Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194625/dsa-2021-268-dell-emc-openmanage-enterprise-modular-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|OpenManage Change Management| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Connections - Nagios| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Connections - ServiceNow| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Connections-Nagios| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Connections-ServiceNow| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Equallogic PS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Fluid FS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Hybrid Client| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|iDRAC Service Module (iSM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|ImageAssist| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Infinity MLK (firmware)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Insights Client| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Integrated Dell Remote Access Controller (iDRAC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|ISG Accelerators| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|ISG Board & Electrical| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|ISG Comms| |Not vuln|Investigation|Investigation|Investigation||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|ISG Memory| |Not vuln|Investigation|Investigation|Investigation||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|IsilonSD Management Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|IVE-WinDiag| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Linux Assistant| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Mainframe Enablers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|MDS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Mobile Connect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Monitor ISP (Windows/Mac/Linux)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Monitor SDK| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|My Dell| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|My Dell Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|MyDell Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|NetWorker Management Console| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking BIOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking DIAG| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking N-Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking OS 10| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking OS 9| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking OS9| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking SD-WAN Edge SD-WAN| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking W-Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Networking X-Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OMIMSSC (OpenManage Integration for Microsoft System Center)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OMNIA| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Open Manage Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Open Manage Server Administrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Open Management Enterprise - Modular|Versions before 1.40.10|Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194625/dsa-2021-268-dell-emc-openmanage-enterprise-modular-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|OpenManage Change Management| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Connections - Nagios| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Connections - ServiceNow| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Connections-Nagios| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Connections-ServiceNow| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|OpenManage Enterprise| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/19/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Enterprise Power Manager Plugin| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Essentials| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Integration for Microsoft System Center for System Center Operations Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Integration with Microsoft Windows Admin Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OpenManage Network Integration| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Optimizer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|OS Recovery Tool| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Peripheral Manager 1.4 / 1.5 for Windows| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Peripheral Manager 1.4/1.5 for Windows| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Platform Service| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Power Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Power Manager Lite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PowerConnect N3200| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PowerConnect PC2800| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PowerConnect PC8100| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PowerEdge BIOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PowerEdge Operating Systems| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PowerTools Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PPDM Kubernetes cProxy| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|PPDM VMware vProxy| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Precision Optimizer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Precision Optimizer for Linux| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Premier Color| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Recovery (Linux)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Redtail| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Remediation Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Remote Execution Engine (DRONE)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Remotely Anywhere| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Riptide (firmware)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Rugged Control Center (RCC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SD ROM Utility| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SDNAS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Secure Connect Gateway (SCG) Appliance|5.00.00, 5.00.05, and 4.0.06 and earlier versions (OVF and VHD)|Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194624/dsa-2021-282-dell-emc-secure-connect-gateway-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|Secure Connect Gateway (SCG) Policy Manager|5.00.00.10, 5.00.05.10|Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194539/dsa-2021-281-dell-emc-policy-manager-for-secure-connect-gateway-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|Security Advisory Update - DSA-2021-088| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Security Advisory Update-DSA-2021-088| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Security Management Server & Security Management Server Virtual*| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Security Management Server & Dell Security Management Server Virtual*| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Server Storage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Smart Fabric Storage Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SmartByte| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SMI-S| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Software RAID| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Solutions Enabler| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Solutions Enabler vApp| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Sonic| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SRS Policy Manager|7.0|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194544/dsa-2021-287-dell-emc-srs-policy-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|SRS VE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Enterprise Power Manager Plugin| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Essentials| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Integration for Microsoft System Center for System Center Operations Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Integration with Microsoft Windows Admin Center| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OpenManage Network Integration| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Optimizer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|OS Recovery Tool| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Peripheral Manager 1.4 / 1.5 for Windows| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Peripheral Manager 1.4/1.5 for Windows| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Platform Service| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Power Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Power Manager Lite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PowerConnect N3200| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PowerConnect PC2800| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PowerConnect PC8100| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PowerEdge BIOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PowerEdge Operating Systems| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PowerTools Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PPDM Kubernetes cProxy| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|PPDM VMware vProxy| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Precision Optimizer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Precision Optimizer for Linux| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Premier Color| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Recovery (Linux)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Redtail| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Remediation Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Remote Execution Engine (DRONE)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Remotely Anywhere| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Riptide (firmware)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Rugged Control Center (RCC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SD ROM Utility| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SDNAS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Secure Connect Gateway (SCG) Appliance|5.00.00, 5.00.05, and 4.0.06 and earlier versions (OVF and VHD)|Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194624/dsa-2021-282-dell-emc-secure-connect-gateway-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|Secure Connect Gateway (SCG) Policy Manager|5.00.00.10, 5.00.05.10|Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194539/dsa-2021-281-dell-emc-policy-manager-for-secure-connect-gateway-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|Security Advisory Update - DSA-2021-088| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Security Advisory Update-DSA-2021-088| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Security Management Server & Security Management Server Virtual*| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Security Management Server & Dell Security Management Server Virtual*| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Server Storage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Smart Fabric Storage Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SmartByte| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SMI-S| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Software RAID| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Solutions Enabler| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Solutions Enabler vApp| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Sonic| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SRS Policy Manager|7.0|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194544/dsa-2021-287-dell-emc-srs-policy-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|SRS VE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|Storage Center - Dell Storage Manager| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch pending|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Storage Center OS and additional SC applications unless otherwise noted| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SupportAssist Client Commercial| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SupportAssist Client Consumer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Storage Center OS and additional SC applications unless otherwise noted| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SupportAssist Client Commercial| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SupportAssist Client Consumer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|SupportAssist Enterprise| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 12/23/21|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|SupportAssist SOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Thin OS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Threat Defense| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|True Color| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Trusted Device| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|UCC Edge| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|SupportAssist SOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Thin OS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Threat Defense| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|True Color| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Trusted Device| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|UCC Edge| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|Unisphere Central| |Not vuln|Vulnerable|Vulnerable|Vulnerable|Patch expected by 1/10/2022|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Unisphere for PowerMax| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Unisphere for PowerMax vApp| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Unisphere for VMAX| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Unisphere for VNX| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Update| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Update Manager Plugin| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Vblock| |Not vuln|Vulnerable|Vulnerable|Vulnerable|"See vce6771 (requires customer login)"|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|ViPR Controller| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Unisphere for PowerMax| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Unisphere for PowerMax vApp| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Unisphere for VMAX| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Unisphere for VNX| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Update| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Update Manager Plugin| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Vblock| |Not vuln|Vulnerable|Vulnerable|Vulnerable|https://support-dellemc-com.secure.force.com/ See vce6771 (requires customer login)|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|ViPR Controller| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|VMware vRealize Automation 8.x|8.2 8.3 8.4 8.5 and 8.6| |Vulnerable| | |Patch expected by 12/19/21|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|VMware vRealize Orchestrator 8.x|8.2 8.3 8.4 8.5 and 8.6| |Vulnerable| | |Patch expected by 12/19/21|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|VNX Control Station| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|VNX1| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|VNX2| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|VNXe 1600|Versions 3.1.16.10220572 and earlier|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194605/dsa-2021-299-dell-emc-vnxe1600-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228?lang=en)| -|Dell|VNXe 3200|Version 3.1.15.10216415 and earlier|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194606/dsa-2021-298-dell-emc-vnxe3200-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228?lang=en)| -|Dell|VPLEX VS2/VS6 / VPLEX Witness| |Not vuln|Not vuln|Not vuln|Not vuln| |[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|VPLEX VS2/VS6/VPLEX Witness| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|vRealize Data Protection Extension Data Management|version 19.6, version 19.7, version 19.8, and version 19.9|Not vuln|Fix/Workaround|Fix/Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194614/dsa-2021-290-dell-emc-vrealize-data-protection-extension-for-vrealize-automation-vra-8-x-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|VNX Control Station| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|VNX1| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|VNX2| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|VNXe 1600|Versions 3.1.16.10220572 and earlier|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194605/dsa-2021-299-dell-emc-vnxe1600-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228?lang=en)| +|Dell|VNXe 3200|Version 3.1.15.10216415 and earlier|Not vuln|Workaround|Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194606/dsa-2021-298-dell-emc-vnxe3200-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228?lang=en)| +|Dell|VPLEX VS2/VS6 / VPLEX Witness| |Not vuln|Not vuln|Not vuln|Not vuln||[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|VPLEX VS2/VS6/VPLEX Witness| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|vRealize Data Protection Extension Data Management|version 19.6, version 19.7, version 19.8, and version 19.9|Not vuln|Fix/Workaround|Fix/Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194614/dsa-2021-290-dell-emc-vrealize-data-protection-extension-for-vrealize-automation-vra-8-x-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| |Dell|vRealize Data Protection Extension for vRealize Automation (vRA) 8.x|version 19.6 version 19.7 version 19.8 and version 19.9|Not vuln|Fix| | |Patch expected by 12/19/21|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage|Version 1.2.3 or earlier, Version 1.1.0 or earlier, Version 1.1.4 or earlier, Version 1.0.7 or earlier, Version 4.1.2 or earlier|Not vuln|Fix/Workaround|Fix/Workaround|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194610/dsa-2021-300)| +|Dell|vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage|Version 1.2.3 or earlier, Version 1.1.0 or earlier, Version 1.1.4 or earlier, Version 1.0.7 or earlier, Version 4.1.2 or earlier|Not vuln|Fix/Workaround|Fix/Workaround|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194610/dsa-2021-300)| |Dell|vRO Plugin for Dell EMC PowerMax|Version 1.2.3 or earlier|Not vuln|Fix| | |See DSA-2021-300|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|vRO Plugin for Dell EMC PowerScale|Version 1.1.0 or earlier|Not vuln|Fix| | |See DSA-2021-300|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|vRO Plugin for Dell EMC PowerStore|Version 1.1.4 or earlier| |Vulnerable| | |See DSA-2021-300|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|vRO Plugin for Dell EMC Unity|Version 1.0.6 or earlier| |Vulnerable| | |See DSA-2021-300|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Dell|vRO Plugin for Dell EMC XtremIO|Version 4.1.2 or earlier| |Vulnerable| | |See DSA-2021-300|[Dell Response to Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)](https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Vsan Ready Nodes| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|VxBlock| |Not vuln|Vulnerable|Vulnerable|Vulnerable|"See vce6771 (requires customer login)"|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Warnado MLK (firmware)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Wyse Management Suite|Version 3.5 and earlier|Not vuln|Fix|Fix|Vulnerable| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194459/dsa-2021-267-dell-wyse-management-suite-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| -|Dell|Wyse Proprietary OS (ThinOS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| -|Dell|Wyse Windows Embedded Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Vsan Ready Nodes| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|VxBlock| |Not vuln|Vulnerable|Vulnerable|Vulnerable|https://support-dellemc-com.secure.force.com/ See vce6771 (requires customer login)|[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Warnado MLK (firmware)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Wyse Management Suite|Version 3.5 and earlier|Not vuln|Fix|Fix|Vulnerable||[source](https://www.dell.com/support/kbdoc/nl-nl/000194459/dsa-2021-267-dell-wyse-management-suite-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)| +|Dell|Wyse Proprietary OS (ThinOS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| +|Dell|Wyse Windows Embedded Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability)| |Deltares|Delft-FEWS|>2018.02|Not vuln|Fix| | |Mitigations Only|[Deltares Advisory](https://publicwiki.deltares.nl/display/FEWSDOC/Delft-FEWS+and+Log4J+vulnerability)| -|Denequa|All| | | | | | |[Denequa Link](https://denequa.de/log4j-information.html)| -|Device42|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.device42.com/2021/12/13/log4j-zero-day/)| -|Devolutions|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.devolutions.net/2021/12/critical-vulnerability-in-log4j/)| -|Diebold Nixdorf|All| | | | | | |[Diebold Nixdorf Link](https://www.dieboldnixdorf.com/en-us/apache)| -|Digi International|AnywhereUSB Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|ARMT| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Aview| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|AVWOB| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|CTEK G6200 family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|CTEK SkyCloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|CTEK Z45 family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi 54xx family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi 63xx family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi AnywhereUSB (G2) family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi AnywhereUSB Plus family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Connect EZ family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Connect family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Connect IT family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Connect Sensor family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Connect WS family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi ConnectPort family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi ConnectPort LTS family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Embedded Android| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Embedded Yocto| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi EX routers| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi IX routers| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi LR54| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Navigator| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi One family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Passport family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi PortServer TS family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Remote Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi TX routers| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi WR11| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi WR21| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi WR31| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi WR44R/RR| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi WR54| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi WR64| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Digi Xbee mobile app| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Lighthouse| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Realport| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digi International|Remote Hub Config Utility| |Not vuln|Not vuln|Not vuln|Not vuln| |[Digi International Advisory Link](https://www.digi.com/resources/security)| -|Digicert|All| | | | | | |[Digicert Link](https://knowledge.digicert.com/alerts/digicert-log4j-response.html)| -|Digital AI|All| | | | | | |[Digital AI Article](https://support.digital.ai/hc/en-us/articles/4412377686674-Log4J-Vulnerability-to-Zero-Day-Exploit-and-Digital-ai#overview-0-1)| +|Denequa|All| | | | | ||[Denequa Link](https://denequa.de/log4j-information.html)| +|Device42|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.device42.com/2021/12/13/log4j-zero-day/)| +|Devolutions|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.devolutions.net/2021/12/critical-vulnerability-in-log4j/)| +|Diebold Nixdorf|All| | | | | ||[Diebold Nixdorf Link](https://www.dieboldnixdorf.com/en-us/apache)| +|Digi International|AnywhereUSB Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|ARMT| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Aview| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|AVWOB| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|CTEK G6200 family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|CTEK SkyCloud| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|CTEK Z45 family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi 54xx family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi 63xx family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi AnywhereUSB (G2) family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi AnywhereUSB Plus family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Connect EZ family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Connect family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Connect IT family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Connect Sensor family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Connect WS family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi ConnectPort family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi ConnectPort LTS family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Embedded Android| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Embedded Yocto| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi EX routers| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi IX routers| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi LR54| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Navigator| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi One family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Passport family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi PortServer TS family| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Remote Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi TX routers| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi WR11| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi WR21| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi WR31| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi WR44R/RR| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi WR54| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi WR64| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Digi Xbee mobile app| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Lighthouse| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Realport| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digi International|Remote Hub Config Utility| |Not vuln|Not vuln|Not vuln|Not vuln||[Digi International Advisory Link](https://www.digi.com/resources/security)| +|Digicert|All| | | | | ||[Digicert Link](https://knowledge.digicert.com/alerts/digicert-log4j-response.html)| +|Digital AI|All| | | | | ||[Digital AI Article](https://support.digital.ai/hc/en-us/articles/4412377686674-Log4J-Vulnerability-to-Zero-Day-Exploit-and-Digital-ai#overview-0-1)| |DirectAdmin|All| |Not vuln|Not vuln|Not vuln|Not vuln|Invidivual plugins not developed as part of DirectAdmin core may be vulnerable.|[source](https://forum.directadmin.com/threads/new-zero-day-exploit-for-log4j-java-library-is-an-enterprise-nightmare.65173/post-339723)| -|DNSFilter|All| | | | | | |[DNSFilter Blog Post](https://www.dnsfilter.com/blog/dnsfilter-response-to-log4j-vulnerability)| +|DNSFilter|All| | | | | ||[DNSFilter Blog Post](https://www.dnsfilter.com/blog/dnsfilter-response-to-log4j-vulnerability)| |Docker|infrastructure| |Not vuln|Not vuln|Not vuln|Not vuln|Docker infrastructure not vulnerable, Docker images could be vulnerable. For more info see source.|[source](https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/)| -|Docusign|All| | | | | | |[Docusign Alert](https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability)| -|DotCMS|Hybrid Content Management System| |Not vuln|Fix| | | |[source](https://github.com/dotCMS/core/issues/21393)| -|Dräger|All Medical Devices| | |Not vuln| | | |[source](https://static.draeger.com/security)| -|Draytek|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.draytek.com/about/security-advisory/log4shell-vulnerability-(cve-2021-44228)/)| +|Docusign|All| | | | | ||[Docusign Alert](https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability)| +|DotCMS|Hybrid Content Management System| |Not vuln|Fix| | ||[source](https://github.com/dotCMS/core/issues/21393)| +|Dräger|All Medical Devices| | |Not vuln| | ||[source](https://static.draeger.com/security)| +|Draytek|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.draytek.com/about/security-advisory/log4shell-vulnerability-(cve-2021-44228)/)| |Dropwizard|All| |Not vuln|Not vuln|Not vuln|Not vuln|Only vulnerable if you manually added Log4j|[source](https://twitter.com/dropwizardio/status/1469285337524580359)| -|DSpace|All| | | | | | |[DSpace Google Group](https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE)| -|Dynatrace|ActiveGate| |Not vuln|Not vuln|Not vuln|Not vuln| |[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| -|Dynatrace|ActiveGates|1.229.49.20211210-165018, 1.227.31.20211210-164955, 1.225.29.20211210-164930, 1.223.30.20211210-164926|Not vuln|Fix| | | |[source](https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282)| -|Dynatrace|Cloud Services| |Not vuln|Fix| | | |[source](https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282)| +|DSpace|All| | | | | ||[DSpace Google Group](https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE)| +|Dynatrace|ActiveGate| |Not vuln|Not vuln|Not vuln|Not vuln||[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| +|Dynatrace|ActiveGates|1.229.49.20211210-165018, 1.227.31.20211210-164955, 1.225.29.20211210-164930, 1.223.30.20211210-164926|Not vuln|Fix| | ||[source](https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282)| +|Dynatrace|Cloud Services| |Not vuln|Fix| | ||[source](https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282)| |Dynatrace|Extensions| |Not vuln|Fix| | |Please see Dynatrace Communication for details|[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| -|Dynatrace|FedRamp SAAS| |Not vuln|Fix| | | |[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| +|Dynatrace|FedRamp SAAS| |Not vuln|Fix| | ||[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| |Dynatrace|Managed cluster nodes| |Not vuln|Not vuln|Not vuln|Not vuln|Please see Dynatrace Communication for details|[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| -|Dynatrace|OneAgent| |Not vuln|Not vuln|Not vuln|Not vuln| |[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| -|Dynatrace|SAAS| |Not vuln|Fix| | | |[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| +|Dynatrace|OneAgent| |Not vuln|Not vuln|Not vuln|Not vuln||[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| +|Dynatrace|SAAS| |Not vuln|Fix| | ||[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| |Dynatrace|Synthetic Private ActiveGate| |Not vuln|Fix| | |Please see Dynatrace Communication for details|[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| -|Dynatrace|Synthetic public locations| |Not vuln|Fix| | | |[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| +|Dynatrace|Synthetic public locations| |Not vuln|Fix| | ||[Official Dynatrace Communication](https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/)| diff --git a/software/software_list_e.md b/software/software_list_e.md index d5f4b61a9..5493ac97f 100644 --- a/software/software_list_e.md +++ b/software/software_list_e.md @@ -7,163 +7,163 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|EAL|ATS Classic|All| |Not vuln| | | || -|EasyRedmine|All| | | | | | |[EasyRedmine News](https://www.easyredmine.com/news/easy-redmine-application-is-not-affected-by-the-vulnerability-cve-2021-44228)| -|Eaton|Power Protector|1.68| |Fix| | | |[source](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Security-Bulletin%20log4j_CVE_2021_44228_v1.0_Legal-Approved.pdf)| +|EAL|ATS Classic|All| |Not vuln| | ||| +|EasyRedmine|All| | | | | ||[EasyRedmine News](https://www.easyredmine.com/news/easy-redmine-application-is-not-affected-by-the-vulnerability-cve-2021-44228)| +|Eaton|Power Protector|1.68| |Fix| | ||[source](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Security-Bulletin%20log4j_CVE_2021_44228_v1.0_Legal-Approved.pdf)| |Eaton|Undisclosed|Undisclosed| |Vulnerable| | |Doesn't openly disclose what products are affected or not for quote 'security purposes'. Needs email registration. No workaround provided due to registration wall.|[Security Bulletin](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-Security-Bulletin%20log4j_CVE_2021_44228_v1.0_Legal-Approved.pdf)| |EclecticIQ|TIP|< 2.11| |Vulnerable| | |The Threat Intel Platform includes Neo4j 3.5.12 (not vulnerable) and Elasticsearch and Logstash OSS 7.9.1 (vulnerable) see Elasticsearch below for mitigation. see link in their own fix for Logstash (Support account needed, ongoing investigation)|[source/fix](https://docs.eclecticiq.com/security-advisories/security-issues-and-mitigation-actions/eiq-2021-0016-2)| -|Eclipse Foundation|All| | | | | | |[Eclipse Foundation Wiki](https://wiki.eclipse.org/Eclipse_and_log4j2_vulnerability_(CVE-2021-44228))| -|Edwards|All| | |Not Vuln| | | |[source](https://www.edwards.com/devices/support/product-security)| -|EFI|All| | | | | | |[EFI Link](https://communities.efi.com/s/article/Are-Fiery-Servers-vulnerable-to-CVE-2021-44228-Apache-Log4j2?language=en_US)| +|Eclipse Foundation|All| | | | | ||[Eclipse Foundation Wiki](https://wiki.eclipse.org/Eclipse_and_log4j2_vulnerability_(CVE-2021-44228))| +|Edwards|All| | |Not Vuln| | ||[source](https://www.edwards.com/devices/support/product-security)| +|EFI|All| | | | | ||[EFI Link](https://communities.efi.com/s/article/Are-Fiery-Servers-vulnerable-to-CVE-2021-44228-Apache-Log4j2?language=en_US)| |eG Innovations|eG Enterprise|7.1.8-7.1.9| |Not vuln| | |Patch to Remove old log4j|[source](https://www.eginnovations.com/brochures/eGEnterprise-and-Log4jShell-Vulnerability.pdf)| -|EGroupware|All| | | | | | |[EGroupware Link](https://help.egroupware.org/t/uk-de-statement-log4j-log4shell/76430)| -|Elastic|Agent| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|EGroupware|All| | | | | ||[EGroupware Link](https://help.egroupware.org/t/uk-de-statement-log4j-log4shell/76430)| +|Elastic|Agent| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| |Elastic|APM Java Agent|1.17.0-1.28.0|Not vuln|Workaround| | |Only vulnerable with specific configuration|[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|APM Server| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Beats| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Cloud| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Cloud Enterprise| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Cloud on Kubernetes| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Cmd| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Endgame| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Endpoint Security| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Enterprise Search| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Fleet Server| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Kibana| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|APM Server| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Beats| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Cloud| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Cloud Enterprise| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Cloud on Kubernetes| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Cmd| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Endgame| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Endpoint Security| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Enterprise Search| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Fleet Server| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Kibana| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| |Elastic|Logstash|6.8.22|Not vuln|Fix|Fix|Fix|No known remote code execution exposure. Fixed in 6.8.22|[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Machine Learning| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Maps Service| | |Not vuln| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|search|7.16.2|Not vuln|Fix|Fix|Fix| |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|Elastic|Swiftype| | |Investigation| | | |[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| -|ElasticSearch|All| |Not vuln|Not vuln|Not vuln|Not vuln| || -|Ellucian|Admin| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Advance Web Connector| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Banner Analytics| | |Vulnerable| | | |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Banner Document Management (includes Banner Document Retention)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Banner Event Publisher| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Banner Integration for eLearning| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Banner Integration for eProcurement| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Banner Self Service| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Banner Workflow| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Elastic|Machine Learning| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Maps Service| | |Not vuln| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|search|7.16.2|Not vuln|Fix|Fix|Fix||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|Elastic|Swiftype| | |Investigation| | ||[source](https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)| +|ElasticSearch|All| |Not vuln|Not vuln|Not vuln|Not vuln||| +|Ellucian|Admin| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Advance Web Connector| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Banner Analytics| | |Vulnerable| | ||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Banner Document Management (includes Banner Document Retention)| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Banner Event Publisher| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Banner Integration for eLearning| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Banner Integration for eProcurement| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Banner Self Service| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Banner Workflow| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| |Ellucian|Colleague| | |Vulnerable| | |On-prem and cloud deployements expect fixed 12/18/2021|[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Colleague Analytics| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|CRM Advance| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|CRM Advise| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|CRM Recruit| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Data Access| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Design Path| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Enterprise Identity Services(BEIS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|ePrint| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Ethos API & API Management Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Ethos Extend| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Ethos Integration| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|eTranscripts| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Experience| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Intelligent Platform (ILP)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|International Student and Scholar Management (ISSM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Message Service (EMS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Messaging Adapter (EMA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Mobile| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Payment Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Portal| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|PowerCampus| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Solution Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|Ellucian|Workflow| |Not vuln|Not vuln|Not vuln|Not vuln| |[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| -|ELO|Digital Office| | |Not vuln| | | |[source](http://www.elo.com)| -|Emerson|148 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|2051 Pressure Transmitter Family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|2088 Pressure Transmitter Family| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|2090F/2090P Pressure Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|215 Pressure Sensor Module| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|248 Configuration Application| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|248 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|3051 & 3051S Pressure transmitter families| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|3144P Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|326P Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|326T Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|327T Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|4088 Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|4088 Upgrade Utility| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|4600 Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|4732 Endeavor| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|4732 Endeavor| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|550 PT Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|5726 Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|5726 Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|644 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|648 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|848T Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Aperio software| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Combustion: OCX OXT 6888 CX1100 6888Xi| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT2211 QCL Aerosol Microleak Detection System| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT3000 QCL Automotive OEM Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT4000 QCL Marine OEM Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT4215 QCL Packaging Leak Detection System| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT4400 QCL General Purpose Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT4404 QCL pMDI Leak Detection Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT5100 QCL Field Housing Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT5400 QCL General Purpose Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|CT5800 QCL Flameproof Housing Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|DHNC1 DHNC2| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|DHNC1 DHNC2| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Engineering Assistant 5.x & 6.x| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Fieldwatch and Service consoles| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Fieldwatch and Service consoles| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Flame Detection: 975UF & 975UR Infrared Flame Detectors 975HR Infrared Hydrogen Flame Detector 975MR Multi-Spectrum Infrared Flame Detector| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Flarecheck FlowCheck Flowel & PWAM software| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Flarecheck FlowCheck Flowel & PWAM software| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Gas Analysis: X-STREAM Enhanced (XEGP XEGK XEGC XEGF XEFD XECLD)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Gas Analysis: X-STREAM Enhanced (XEGP XEGK XEGC XEGF XEFD XECLD)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Gas Chromatographs: M500/2350A MON2000 700XA/1500XA 370XA MON2020| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Gas Chromatographs: M500/2350A MON2000 700XA/1500XA 370XA MON2020| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Gas Detection: Millennium II Basic Single & Dual Channel 928 Wireless Gas Monitor/628 Gas Sensor 935 & 936 Open Path Gas Detector Millennium Air Particle Monitor| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Gas Detection: Millennium II Basic Single & Dual Channel 928 Wireless Gas Monitor/628 Gas Sensor 935 & 936 Open Path Gas Detector Millennium Air Particle Monitor| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Incus Ultrasonic gas leak detector| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|K-Series Coriolis Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|K-Series Coriolis Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Liquid Transmitters: 5081 1066 1056 1057 56| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Mark III Gas and Liquid USM| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Mark III Gas and Liquid USM| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|MPFM2600 & MPFM5726| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|MPFM2600 & MPFM5726| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Plantweb Advisor for Metrology and Metering Suite SDK| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Plantweb Advisor for Metrology and Metering Suite SDK| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Prolink Configuration Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Prolink Configuration Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Prolink Mobile Application & ProcessViz Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Prolink Mobile Application & ProcessViz Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount 2230 Graphical Field Display| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount 2240S Multi-input Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount 2410 Tank Hub| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount 2460 System Hub| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount 3490 Controller| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount CMS/IOU 61| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount CMS/SCU 51/SCC| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount CMS/WSU 51/SWF 51| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount IO-Link Assistant| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount Level Detectors (21xx)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount Level Transmitters (14xx 33xx 53xx 54xx 56xx)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount Radar Configuration Tool| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount Radar Level Gauges (Pro 39xx 59xx)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount RadarMaster and RadarMaster Plus| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount Tank Radar Gauges (TGUxx)| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Rosemount TankMaster and TankMaster Mobile| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Spectrex family Flame Detectors and Rosemount 975 flame detector| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|USM 3410 and 3810 Series Ultrasonic Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|USM 3410 and 3810 Series Ultrasonic Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Vortex and Magmeter Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|Vortex and Magmeter Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|WCM SWGM| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Emerson|WCM SWGM| |Not vuln|Not vuln|Not vuln|Not vuln| |[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| -|Enfocus|BoardingPass|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| -|Enfocus|Connect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| -|Enfocus|PDF Review Module|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| -|Enfocus|PitStop|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| -|Enfocus|Switch|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| -|Enovation|All| | |Not vuln| | | |[source](https://enovationgroup.com/nl/nieuws/log4j-vulnerability-cve-2021-44228/)| -|EnterpriseDT|All| | | | | | |[EnterpriseDT Statement](https://enterprisedt.com/blogs/announcements/enterprisedt-does-not-use-log4j/)| -|ESET|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.eset.com/en/alert8188-information-regarding-the-log4j2-vulnerability)| -|ESET|Secure Authentication| |Not vuln|Workaround| | | |[source](https://support.eset.com/en/kb8190-vulnerability-log4j2-in-the-reporting-engine-elasticsearch-of-eset-secure-authentication?ref=esf)| +|Ellucian|Colleague Analytics| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|CRM Advance| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|CRM Advise| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|CRM Recruit| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Data Access| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Design Path| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Enterprise Identity Services(BEIS)| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|ePrint| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Ethos API & API Management Center| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Ethos Extend| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Ethos Integration| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|eTranscripts| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Experience| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Intelligent Platform (ILP)| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|International Student and Scholar Management (ISSM)| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Message Service (EMS)| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Messaging Adapter (EMA)| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Payment Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Portal| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|PowerCampus| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Solution Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|Ellucian|Workflow| |Not vuln|Not vuln|Not vuln|Not vuln||[Ellucian Response on Apache Log4j Issue](https://www.ellucian.com/news/ellucian-response-apache-log4j-issue)| +|ELO|Digital Office| | |Not vuln| | ||[source](http://www.elo.com)| +|Emerson|148 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|2051 Pressure Transmitter Family| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|2088 Pressure Transmitter Family| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|2090F/2090P Pressure Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|215 Pressure Sensor Module| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|248 Configuration Application| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|248 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|3051 & 3051S Pressure transmitter families| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|3144P Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|326P Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|326T Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|327T Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|4088 Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|4088 Upgrade Utility| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|4600 Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|4732 Endeavor| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|4732 Endeavor| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|550 PT Pressure Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|5726 Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|5726 Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|644 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|648 Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|848T Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Aperio software| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Combustion: OCX OXT 6888 CX1100 6888Xi| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT2211 QCL Aerosol Microleak Detection System| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT3000 QCL Automotive OEM Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT4000 QCL Marine OEM Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT4215 QCL Packaging Leak Detection System| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT4400 QCL General Purpose Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT4404 QCL pMDI Leak Detection Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT5100 QCL Field Housing Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT5400 QCL General Purpose Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|CT5800 QCL Flameproof Housing Continuous Gas Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|DHNC1 DHNC2| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|DHNC1 DHNC2| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Engineering Assistant 5.x & 6.x| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Fieldwatch and Service consoles| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Fieldwatch and Service consoles| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Flame Detection: 975UF & 975UR Infrared Flame Detectors 975HR Infrared Hydrogen Flame Detector 975MR Multi-Spectrum Infrared Flame Detector| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Flarecheck FlowCheck Flowel & PWAM software| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Flarecheck FlowCheck Flowel & PWAM software| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Gas Analysis: X-STREAM Enhanced (XEGP XEGK XEGC XEGF XEFD XECLD)| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Gas Analysis: X-STREAM Enhanced (XEGP XEGK XEGC XEGF XEFD XECLD)| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Gas Chromatographs: M500/2350A MON2000 700XA/1500XA 370XA MON2020| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Gas Chromatographs: M500/2350A MON2000 700XA/1500XA 370XA MON2020| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Gas Detection: Millennium II Basic Single & Dual Channel 928 Wireless Gas Monitor/628 Gas Sensor 935 & 936 Open Path Gas Detector Millennium Air Particle Monitor| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Gas Detection: Millennium II Basic Single & Dual Channel 928 Wireless Gas Monitor/628 Gas Sensor 935 & 936 Open Path Gas Detector Millennium Air Particle Monitor| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Incus Ultrasonic gas leak detector| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|K-Series Coriolis Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|K-Series Coriolis Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Liquid Transmitters: 5081 1066 1056 1057 56| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Mark III Gas and Liquid USM| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Mark III Gas and Liquid USM| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|MPFM2600 & MPFM5726| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|MPFM2600 & MPFM5726| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Plantweb Advisor for Metrology and Metering Suite SDK| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Plantweb Advisor for Metrology and Metering Suite SDK| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Prolink Configuration Software| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Prolink Configuration Software| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Prolink Mobile Application & ProcessViz Software| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Prolink Mobile Application & ProcessViz Software| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount 2230 Graphical Field Display| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount 2240S Multi-input Temperature Transmitter| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount 2410 Tank Hub| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount 2460 System Hub| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount 3490 Controller| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount CMS/IOU 61| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount CMS/SCU 51/SCC| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount CMS/WSU 51/SWF 51| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount IO-Link Assistant| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount Level Detectors (21xx)| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount Level Transmitters (14xx 33xx 53xx 54xx 56xx)| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount Radar Configuration Tool| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount Radar Level Gauges (Pro 39xx 59xx)| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount RadarMaster and RadarMaster Plus| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount Tank Radar Gauges (TGUxx)| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Rosemount TankMaster and TankMaster Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Spectrex family Flame Detectors and Rosemount 975 flame detector| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|USM 3410 and 3810 Series Ultrasonic Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|USM 3410 and 3810 Series Ultrasonic Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Vortex and Magmeter Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|Vortex and Magmeter Transmitters| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|WCM SWGM| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification EMR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Emerson|WCM SWGM| |Not vuln|Not vuln|Not vuln|Not vuln||[Emerson Security Notification MR.RMT21003-2](https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf)| +|Enfocus|BoardingPass|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| +|Enfocus|Connect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| +|Enfocus|PDF Review Module|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| +|Enfocus|PitStop|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| +|Enfocus|Switch|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://enfocus-community.force.com/customers/s/article/Are-the-Enfocus-products-impacted-by-the-log4j-security-vulnerability?language=en_US)| +|Enovation|All| | |Not vuln| | ||[source](https://enovationgroup.com/nl/nieuws/log4j-vulnerability-cve-2021-44228/)| +|EnterpriseDT|All| | | | | ||[EnterpriseDT Statement](https://enterprisedt.com/blogs/announcements/enterprisedt-does-not-use-log4j/)| +|ESET|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.eset.com/en/alert8188-information-regarding-the-log4j2-vulnerability)| +|ESET|Secure Authentication| |Not vuln|Workaround| | ||[source](https://support.eset.com/en/kb8190-vulnerability-log4j2-in-the-reporting-engine-elasticsearch-of-eset-secure-authentication?ref=esf)| |Esri|ArcGIS Data Store|All|Not vuln|Fix| | |Requires script remediation. ESRI has created scripts to remove the JndiLookup class, but has not issued patches to upgrade the Log4j versions|[source](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/)| |Esri|ArcGIS Enterprise|All|Not vuln|Fix| | |Requires script remediation. ESRI has created scripts to remove the JndiLookup class, but has not issued patches to upgrade the Log4j versions|[source](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/)| |Esri|ArcGIS Enterprise and related products| |Workaround|Workaround|Workaround| |See source for workaround|[source](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/)| @@ -171,81 +171,81 @@ |Esri|ArcGIS Server|All|Not vuln|Fix| | |Requires script remediation. ESRI has created scripts to remove the JndiLookup class, but has not issued patches to upgrade the Log4j versions|[source](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/)| |Esri|ArcGIS Workflow Manager Server|All|Not vuln|Fix| | |Requires script remediation. ESRI has created scripts to remove the JndiLookup class, but has not issued patches to upgrade the Log4j versions|[source](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/)| |Esri|Portal for ArcGIS|All|Not vuln|Fix| | |Requires script remediation. ESRI has created scripts to remove the JndiLookup class, but has not issued patches to upgrade the Log4j versions|[source](https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/)| -|estos|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.estos.de/de/sicherheitshinweise/estos-von-kritischer-schwachstelle-in-log4j-cve-2021-44228-nicht-betroffen)| -|EVL Labs|JGAAP|<8.0.2|Not vuln|Fix| | | |[source](https://github.com/evllabs/JGAAP/releases/tag/v8.0.2)| -|Evolveum|midPoint| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://evolveum.com/midpoint-not-vulnerable-to-log4shell/)| -|Evolveum Midpoint|All| | | | | | |[Evolveum Midpoint Statement](https://evolveum.com/midpoint-not-vulnerable-to-log4shell/)| -|Ewon|All| | | | | | |[Ewon Statement](https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42)| -|Ewon (HMS-Networks)|eCatcher|6.7.8|Not vuln|Fix|Fix|Fix| |[source](https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42) [bulletin](https://www.hms-networks.com/cybersecurity)| +|estos|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.estos.de/de/sicherheitshinweise/estos-von-kritischer-schwachstelle-in-log4j-cve-2021-44228-nicht-betroffen)| +|EVL Labs|JGAAP|<8.0.2|Not vuln|Fix| | ||[source](https://github.com/evllabs/JGAAP/releases/tag/v8.0.2)| +|Evolveum|midPoint| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://evolveum.com/midpoint-not-vulnerable-to-log4shell/)| +|Evolveum Midpoint|All| | | | | ||[Evolveum Midpoint Statement](https://evolveum.com/midpoint-not-vulnerable-to-log4shell/)| +|Ewon|All| | | | | ||[Ewon Statement](https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42)| +|Ewon (HMS-Networks)|eCatcher|6.7.8|Not vuln|Fix|Fix|Fix||[source](https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42) [bulletin](https://www.hms-networks.com/cybersecurity)| |Exabeam|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[Exabeam Statement](https://community.exabeam.com/s/discussions?t=1639379479381)| -|Exact|AEC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Audition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|BoekhoudGemak|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Bouw7|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Business Suite|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|CommunicatieGemak|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Consolidation powered by LucaNet| |Not vuln|Workaround|Workaround|Workaround| |[source](https://customer.lucanet.com/en/lp/log4j)| -|Exact|Digipoort|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|DigitaleFactuur|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Dimoni|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|EDI Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|FDS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Financials|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|FiscaalGemak|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Globe Core product|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Globe E-report/Crystal Reports|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Go2UBL|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Gripp|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|HR & SalarisGemak|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|insights (Qlik)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Officient|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Online All core products|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Online Elastic Search|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Online Samenwerken (OSW)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Payroll Plus (Loket)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|ProAcc|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|ProQuro|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|RapportageGemak|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Reeleezee|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|ScanSys|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|SRXP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Synergy Core product|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Synergy Elastic Search|6.6.2|Not vuln|Workaround|Workaround|Workaround| |[source](https://www.exactsoftware.com/docs/DocView.aspx?DocumentID=%7Bdd0c8eb3-88b3-473e-822c-54dc54a81aff%7D)| -|Exact|WerkprogrammaGemak|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|Winbooks|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exact|WMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.exact.com/news/general-statement-apache-leak)| -|Exivity|On-Premise|All version| |Not vuln| | | |[source](https://docs.exivity.com/getting-started/releases/announcements#announcement-regarding-cve-2021-44228)| -|Extensis|Universal Type Server|=>7.0.6|Not vuln|Fix| | | |[source](https://help.extensis.com/hc/en-us/articles/4412767414299-Universal-Type-Server-7-and-Log4j-vulnerabilities)| -|ExtraHop|Reveal(x)|<=8.4.6, <=8.5.3, <=8.6.4|Not vuln|Fix| | |"Versions >8.4.7, >8.5.4, >8.6.5 and >=8.7 are fixed."|[ExtraHop Statement](https://forums.extrahop.com/t/extrahop-update-on-log4shell/8148)| -|eXtreme Hosting|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremehosting.nl/log4shell-log4j/)| -|Extreme Networks|200-series| | |Investigation| | | |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|BOSS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|EXOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Extreme AirDefense| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Extreme Campus Controller (ExtremeCloud Appliance)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Extreme Fabric Automation (EFA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Extreme Management Center (XMC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Extreme Visibility Manager (XVM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeAnalytics| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeCloud A3| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeCloud IQ| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeConnect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeControl| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeGuest| | |Investigation| | | |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeLocation| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ExtremeWireless (Identifi)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Fabric Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|HiveManager Classic On-Premises| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|HiveManager Classic Online| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|IQEngine (HiveOS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|IQVA| | |Vulnerable| | | |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|ISW| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|NetIron OS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Network OS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Nsight| | |Investigation| | | |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|SLX-OS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|Traffic Sensor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|VOSS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|WiNG| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extreme Networks|XIQ-SE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| -|Extron|All| | | | | | |[Extron Statement](https://www.extron.com/featured/Security-at-Extron/extron-security)| +|Exact|AEC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Audition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|BoekhoudGemak|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Bouw7|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Business Suite|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|CommunicatieGemak|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Consolidation powered by LucaNet| |Not vuln|Workaround|Workaround|Workaround||[source](https://customer.lucanet.com/en/lp/log4j)| +|Exact|Digipoort|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|DigitaleFactuur|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Dimoni|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|EDI Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|FDS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Financials|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|FiscaalGemak|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Globe Core product|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Globe E-report/Crystal Reports|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Go2UBL|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Gripp|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|HR & SalarisGemak|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|insights (Qlik)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Officient|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Online All core products|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Online Elastic Search|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Online Samenwerken (OSW)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Payroll Plus (Loket)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|ProAcc|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|ProQuro|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|RapportageGemak|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Reeleezee|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|ScanSys|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|SRXP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Synergy Core product|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Synergy Elastic Search|6.6.2|Not vuln|Workaround|Workaround|Workaround||[source](https://www.exactsoftware.com/docs/DocView.aspx?DocumentID=%7Bdd0c8eb3-88b3-473e-822c-54dc54a81aff%7D)| +|Exact|WerkprogrammaGemak|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|Winbooks|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exact|WMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.exact.com/news/general-statement-apache-leak)| +|Exivity|On-Premise|All version| |Not vuln| | ||[source](https://docs.exivity.com/getting-started/releases/announcements#announcement-regarding-cve-2021-44228)| +|Extensis|Universal Type Server|=>7.0.6|Not vuln|Fix| | ||[source](https://help.extensis.com/hc/en-us/articles/4412767414299-Universal-Type-Server-7-and-Log4j-vulnerabilities)| +|ExtraHop|Reveal(x)|<=8.4.6, <=8.5.3, <=8.6.4|Not vuln|Fix| | |Versions >8.4.7, >8.5.4, >8.6.5 and >=8.7 are fixed.|[ExtraHop Statement](https://forums.extrahop.com/t/extrahop-update-on-log4shell/8148)| +|eXtreme Hosting|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremehosting.nl/log4shell-log4j/)| +|Extreme Networks|200-series| | |Investigation| | ||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|BOSS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|EXOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Extreme AirDefense| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Extreme Campus Controller (ExtremeCloud Appliance)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Extreme Fabric Automation (EFA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Extreme Management Center (XMC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Extreme Visibility Manager (XVM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeAnalytics| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeCloud A3| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeCloud IQ| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeConnect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeControl| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeGuest| | |Investigation| | ||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeLocation| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ExtremeWireless (Identifi)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Fabric Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|HiveManager Classic On-Premises| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|HiveManager Classic Online| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|IQEngine (HiveOS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|IQVA| | |Vulnerable| | ||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|ISW| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|NetIron OS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Network OS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Nsight| | |Investigation| | ||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|SLX-OS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|Traffic Sensor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|VOSS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|WiNG| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extreme Networks|XIQ-SE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://extremeportal.force.com/ExtrArticleDetail?an=000100806_ga)| +|Extron|All| | | | | ||[Extron Statement](https://www.extron.com/featured/Security-at-Extron/extron-security)| diff --git a/software/software_list_f.md b/software/software_list_f.md index 7cd478994..8801ecbca 100644 --- a/software/software_list_f.md +++ b/software/software_list_f.md @@ -7,149 +7,157 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|F-Secure|Elements Connector| |Not vuln|Fix| | | |[The Log4J Vulnerability (CVE-2021-44228) – which F-Secure products are affected, what it means, what steps should you take - F-Secure Community](https://community.f-secure.com/common-business-en/kb/articles/9226-the-log4j-vulnerability-cve-2021-44228-which-f-secure-products-are-affected-what-it-means-what-steps-should-you-take)| -|F-Secure|Endpoint Proxy|13-15|Not vuln|Fix| | | |[source](https://status.f-secure.com/incidents/sk8vmr0h34pd)| -|F-Secure|Messaging Security Gateway| |Not vuln|Fix| | | |[The Log4J Vulnerability (CVE-2021-44228) – which F-Secure products are affected, what it means, what steps should you take - F-Secure Community](https://community.f-secure.com/common-business-en/kb/articles/9226-the-log4j-vulnerability-cve-2021-44228-which-f-secure-products-are-affected-what-it-means-what-steps-should-you-take)| -|F-Secure|Policy Manager|13-15|Not vuln|Fix| | | |[source](https://status.f-secure.com/incidents/sk8vmr0h34pd)| -|F-Secure|Policy Manager Proxy|13-15|Not vuln|Fix| | | |[source](https://status.f-secure.com/incidents/sk8vmr0h34pd)| +|Fuji Electric|MONITOUCH TS1000 series| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|Fuji Electric|MONITOUCH TS1000S series| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|Fuji Electric|MONITOUCH TS2000 series| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|Fuji Electric|MONITOUCH V8 series| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|Fuji Electric|MONITOUCH V9 series| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|Fuji Electric|MONITOUCH X1 series| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|Fuji Electric|TELLUS and V-Server| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|Fuji Electric|V-SFT| | |Not vuln| | ||[link](https://monitouch.fujielectric.com/site/download-e/other/NVD%20CVE-2021-44228_en.pdf)| +|F-Secure|Elements Connector| |Not vuln|Fix| | ||[The Log4J Vulnerability (CVE-2021-44228) – which F-Secure products are affected, what it means, what steps should you take - F-Secure Community](https://community.f-secure.com/common-business-en/kb/articles/9226-the-log4j-vulnerability-cve-2021-44228-which-f-secure-products-are-affected-what-it-means-what-steps-should-you-take)| +|F-Secure|Endpoint Proxy|13-15|Not vuln|Fix| | ||[source](https://status.f-secure.com/incidents/sk8vmr0h34pd)| +|F-Secure|Messaging Security Gateway| |Not vuln|Fix| | ||[The Log4J Vulnerability (CVE-2021-44228) – which F-Secure products are affected, what it means, what steps should you take - F-Secure Community](https://community.f-secure.com/common-business-en/kb/articles/9226-the-log4j-vulnerability-cve-2021-44228-which-f-secure-products-are-affected-what-it-means-what-steps-should-you-take)| +|F-Secure|Policy Manager|13-15|Not vuln|Fix| | ||[source](https://status.f-secure.com/incidents/sk8vmr0h34pd)| +|F-Secure|Policy Manager Proxy|13-15|Not vuln|Fix| | ||[source](https://status.f-secure.com/incidents/sk8vmr0h34pd)| |F5|Other products| | |Not vuln| | |F5 products themselves are not vulnerable, but F5 published guidance on mitigating through BIG-IP ASM/Advanced WAF and NGINX App Protect|[source](https://support.f5.com/csp/article/K19026212)| |F5|Traffic SDC|5.2.0 CF1, 5.1.0 CF-30, 5.1.0 CF-33| | | | |F5 say that the product is vulnerable but doesn't specify to which CVE|[source](https://support.f5.com/csp/article/K19026212)| -|FAST LTA|All| | | | | | |[FAST LTA Statement](https://blog.fast-lta.de/en/log4j2-vulnerability)| -|Fastly|All| | | | | | |[Fastly Statement](https://www.fastly.com/blog/digging-deeper-into-log4shell-0day-rce-exploit-found-in-log4j)| -|FedEx|Ship Manager|340x|Not vuln|Vulnerable|Vulnerable|Vulnerable| |[FedEx Statement](https://www.fedex.com/en-us/shipping/ship-manager/software.html#tab-4)| -|FedEx|Ship Manager|3509|Not vuln|Fix|Fix|Fix| |[FedEx Statement](https://www.fedex.com/en-us/shipping/ship-manager/software.html#tab-4)| -|Fiix|CMMS core|V5|Not vuln|Fix| | | |[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| +|FAST LTA|All| | | | | ||[FAST LTA Statement](https://blog.fast-lta.de/en/log4j2-vulnerability)| +|Fastly|All| | | | | ||[Fastly Statement](https://www.fastly.com/blog/digging-deeper-into-log4shell-0day-rce-exploit-found-in-log4j)| +|FedEx|Ship Manager|340x|Not vuln|Vulnerable|Vulnerable|Vulnerable||[FedEx Statement](https://www.fedex.com/en-us/shipping/ship-manager/software.html#tab-4)| +|FedEx|Ship Manager|3509|Not vuln|Fix|Fix|Fix||[FedEx Statement](https://www.fedex.com/en-us/shipping/ship-manager/software.html#tab-4)| +|Fiix|CMMS core|V5|Not vuln|Fix| | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Fiix|CMMS Core|V5|Not vuln|Fix| | |The product has been updated to Log4j version 2.15. An additional patch is being developed to update to 2.16. No user interaction is required.|[PN1579 - Log4Shell Vulnerability Notice](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| -|FileCap|Plugins| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://filecap.com/blog-posts/detecteer-log4shell-exploitatie-pogingen)| -|FileCap|Server|5.1.3|Not vuln|Fix|Fix|Fix| |[source](https://filecap.com/blog-posts/detecteer-log4shell-exploitatie-pogingen)| -|FileCatalyst|All| | | | | | |[FileCatalyst Statement](https://support.filecatalyst.com/index.php/Knowledgebase/Article/View/advisory-log4j-zero-day-security-vulnerability)| -|FileCloud|All| | | | | | |[FileCloud Statement](https://www.getfilecloud.com/supportdocs/display/cloud/Advisory+2021-12-2+Impact+of+Apache+Log4j2+Vulnerability+on+FileCloud+Customers)| -|FileWave|All| | | | | | |[FileWave Statement](https://kb.filewave.com/display/KB/Security+Notice:+Apache+log4j+Vulnerability+CVE-2021-44228)| -|FileZilla|All| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://forum.filezilla-project.org/viewtopic.php?f=6&t=54338)"| -|FINVI|All| | | | | | |[FINVI Statement](https://finvi.com/support/)| -|FireDaemon|All| | | | | | |[FireDemon Statement](https://kb.firedaemon.com/support/solutions/articles/4000178630)| -|Fisher & Paykel Healthcare|All| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Fisher & Paykel Healthcare Advisory Link](https://www.fphcare.com/us/our-company/contact-us/product-security/)"| -|Flexagon|All| | | | | | |[Flexagon Statement](https://flexagon.com/what-is-the-impact-of-log4j-vulnerability-cve-2021-44228-on-flexdeploy/)| -|Flexera|All| | | | | | |[Flexera Statement](https://community.flexera.com/t5/Community-Notices/Flexera-s-response-to-Apache-Log4j-2-remote-code-execution/ba-p/216934)| -|Forcepoint|Advanced Malware Detection| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Behavioral Analytics| | |Investigation| | | |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Bitglass SSE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|CASB| | |Investigation| | | |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Cloud Security Gateway (CSG)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com)| -|Forcepoint|Content Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|DDP/DUP/DPS| | |Investigation| | | |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Directory Synchronization Client| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|DLP Manager| |Not vuln|Workaround| | | |[source](https://support.forcepoint.com)| -|Forcepoint|Email Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Insider Threat| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Next Generation Firewall (NGFW)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com)| -|Forcepoint|Next Generation Firewall Security Management Center, and virtual SMC appliances (NGFW)| |Not vuln|Workaround| | | |[source](https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-NGFW-Security-Management-Center)| -|Forcepoint|Next Generation Firewall, NGFW VPN Client, Forcepoint User ID service and Sidewinder| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com)| -|Forcepoint|One Endpoint| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com)| -|Forcepoint|Private Access| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Remote Browser Isolation| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forcepoint|Security Manager (Web, Email and DLP)| |Not vuln|Workaround| | | |[source](https://support.forcepoint.com)| -|Forcepoint|Web Security| | |Investigation| | | |[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| -|Forescout|All| | |Investigation| | | |[source](https://www.forescout.com/blog/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2/)| +|FileCap|Plugins| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://filecap.com/blog-posts/detecteer-log4shell-exploitatie-pogingen)| +|FileCap|Server|5.1.3|Not vuln|Fix|Fix|Fix||[source](https://filecap.com/blog-posts/detecteer-log4shell-exploitatie-pogingen)| +|FileCatalyst|All| | | | | ||[FileCatalyst Statement](https://support.filecatalyst.com/index.php/Knowledgebase/Article/View/advisory-log4j-zero-day-security-vulnerability)| +|FileCloud|All| | | | | ||[FileCloud Statement](https://www.getfilecloud.com/supportdocs/display/cloud/Advisory+2021-12-2+Impact+of+Apache+Log4j2+Vulnerability+on+FileCloud+Customers)| +|FileWave|All| | | | | ||[FileWave Statement](https://kb.filewave.com/display/KB/Security+Notice:+Apache+log4j+Vulnerability+CVE-2021-44228)| +|FileZilla|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forum.filezilla-project.org/viewtopic.php?f=6&t=54338)| +|FINVI|All| | | | | ||[FINVI Statement](https://finvi.com/support/)| +|FireDaemon|All| | | | | ||[FireDemon Statement](https://kb.firedaemon.com/support/solutions/articles/4000178630)| +|Fisher & Paykel Healthcare|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Fisher & Paykel Healthcare Advisory Link](https://www.fphcare.com/us/our-company/contact-us/product-security/)| +|Flexagon|All| | | | | ||[Flexagon Statement](https://flexagon.com/what-is-the-impact-of-log4j-vulnerability-cve-2021-44228-on-flexdeploy/)| +|Flexera|All| | | | | ||[Flexera Statement](https://community.flexera.com/t5/Community-Notices/Flexera-s-response-to-Apache-Log4j-2-remote-code-execution/ba-p/216934)| +|Forcepoint|Advanced Malware Detection| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Behavioral Analytics| | |Investigation| | ||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Bitglass SSE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|CASB| | |Investigation| | ||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Cloud Security Gateway (CSG)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com)| +|Forcepoint|Content Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|DDP/DUP/DPS| | |Investigation| | ||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Directory Synchronization Client| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|DLP Manager| |Not vuln|Workaround| | ||[source](https://support.forcepoint.com)| +|Forcepoint|Email Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Insider Threat| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Next Generation Firewall (NGFW)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com)| +|Forcepoint|Next Generation Firewall Security Management Center, and virtual SMC appliances (NGFW)| |Not vuln|Workaround| | ||[source](https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-NGFW-Security-Management-Center)| +|Forcepoint|Next Generation Firewall, NGFW VPN Client, Forcepoint User ID service and Sidewinder| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com)| +|Forcepoint|One Endpoint| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com)| +|Forcepoint|Private Access| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Remote Browser Isolation| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forcepoint|Security Manager (Web, Email and DLP)| |Not vuln|Workaround| | ||[source](https://support.forcepoint.com)| +|Forcepoint|Web Security| | |Investigation| | ||[source](https://support.forcepoint.com/s/article/Apache-log4j-Zero-Day-RCE-Vulnerability-CVE-2021-44228)| +|Forescout|All| | |Investigation| | ||[source](https://www.forescout.com/blog/forescout%e2%80%99s-response-to-cve-2021-44228-apache-log4j-2/)| |ForgeRock|Autonomous Identity| |Not vuln|Workaround| | |all other ForgeRock products not vuln|[source](https://backstage.forgerock.com/knowledge/kb/book/b21824339#1_bzBa)| |Fortinet|FortiADC| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| |Fortinet|FortiAI| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| |Fortinet|FortiAIOps|1.0.2| |Fix| | |Fixed in version 1.0.2|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiAnalyzer| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiAnalyzer| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| |Fortinet|FortiAnalyzer Big Data|6.4.7 and 7.0.2| |Fix| | |Fixed on 2021-12-10|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiAnalyzer Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiAP| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiAuthenticator| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiCache| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiCarrier| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiCASB| ? | |Fix| | |Fixed on 2021-12-10|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiClient| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiClient Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiClientEMS| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiConnect| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiConverter Portal| | |Vulnerable| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiCWP| ? | |Fix| | |Fixed on 2021-12-10|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiDDoS| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiDDoS-F| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiDeceptor| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiEDR Agent| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiAnalyzer Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiAP| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiAuthenticator| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiCache| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiCarrier| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiCASB|?| |Fix| | |Fixed on 2021-12-10|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiClient| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiClient Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiClientEMS| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiConnect| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiConverter Portal| | |Vulnerable| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiCWP|?| |Fix| | |Fixed on 2021-12-10|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiDDoS| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiDDoS-F| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiDeceptor| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiEDR Agent| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| |Fortinet|FortiEDR Cloud|Fix| |Vulnerable| | |Declared not exploitable but mitigations added on 2021-12-10|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiExtender| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiExtender Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiGate Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiGSLB Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiInsight| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiExtender| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiExtender Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiGate Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiGSLB Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiInsight| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| |Fortinet|FortiIsolator|2.3.4| |Fix| | |Fix scheduled|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiLAN Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiMail| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiManager| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiManager Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiLAN Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiMail| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiManager| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiManager Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| |Fortinet|FortiMonitor|Workaround| |Vulnerable| | |Mitigations for NCM & Elastiflow available|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiNAC| | |Vulnerable| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiOS (includes FortiGate & FortiWiFi)| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiPenTest| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiPhish Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiPolicy| | |Vulnerable| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiNAC| | |Vulnerable| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiOS (includes FortiGate & FortiWiFi)| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiPenTest| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiPhish Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiPolicy| | |Vulnerable| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| |Fortinet|FortiPortal|Fix| |Vulnerable| | |Fixed in version 6.0.8 and 5.3.8|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiPresence| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiProxy| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiRecorder| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiSandbox| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiSASE| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiSIEM|Workaround| |Vulnerable| | |"Mitigation steps"|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiSOAR| | |Vulnerable| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiSwicth Cloud in FortiLANCloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[PSIRT Advisories FortiGuard](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiSwitch & FortiSwitchManager| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiSwitch Cloud in FortiLANCloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiTester| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiToken Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiVoice| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiWeb Cloud| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiWLC| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|FortiWLM| | |Not vuln| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|Fortinet|ShieldX| | |Vulnerable| | | |[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| -|FTAPI|All| | | | | | |[FTAPI Statement](https://www.ftapi.com/blog/kritische-sicherheitslucke-in-log4j-ftapi-reagiert/#)| -|Fujitsu|AIS Connect|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|BeanConnect|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|BS2000 Hardware|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|BS2000 Software|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|BX400|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|BX900 MMB|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|eLux RP on FUTRO|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS AB/HB|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS CS800|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS CS8000|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS DX/AF|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS JX|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS LT140/260|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS LT20/40/60|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS SF|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ETERNUS SF MA|Unkown|Investigation|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|FlexFrame|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|INTELLIEGDLE A/G|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|iRMC on PRIMERGY:|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ISM for PRIMERGY, PQ|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|NECoP|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|openFT|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|openSEAS|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|openUTM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|openUTM (WebAdm.)|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|PRIMEFLEX for MS S2D|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|PTC Axeda (AIS Con.)|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SBAX2|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SBAX3|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SecDocs|Unkown|Not vuln|Workaround|Workaround|Workaround| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ServerView IM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ServerView OM|Unkown|Not vuln|Workaround|Workaround|Workaround| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ServerView OM/UM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ServerView RAID|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ServerView Rem. Con.|Unkown|Investigation|Investigation|Investigation|Investigation| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|ServerView VIOM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SOA Pro. Mgmt. Service|Unkown|Investigation|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SOA SysRollout Service|Unkown|Investigation|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SVS Servicesfor ISM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SVS UME +LinuxLife|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SVS VMware Op.Mgr|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|SVS VMware vCenter|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|Fujitsu|WebTransactions|Unkown|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| -|FusionAuth|All|1.32| |Not vuln| | | |[source](https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/)| +|Fortinet|FortiPresence| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiProxy| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiRecorder| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiSandbox| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiSASE| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiSIEM|Workaround| |Vulnerable| | |https://community.fortinet.com/t5/FortiSIEM/Techincal-Tip-FortiSIEM-Log4j-Mitigating-CVE-2021-44228/ta-p/201008 Mitigation steps|[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiSOAR| | |Vulnerable| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiSwicth Cloud in FortiLANCloud| |Not vuln|Not vuln|Not vuln|Not vuln||[PSIRT Advisories FortiGuard](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiSwitch & FortiSwitchManager| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiSwitch Cloud in FortiLANCloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiTester| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiToken Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiVoice| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiWeb Cloud| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiWLC| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|FortiWLM| | |Not vuln| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|Fortinet|ShieldX| | |Vulnerable| | ||[source](https://www.fortiguard.com/psirt/FG-IR-21-245)| +|FTAPI|All| | | | | ||[FTAPI Statement](https://www.ftapi.com/blog/kritische-sicherheitslucke-in-log4j-ftapi-reagiert/#)| +|Fujitsu|AIS Connect|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|BeanConnect|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|BS2000 Hardware|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|BS2000 Software|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|BX400|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|BX900 MMB|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|eLux RP on FUTRO|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS AB/HB|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS CS800|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS CS8000|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS DX/AF|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS JX|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS LT140/260|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS LT20/40/60|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS SF|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ETERNUS SF MA|Unkown|Investigation|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|FlexFrame|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|INTELLIEGDLE A/G|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|iRMC on PRIMERGY:|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ISM for PRIMERGY, PQ|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|NECoP|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|openFT|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|openSEAS|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|openUTM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|openUTM (WebAdm.)|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|PRIMEFLEX for MS S2D|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|PTC Axeda (AIS Con.)|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SBAX2|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SBAX3|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SecDocs|Unkown|Not vuln|Workaround|Workaround|Workaround||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ServerView IM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ServerView OM|Unkown|Not vuln|Workaround|Workaround|Workaround||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ServerView OM/UM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ServerView RAID|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ServerView Rem. Con.|Unkown|Investigation|Investigation|Investigation|Investigation||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|ServerView VIOM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SOA Pro. Mgmt. Service|Unkown|Investigation|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SOA SysRollout Service|Unkown|Investigation|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SVS Servicesfor ISM|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SVS UME +LinuxLife|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SVS VMware Op.Mgr|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|SVS VMware vCenter|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|Fujitsu|WebTransactions|Unkown|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf)| +|FusionAuth|All|1.32| |Not vuln| | ||[source](https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/)| diff --git a/software/software_list_g.md b/software/software_list_g.md index c13470de7..7b422fea1 100644 --- a/software/software_list_g.md +++ b/software/software_list_g.md @@ -7,44 +7,46 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| +|GSA|Cloud.gov| | | | | ||[link](https://cloud.gov/2021/12/14/log4j-buildpack-updates/)| +|Google|Chrome| | |Not vuln| | |Chrome Browser releases, infrastructure and admin console are not using versions of Log4j affected by the vulnerability.|[link](https://security.googleblog.com/2021/12/apache-log4j-vulnerability.html)| |GE Digital|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA.|[GE Digital Advisory Link(login required)](https://digitalsupport.ge.com/communities/en_US/Alert/GE-Security-Advisories)| -|GE Digital Grid|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA.|"[GE Digital Grid Advisory Link(login required)](https://digitalenergy.service-now.com/csm?id=kb_category&kb_category=b8bc715b879c89103f22a93e0ebb3585)"| +|GE Digital Grid|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA.|[GE Digital Grid Advisory Link(login required)](https://digitalenergy.service-now.com/csm?id=kb_category&kb_category=b8bc715b879c89103f22a93e0ebb3585)| |GE Gas Power|Asset Performance Management (APM)| | |Vulnerable| | |GE verifying workaround.|[GE Gas Power Advisory Link](https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2021-12-21_Log4J_Vulnerability-GE_Gas_Power_Holding_Statement.pdf)| |GE Gas Power|Baseline Security Center (BSC)| | |Vulnerable| | |Vulnerability to be fixed by vendor provided workaround. No user actions necessary. Contact GE for details.|[GE Gas Power Advisory Link](https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2021-12-21_Log4J_Vulnerability-GE_Gas_Power_Holding_Statement.pdf)| |GE Gas Power|Baseline Security Center (BSC) 2.0| | |Vulnerable| | |Vulnerability to be fixed by vendor provided workaround. No user actions necessary. Contact GE for details|[GE Gas Power Advisory Link](https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2021-12-21_Log4J_Vulnerability-GE_Gas_Power_Holding_Statement.pdf)| |GE Gas Power|Control Server| | |Vulnerable| | |The Control Server is Affected via vCenter. There is a fix for vCenter. Please see below. GE verifying the vCenter fix as proposed by the vendor.|[GE Gas Power Advisory Link](https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2021-12-21_Log4J_Vulnerability-GE_Gas_Power_Holding_Statement.pdf)| |GE Gas Power|Tag Mapping Service| |Not vuln|Fix| | |Vulnerability fixed. No user actions necessary. Updated to log4j 2.16|[GE Gas Power Advisory Link](https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2021-12-21_Log4J_Vulnerability-GE_Gas_Power_Holding_Statement.pdf)| |GE Healthcare|All| | | | | |This advisory is not available at the time of this review, due to maintence on the GE Healthcare website.|[GE Healthcare Advisory Link](https://securityupdate.gehealthcare.com)| -|Gearset|All| | | | | | |[Gearset Statement](https://docs.gearset.com/en/articles/5806813-gearset-log4j-statement-dec-2021)| -|Genesys|All| | |Investigation| | | |[source](https://www.genesys.com/blog/post/genesys-update-on-the-apache-log4j-vulnerability)| -|GeoServer|All| | | | | | |[GeoServer Announcement](http://geoserver.org/announcements/2021/12/13/logj4-rce-statement.html)| -|GeoSolutions|Geonetwork|All|Not vuln|Workaround| | | |[source](https://my.geocat.net/knowledgebase/125/Log4j-RCE-CVE-2021-44228-vulnerability-patch.html)| -|GeoSolutions|GeoServer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](http://geoserver.org/announcements/2021/12/13/logj4-rce-statement.html)| -|Gerrit code review|All| | | | | | |[Gerrit Statement](https://www.gerritcodereview.com/2021-12-13-log4j-statement.html)| -|GFI|All| | | | | | |[GFI Statement](https://techtalk.gfi.com/impact-of-log4j-vulnerability-on-gfi/)| -|GFI Software|Kerio Connect|9.3.1p2|Not vuln|Workaround|Vulnerable|Vulnerable| |"[source](https://forums.gfi.com/index.php?t=msg&th=39096&start=0&)"| -|Ghidra|All| | | | | | |[Ghidra Statement](https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning)| +|Gearset|All| | | | | ||[Gearset Statement](https://docs.gearset.com/en/articles/5806813-gearset-log4j-statement-dec-2021)| +|Genesys|All| | |Investigation| | ||[source](https://www.genesys.com/blog/post/genesys-update-on-the-apache-log4j-vulnerability)| +|GeoServer|All| | | | | ||[GeoServer Announcement](http://geoserver.org/announcements/2021/12/13/logj4-rce-statement.html)| +|GeoSolutions|Geonetwork|All|Not vuln|Workaround| | ||[source](https://my.geocat.net/knowledgebase/125/Log4j-RCE-CVE-2021-44228-vulnerability-patch.html)| +|GeoSolutions|GeoServer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](http://geoserver.org/announcements/2021/12/13/logj4-rce-statement.html)| +|Gerrit code review|All| | | | | ||[Gerrit Statement](https://www.gerritcodereview.com/2021-12-13-log4j-statement.html)| +|GFI|All| | | | | ||[GFI Statement](https://techtalk.gfi.com/impact-of-log4j-vulnerability-on-gfi/)| +|GFI Software|Kerio Connect|9.3.1p2|Not vuln|Workaround|Vulnerable|Vulnerable||[source](https://forums.gfi.com/index.php?t=msg&th=39096&start=0&)| +|Ghidra|All| | | | | ||[Ghidra Statement](https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning)| |Ghisler|Total Commander|All| |Not vuln| | |Third Party plugins might contain log4j|[source](https://www.ghisler.com/whatsnew.htm)| |Gigamon|Fabric Manager|<5.13.01.02|Not vuln|Fix| | |Updates available via the Gigamon Support Portal. This advisory available to customers only and has not been reviewed by CISA.|[Gigamon Customer Support Portal](https://community.gigamon.com/gigamoncp/s/my-gigamon)| -|GitHub|All|GitHub.com and GitHub Enterprise Cloud|Not vuln|Fix| | | |[GitHub Statement](https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/)| -|GitHub|Github Enterprise Server|3.3.1, 3.2.6, 3.1.14, 3.0.22|Not vuln|Fix| | | |[source](https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/)| -|GitLab|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forum.gitlab.com/t/cve-2021-4428/62763/8)| -|GitLab|DAST analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| -|GitLab|Dependency Scanning| |Not vuln|Fix| | | |[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| -|GitLab|Gemnasium-Maven| |Not vuln|Fix| | | |[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| -|GitLab|PMD OSS| |Not vuln|Fix| | | |[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| -|GitLab|SAST| |Not vuln|Fix| | | |[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| -|GitLab|Spotbugs| |Not vuln|Fix| | | |[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| -|Globus|All| | | | | | |[Globus Statement](https://groups.google.com/a/globus.org/g/discuss/c/FJK0q0NoUC4)| -|GoAnywhere|Agents| |Not vuln|Workaround| | | |[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| -|GoAnywhere|Gateway|version 2.7.0 or later|Not vuln|Fix| | | |[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| -|GoAnywhere|MFT|version 5.3.0 or later|Not vuln|Fix| | | |[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| +|GitHub|All|GitHub.com and GitHub Enterprise Cloud|Not vuln|Fix| | ||[GitHub Statement](https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/)| +|GitHub|Github Enterprise Server|3.3.1, 3.2.6, 3.1.14, 3.0.22|Not vuln|Fix| | ||[source](https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/)| +|GitLab|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forum.gitlab.com/t/cve-2021-4428/62763/8)| +|GitLab|DAST analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| +|GitLab|Dependency Scanning| |Not vuln|Fix| | ||[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| +|GitLab|Gemnasium-Maven| |Not vuln|Fix| | ||[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| +|GitLab|PMD OSS| |Not vuln|Fix| | ||[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| +|GitLab|SAST| |Not vuln|Fix| | ||[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| +|GitLab|Spotbugs| |Not vuln|Fix| | ||[source](https://about.gitlab.com/blog/2021/12/15/updates-and-actions-to-address-logj-in-gitlab/)| +|Globus|All| | | | | ||[Globus Statement](https://groups.google.com/a/globus.org/g/discuss/c/FJK0q0NoUC4)| +|GoAnywhere|Agents| |Not vuln|Workaround| | ||[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| +|GoAnywhere|Gateway|version 2.7.0 or later|Not vuln|Fix| | ||[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| +|GoAnywhere|MFT|version 5.3.0 or later|Not vuln|Fix| | ||[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| |GoAnywhere|MFT Agents|1.4.2 or later| |Vulnerable| | |Versions less than GoAnywhere Agent version 1.4.2 are not affected|[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| -|GoAnywhere|Open PGP Studio| |Not vuln|Workaround| | | |[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| -|GoAnywhere|Surveyor/400| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| -|GoCD|All| | | | | | |[GoCD Statement](https://www.gocd.org/2021/12/14/log4j-vulnerability.html)| +|GoAnywhere|Open PGP Studio| |Not vuln|Workaround| | ||[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| +|GoAnywhere|Surveyor/400| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps)| +|GoCD|All| | | | | ||[GoCD Statement](https://www.gocd.org/2021/12/14/log4j-vulnerability.html)| |Google Cloud|Access Transparency| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| -|Google Cloud|Actifio| |Not vuln|Not vuln|Not vuln|Not vuln|"Actifio has identified limited exposure to the Log4j 2 vulnerability and has released a hotfix to address this vulnerability. Visit https://now.actifio.com for the full statement and to obtain the hotfix (available to Actifio customers only)."|[source](https://cloud.google.com/log4j2-security-advisory)| +|Google Cloud|Actifio| |Not vuln|Not vuln|Not vuln|Not vuln|Actifio has identified limited exposure to the Log4j 2 vulnerability and has released a hotfix to address this vulnerability. Visit https://now.actifio.com https://now.actifio.com for the full statement and to obtain the hotfix (available to Actifio customers only).|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|AI Platform Data Labeling| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|AI Platform Neural Architecture Search (NAS)| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|AI Platform Training and Prediction| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| @@ -131,7 +133,7 @@ |Google Cloud|Document AI| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|Event Threat Detection| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|Eventarc| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| -|Google Cloud|Filestore| |Not vuln|Not vuln|Not vuln|Not vuln|"Log4j 2 is contained within the Filestore service; there is a technical control in place that mitigates the vulnerabilities in CVE-2021-44228 and CVE-2021-45046. Log4j 2 will be updated to the latest version as part of the scheduled rollout in January 2022."|[source](https://cloud.google.com/log4j2-security-advisory)| +|Google Cloud|Filestore| |Not vuln|Not vuln|Not vuln|Not vuln|Log4j 2 is contained within the Filestore service; there is a technical control in place that mitigates the vulnerabilities in CVE-2021-44228 and CVE-2021-45046. Log4j 2 will be updated to the latest version as part of the scheduled rollout in January 2022.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|Firebase| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|Firestore| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|Game Servers| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| @@ -173,22 +175,22 @@ |Google Cloud|Web Security Scanner| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Google Cloud|Workflows| |Not vuln|Not vuln|Not vuln|Not vuln|Product does not use Log4j 2 and is not impacted by the issues identified in CVE-2021-44228 and CVE-2021-45046.|[source](https://cloud.google.com/log4j2-security-advisory)| |Gradle|All| |Not vuln|Not vuln|Not vuln|Not vuln|Gradle Scala Compiler Plugin depends upon log4j-core but it is not used.|[source](https://blog.gradle.org/log4j-vulnerability)| -|Gradle|Enterprise|2021.3.6|Not vuln|Fix| | | |[source](https://security.gradle.com/advisory/2021-11)| -|Gradle|Enterprise Build Cache Node|10.1|Not vuln|Fix| | | |[source](https://security.gradle.com/advisory/2021-11)| -|Gradle|Enterprise Test Distribution Agent|1.6.2|Not vuln|Fix| | | |[source](https://security.gradle.com/advisory/2021-11)| -|Grafana|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://grafana.com/blog/2021/12/14/grafana-labs-core-products-not-impacted-by-log4j-cve-2021-44228-and-related-vulnerabilities/)| -|Grandstream|All| | | | | | |[Grandstream Statement](https://blog.grandstream.com/press-releases/grandstream-products-unaffected-by-log4j-vulnerability?hsLang=en)| -|Gravitee|Access Management|3.10.x|Not vuln|Not vuln|Not vuln|Not vuln| |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| -|Gravitee|Access Management|3.5.x|Not vuln|Not vuln|Not vuln|Not vuln| |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| -|Gravitee|Alert Engine|1.4.x|Not vuln|Not vuln|Not vuln|Not vuln| |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| -|Gravitee|Alert Engine|1.5.x|Not vuln|Not vuln|Not vuln|Not vuln| |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| -|Gravitee|API Management|3.10.x|Not vuln|Not vuln|Not vuln|Not vuln| |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| -|Gravitee|API Management|3.5.x|Not vuln|Not vuln|Not vuln|Not vuln| |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| -|Gravitee|Cockpit|1.4.x|Not vuln|Not vuln|Not vuln|Not vuln| |[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| -|Gravitee.io|All| | | | | | |[Gravitee.io Statement](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gradle|Enterprise|2021.3.6|Not vuln|Fix| | ||[source](https://security.gradle.com/advisory/2021-11)| +|Gradle|Enterprise Build Cache Node|10.1|Not vuln|Fix| | ||[source](https://security.gradle.com/advisory/2021-11)| +|Gradle|Enterprise Test Distribution Agent|1.6.2|Not vuln|Fix| | ||[source](https://security.gradle.com/advisory/2021-11)| +|Grafana|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://grafana.com/blog/2021/12/14/grafana-labs-core-products-not-impacted-by-log4j-cve-2021-44228-and-related-vulnerabilities/)| +|Grandstream|All| | | | | ||[Grandstream Statement](https://blog.grandstream.com/press-releases/grandstream-products-unaffected-by-log4j-vulnerability?hsLang=en)| +|Gravitee|Access Management|3.10.x|Not vuln|Not vuln|Not vuln|Not vuln||[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gravitee|Access Management|3.5.x|Not vuln|Not vuln|Not vuln|Not vuln||[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gravitee|Alert Engine|1.4.x|Not vuln|Not vuln|Not vuln|Not vuln||[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gravitee|Alert Engine|1.5.x|Not vuln|Not vuln|Not vuln|Not vuln||[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gravitee|API Management|3.10.x|Not vuln|Not vuln|Not vuln|Not vuln||[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gravitee|API Management|3.5.x|Not vuln|Not vuln|Not vuln|Not vuln||[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gravitee|Cockpit|1.4.x|Not vuln|Not vuln|Not vuln|Not vuln||[About the Log4J CVSS 10 Critical Vulnerability](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| +|Gravitee.io|All| | | | | ||[Gravitee.io Statement](https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability)| |Gravwell|All| |Not vuln|Not vuln|Not vuln|Not vuln|Gravwell products do not use Java|[source](https://www.gravwell.io/blog/cve-2021-44228-log4j-does-not-impact-gravwell-products)| -|Graylog|All|3.3.15, 4.0.14, 4.1.9, 4.2.3|Not vuln|Fix| | |"The vulnerable Log4j library is used to record GrayLog's own log information. Vulnerability is not triggered when GrayLog stores exploitation vector from an outer system. Graylog version 4.2.4 fixes another vulnerability"|[source](https://www.graylog.org/post/graylog-update-for-log4j)| -|Graylog|Server|All versions >= 1.2.0 and <= 4.2.2|Not vuln|Fix| | | |[Graylog Update for Log4j](https://www.graylog.org/post/graylog-update-for-log4j)| -|Greenshot|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://greenshot.atlassian.net/browse/BUG-2871)| -|GuardedBox|All|3.1.2|Not vuln|Fix| | | |[source](https://twitter.com/GuardedBox/status/1469739834117799939)| -|Guidewire|All| | | | | | |[Guidewire Statement](https://community.guidewire.com/s/article/Update-to-customers-who-have-questions-about-the-use-of-log4j-in-Guidewire-products)| +|Graylog|All|3.3.15, 4.0.14, 4.1.9, 4.2.3|Not vuln|Fix| | |The vulnerable Log4j library is used to record GrayLog's own log information. Vulnerability is not triggered when GrayLog stores exploitation vector from an outer system. Graylog https://github.com/Graylog2/graylog2-server/compare/4.2.3...4.2.4"">version 4.2.4 fixes https://www.lunasec.io/docs/blog/log4j-zero-day-update-on-cve-2021-45046/ another vulnerability|[source](https://www.graylog.org/post/graylog-update-for-log4j)| +|Graylog|Server|All versions >= 1.2.0 and <= 4.2.2|Not vuln|Fix| | ||[Graylog Update for Log4j](https://www.graylog.org/post/graylog-update-for-log4j)| +|Greenshot|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://greenshot.atlassian.net/browse/BUG-2871)| +|GuardedBox|All|3.1.2|Not vuln|Fix| | ||[source](https://twitter.com/GuardedBox/status/1469739834117799939)| +|Guidewire|All| | | | | ||[Guidewire Statement](https://community.guidewire.com/s/article/Update-to-customers-who-have-questions-about-the-use-of-log4j-in-Guidewire-products)| diff --git a/software/software_list_h.md b/software/software_list_h.md index 85caf326f..5fb2c986a 100644 --- a/software/software_list_h.md +++ b/software/software_list_h.md @@ -7,303 +7,309 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|HackerOne|All| |Not vuln|Fix| | | |[source](https://twitter.com/jobertabma/status/1469490881854013444)| -|HAProxy|All| | | | | | |[HAProxy Statement](https://www.haproxy.com/blog/december-2021-log4shell-mitigation/)| -|HarmanPro AMX|All| | | | | | |[HarmanPro AMX Statement](https://help.harmanpro.com/apache-log4j-vulnerability)| -|Hashicorp|All| | |Not vuln| | | |[source](https://support.hashicorp.com/hc/en-us/articles/4412469195795-CVE-2021-44228-Log4J-has-no-impact-on-HashiCorp-Products)| +|HMS Industrial Networks AB|Cosy, Flexy and Ewon CD| | | | | ||[link](https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11)| +|HMS Industrial Networks AB|Netbiter Hardware including EC, WS, and LC| | | | | ||[link](https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11)| +|HMS Industrial Networks AB|Talk2M including M2Web| | | | | ||[link](https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11)| +|HMS Industrial Networks AB|eCatcher Mobile applications| | | | | ||[link](https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11)| +|HMS Industrial Networks AB|eCatcher Windows software| | | | | ||[link](https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11)| +|HPE/Micro Focus|Data Protector| | |Fix| | ||[link](https://portal.microfocus.com/s/article/KM000003243)| +|HackerOne|All| |Not vuln|Fix| | ||[source](https://twitter.com/jobertabma/status/1469490881854013444)| +|HAProxy|All| | | | | ||[HAProxy Statement](https://www.haproxy.com/blog/december-2021-log4shell-mitigation/)| +|HarmanPro AMX|All| | | | | ||[HarmanPro AMX Statement](https://help.harmanpro.com/apache-log4j-vulnerability)| +|Hashicorp|All| | |Not vuln| | ||[source](https://support.hashicorp.com/hc/en-us/articles/4412469195795-CVE-2021-44228-Log4J-has-no-impact-on-HashiCorp-Products)| |HCL Software|BigFix Compliance| |Not vuln|Not vuln|Not vuln| ||[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| -|HCL Software|BigFix Insights| |Not vuln|Not vuln|Not vuln|Not vuln||"[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| -|HCL Software|BigFix Insights for Vulnerability Remediation| |Not vuln|Not vuln|Not vuln|Not vuln||"[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| +|HCL Software|BigFix Insights| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| +|HCL Software|BigFix Insights for Vulnerability Remediation| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| |HCL Software|BigFix Inventory|< 10.0.7|Not vuln|Workaround|Not vuln| ||[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| |HCL Software|BigFix Lifecycle| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| |HCL Software|BigFix Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| |HCL Software|BigFix Patch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486)| -|Heimdal Security|web-based services|Cloud|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://heimdalsecurity.com/blog/log4j-vulnerability/)| -|Helpsystems|Clearswift Secure Email Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| -|Helpsystems|Clearswift Secure Exchange Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| -|Helpsystems|Clearswift Secure ICAP Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| -|Helpsystems|Clearswift Secure Web Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| -|HelpSystems Clearswift|All| | | | | | |[HelpSystems Clearswift](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687)| -|HENIX|Squash TM|1.21.7 - 1.22.9, 2.0.3 - 2.1.5, 2.2.0 - 3.0.2|Not vuln|Fix| | | |[Vendor Link](https://tm-en.doc.squashtest.com/v3/downloads.html#download-previous-versions)| -|Hexagon|ERDAS APOLLO - Catalog Explorer| |Not vuln|Fix| | | |[source](https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US#:~:text=For%20the%20following%20products%20fixes%20are%20available)| -|Hexagon|ERDAS APOLLO Advantage & Professional| | |Investigation| | | |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|ERDAS APOLLO Essentials| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|GeoCompressor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|GeoMedia| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|GeoMedia SmartClient| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|GeoMedia WebMap| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Heimdal Security|web-based services|Cloud|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://heimdalsecurity.com/blog/log4j-vulnerability/)| +|Helpsystems|Clearswift Secure Email Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| +|Helpsystems|Clearswift Secure Exchange Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| +|Helpsystems|Clearswift Secure ICAP Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| +|Helpsystems|Clearswift Secure Web Gateway|5.4.0 ,5.3.0| |Vulnerable| | |Investigation|[source](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687&redirect=false)| +|HelpSystems Clearswift|All| | | | | ||[HelpSystems Clearswift](https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687)| +|HENIX|Squash TM|1.21.7 - 1.22.9, 2.0.3 - 2.1.5, 2.2.0 - 3.0.2|Not vuln|Fix| | ||[Vendor Link](https://tm-en.doc.squashtest.com/v3/downloads.html#download-previous-versions)| +|Hexagon|ERDAS APOLLO - Catalog Explorer| |Not vuln|Fix| | ||[source](https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US#:~:text=For%20the%20following%20products%20fixes%20are%20available)| +|Hexagon|ERDAS APOLLO Advantage & Professional| | |Investigation| | ||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|ERDAS APOLLO Essentials| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|GeoCompressor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|GeoMedia| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|GeoMedia SmartClient| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|GeoMedia WebMap| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| |Hexagon|Geoprocessing Server| |Not vuln|Fix| | |Fixed with 2022GeoprocessingLog4j-SecurityVulnerability.zip|[source](https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US#:~:text=For%20the%20following%20products%20fixes%20are%20available)| -|Hexagon|Geospatial Portal| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Geospatial SDI| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN Connect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN InService (All InService products)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN NetWorks Comms (G/Tech Fiber Optic Works)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN NetWorks Core (G/Technology products)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN NetWorks WebServices (NetWotks)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN OnCall Analytics| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN OnCall Dispatch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN OnCall Mobile| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN OnCall Mobile Admin| | |Vulnerable| | | |[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN OnCall Mobile Unit| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN OnCall Planning & Response| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN OnCall Records| |Not vuln|Fix| | | |[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US#:~:text=of%20these%20products.-,%5BUpdate%202%5D,-Hexagon%20has%20released)| -|Hexagon|HxGN OnCall Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|HxGN Xalt| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|I/Map Editor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|ImageStation| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|IMAGINE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|inPURSUIT Client| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|inPURSUIT Server (Workflow)| |Not vuln|Fix| | | |[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US#:~:text=inPURSUIT%20Server%20(Workflow))| -|Hexagon|Intergraph CAD (All I/CAD products)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Intergraph Fiber Optic Works – ESC| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Intergraph G!NIUS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Intergraph G/Technology – ESC| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Intergraph LEADS (All I/LEADS products)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Intergraph Mobile (I/Mobile, Mobile Public Safety, Mobile Responder)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Intergraph NetWorks - ESC| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|Intergraph Security (All I/Security products)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|LuciadFusion| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|LuciadLightspeed| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hexagon|M.App Enterprise| | |Vulnerable| | | |[source](https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US#:~:text=in%20ERDAS%20APOLLO%2C%C2%A0-,M.App%20Enterprise,-and%20M.App)| -|Hexagon|M.App X - Geoprocessing Server| | |Vulnerable| | | |[source](https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US#:~:text=App%20Enterprise%20and-,M.App%20X,-have%20been%20found)| -|Hexagon|NIBRS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| -|Hikvision|All| | | | | | |[Hikvision](https://video.xortec.de/media/pdf/87/e8/03/kw50_Update-for-Apache-Log4j2-Issue-Hikvision_official.pdf)| -|Hitachi Energy|all other products| | |Investigation| | |Meta-Advisory listing all known affected products, other are still unter investigation|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Axis|3.6|Not vuln|Fix|Fix| |SaaS only, patched by vendor|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000093&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Counterparty Settlement and Billing (CSB) version 6|6|Not vuln|Workaround|Workaround|Workaround|request patch from vendor|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000090&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|e-Mesh Monitor| |Not vuln|Fix|Fix| |"affected part at cloud & handled by vendor, no user action required"|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000098&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|eSOMS| |Not vuln|Not vuln|Not vuln|Not vuln| |[Hitachi Energy](https://www.hitachienergy.com/offering/solutions/cybersecurity/alerts-and-notifications)| -|Hitachi Energy|FOXMAN-UN|< R11BSP1|Not vuln|Vulnerable|Vulnerable|Vulnerable| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000088&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|FOXMAN-UN|R15A, R14B, R14A, R11BSP1|Not vuln|Workaround|Workaround|Workaround|patch at customer portal avilable|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000088&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|5.0 or later|Not vuln|Not vuln|Not vuln| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.0.0.0, 6.0.0.1, 6.0.0.2|Not vuln|Vulnerable|Vulnerable| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.0.0.3|Not vuln|Fix|Fix| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.1.0.0|Not vuln|Vulnerable|Vulnerable| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.1.0.1|Not vuln|Fix|Fix| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.2.0.0, 6.2.0.1|Not vuln|Vulnerable|Vulnerable| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.2.0.2|Not vuln|Fix|Fix| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.3.0.0|Not vuln|Vulnerable|Vulnerable| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM On-premises|6.3.0.1|Not vuln|Fix|Fix| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada APM SaaS| |Not vuln|Fix|Fix| |handled by vendor, no user action required|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Lumada EAM / FSM|v1.7.x, v1.8.x, v1.9.x|Not vuln|Workaround|Workaround| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000095&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|MMS internal facing subcomponent| |Not vuln|Workaround|Workaround| |Patch is available and delivered|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000094&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Network Manager ADMS Network Model Server|9.1.0.32 – 9.1.0.44|Not vuln|Workaround|Workaround| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000091&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Network Manager Outage Management Interface (OMI) – Client Application|9.0 – 9.1.0.44, 9.1.1, 10.3.4|Not vuln|Workaround|Workaround| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000091&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Network Manager Outage Management Interface (OMI) – Third Party Oracle Database Components (Trace File Analyzer, SQL Developer, Property Graph)|12.1, 12.2, 19c|Not vuln|Vulnerable|Vulnerable| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000091&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|Network Manager SCADA/EMS, Ranger and NMR Product – Third Party Oracle Database Components (Trace File Analyzer, SQL Developer, Property Graph)|12.1, 12.2, 19c|Not vuln|Vulnerable|Vulnerable| | |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000092&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket CAISO|2.9.30 and prior|Vulnerable|Not vuln|Not vuln|Not vuln| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket Global I-SEM|3.7.16.01|Not vuln|Fix|Fix|Fix| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000096&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket Global MISO SaaS|3.0.40.03 on premise|Vulnerable|Not vuln|Not vuln|Not vuln| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket Global MISO SaaS|3.0.40.03|Workaround|Not vuln|Not vuln|Not vuln|no customer action required|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket Global SPP SaaS|3.0.40.01 on premise|Vulnerable|Not vuln|Not vuln|Not vuln| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket Global SPP SaaS|3.0.40.01|Workaround|Not vuln|Not vuln|Not vuln|no customer action required|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket NE|4.6.26 and prior|Vulnerable|Not vuln|Not vuln|Not vuln| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket NY|4.1.45 and prior|Vulnerable|Not vuln|Not vuln|Not vuln| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket PJM|5.4.28 and prior|Vulnerable|Not vuln|Not vuln|Not vuln| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|nMarket TX|3.1.18 and prior|Vulnerable|Not vuln|Not vuln|Not vuln| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|RelCare|2.0|Not vuln|Fix|Fix| |patched by vendor|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000097&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|UNEM|< R11BSP1|Not vuln|Vulnerable|Vulnerable|Vulnerable| |"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000089&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Energy|UNEM|R15A, R14B, R14A, R11BSP1|Not vuln|Workaround|Workaround|Workaround|patch at customer portal avilable|"[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000089&LanguageCode=en&DocumentPartId=&Action=Launch)"| -|Hitachi Vantara|Pentaho|v8.3.x, v9.2.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.pentaho.com/hc/en-us/articles/4416229254541-log4j-2-zero-day-vulnerability-No-impact-to-supported-versions-of-Pentaho-)| -|HMS-Networks|All| | | | | | |[source](https://www.hms-networks.com/cybersecurity)| +|Hexagon|Geospatial Portal| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Geospatial SDI| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN Connect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN InService (All InService products)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN NetWorks Comms (G/Tech Fiber Optic Works)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN NetWorks Core (G/Technology products)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN NetWorks WebServices (NetWotks)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN OnCall Analytics| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN OnCall Dispatch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN OnCall Mobile| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN OnCall Mobile Admin| | |Vulnerable| | ||[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN OnCall Mobile Unit| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN OnCall Planning & Response| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN OnCall Records| |Not vuln|Fix| | ||[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US#:~:text=of%20these%20products.-,%5BUpdate%202%5D,-Hexagon%20has%20released)| +|Hexagon|HxGN OnCall Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|HxGN Xalt| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|I/Map Editor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|ImageStation| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|IMAGINE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|inPURSUIT Client| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|inPURSUIT Server (Workflow)| |Not vuln|Fix| | ||[source](https://supportsi.hexagon.com/help/s/article/Hexagon-Security-Alert-CVE-2021-44228?language=en_US#:~:text=inPURSUIT%20Server%20(Workflow))| +|Hexagon|Intergraph CAD (All I/CAD products)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Intergraph Fiber Optic Works – ESC| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Intergraph G!NIUS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Intergraph G/Technology – ESC| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Intergraph LEADS (All I/LEADS products)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Intergraph Mobile (I/Mobile, Mobile Public Safety, Mobile Responder)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Intergraph NetWorks - ESC| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|Intergraph Security (All I/Security products)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|LuciadFusion| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|LuciadLightspeed| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hexagon|M.App Enterprise| | |Vulnerable| | ||[source](https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US#:~:text=in%20ERDAS%20APOLLO%2C%C2%A0-,M.App%20Enterprise,-and%20M.App)| +|Hexagon|M.App X - Geoprocessing Server| | |Vulnerable| | ||[source](https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US#:~:text=App%20Enterprise%20and-,M.App%20X,-have%20been%20found)| +|Hexagon|NIBRS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportsi.hexagon.com/help/s/article/log4j2-Security-Product-Vulnerability-Summary-CVE-2021-44228?language=en_US)| +|Hikvision|All| | | | | ||[Hikvision](https://video.xortec.de/media/pdf/87/e8/03/kw50_Update-for-Apache-Log4j2-Issue-Hikvision_official.pdf)| +|Hitachi Energy|all other products| | |Investigation| | |Meta-Advisory listing all known affected products, other are still unter investigation|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Axis|3.6|Not vuln|Fix|Fix| |SaaS only, patched by vendor|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000093&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Counterparty Settlement and Billing (CSB) version 6|6|Not vuln|Workaround|Workaround|Workaround|request patch from vendor|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000090&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|e-Mesh Monitor| |Not vuln|Fix|Fix| |affected part at cloud & handled by vendor, no user action required|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000098&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|eSOMS| |Not vuln|Not vuln|Not vuln|Not vuln||[Hitachi Energy](https://www.hitachienergy.com/offering/solutions/cybersecurity/alerts-and-notifications)| +|Hitachi Energy|FOXMAN-UN|< R11BSP1|Not vuln|Vulnerable|Vulnerable|Vulnerable||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000088&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|FOXMAN-UN|R15A, R14B, R14A, R11BSP1|Not vuln|Workaround|Workaround|Workaround|patch at customer portal avilable|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000088&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|5.0 or later|Not vuln|Not vuln|Not vuln| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.0.0.0, 6.0.0.1, 6.0.0.2|Not vuln|Vulnerable|Vulnerable| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.0.0.3|Not vuln|Fix|Fix| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.1.0.0|Not vuln|Vulnerable|Vulnerable| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.1.0.1|Not vuln|Fix|Fix| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.2.0.0, 6.2.0.1|Not vuln|Vulnerable|Vulnerable| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.2.0.2|Not vuln|Fix|Fix| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.3.0.0|Not vuln|Vulnerable|Vulnerable| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM On-premises|6.3.0.1|Not vuln|Fix|Fix| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada APM SaaS| |Not vuln|Fix|Fix| |handled by vendor, no user action required|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000087&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Lumada EAM / FSM|v1.7.x, v1.8.x, v1.9.x|Not vuln|Workaround|Workaround| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000095&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|MMS internal facing subcomponent| |Not vuln|Workaround|Workaround| |Patch is available and delivered|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000094&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Network Manager ADMS Network Model Server|9.1.0.32 – 9.1.0.44|Not vuln|Workaround|Workaround| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000091&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Network Manager Outage Management Interface (OMI) – Client Application|9.0 – 9.1.0.44, 9.1.1, 10.3.4|Not vuln|Workaround|Workaround| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000091&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Network Manager Outage Management Interface (OMI) – Third Party Oracle Database Components (Trace File Analyzer, SQL Developer, Property Graph)|12.1, 12.2, 19c|Not vuln|Vulnerable|Vulnerable| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000091&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|Network Manager SCADA/EMS, Ranger and NMR Product – Third Party Oracle Database Components (Trace File Analyzer, SQL Developer, Property Graph)|12.1, 12.2, 19c|Not vuln|Vulnerable|Vulnerable| ||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000092&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket CAISO|2.9.30 and prior|Vulnerable|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket Global I-SEM|3.7.16.01|Not vuln|Fix|Fix|Fix||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000096&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket Global MISO SaaS|3.0.40.03 on premise|Vulnerable|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket Global MISO SaaS|3.0.40.03|Workaround|Not vuln|Not vuln|Not vuln|no customer action required|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket Global SPP SaaS|3.0.40.01 on premise|Vulnerable|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket Global SPP SaaS|3.0.40.01|Workaround|Not vuln|Not vuln|Not vuln|no customer action required|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000100&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket NE|4.6.26 and prior|Vulnerable|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket NY|4.1.45 and prior|Vulnerable|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket PJM|5.4.28 and prior|Vulnerable|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|nMarket TX|3.1.18 and prior|Vulnerable|Not vuln|Not vuln|Not vuln||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000099&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|RelCare|2.0|Not vuln|Fix|Fix| |patched by vendor|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000097&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|UNEM|< R11BSP1|Not vuln|Vulnerable|Vulnerable|Vulnerable||[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000089&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Energy|UNEM|R15A, R14B, R14A, R11BSP1|Not vuln|Workaround|Workaround|Workaround|patch at customer portal avilable|[source](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000089&LanguageCode=en&DocumentPartId=&Action=Launch)| +|Hitachi Vantara|Pentaho|v8.3.x, v9.2.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.pentaho.com/hc/en-us/articles/4416229254541-log4j-2-zero-day-vulnerability-No-impact-to-supported-versions-of-Pentaho-)| +|HMS-Networks|All| | | | | ||[source](https://www.hms-networks.com/cybersecurity)| |Hologic|Advanced Workflow Manager (AWM)| | |Investigation| | |While the Hologic software itself does not utilize Java/Log4J, the installed APC PowerChute UPS with Business Edition v9.5 software installed may. APC is still assessing its PowerChute software to determine if it is vulnerable.|[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Affirm Prone Biopsy System| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Brevera Breast Biopsy System| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Cenova Image Analytics Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[HOLOGIC Advisory Link](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Cenova Image Analytics Server (CAD)| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Dimensions / 3Dimensions Mammography System| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Discovery Bone Densitometer| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Affirm Prone Biopsy System| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Brevera Breast Biopsy System| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Cenova Image Analytics Server| |Not vuln|Not vuln|Not vuln|Not vuln||[HOLOGIC Advisory Link](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Cenova Image Analytics Server (CAD)| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Dimensions / 3Dimensions Mammography System| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Discovery Bone Densitometer| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| |Hologic|Faxitron CT Specimen Radiography System| | |Investigation| | |While the Hologic software itself does not utilize Java/Log4J, there is a utility program installed that may utilize Java and Log4J. This utility program does not run on startup and is not required for system operation.|[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Faxitron Specimen Radiography Systems| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Fluoroscan Insight Mini C-Arm| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Horizon DXA Bone Densitometer| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Rosetta DC Tomosynthesis Data Converter| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|SecurView DX Workstation| |Not vuln|Not vuln|Not vuln|Not vuln| |[HOLOGIC Advisory Link](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|SecurView DX/RT Workstation and Manager| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|SecurXChange Router| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|SuperSonic Imagine Ultrasound Products (Aixplorer & Aixplorer Mach)| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Trident HD Specimen Radiography System| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Faxitron Specimen Radiography Systems| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Fluoroscan Insight Mini C-Arm| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Horizon DXA Bone Densitometer| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Rosetta DC Tomosynthesis Data Converter| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|SecurView DX Workstation| |Not vuln|Not vuln|Not vuln|Not vuln||[HOLOGIC Advisory Link](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|SecurView DX/RT Workstation and Manager| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|SecurXChange Router| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|SuperSonic Imagine Ultrasound Products (Aixplorer & Aixplorer Mach)| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Hologic|Trident HD Specimen Radiography System| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| |Hologic|Unifi Workspace| | |Investigation| | |While the Hologic software itself does not utilize Java/Log4J, the installed APC PowerChute UPS with Business Edition v9.5 software installed may. APC is still assessing its PowerChute software to determine if it is vulnerable.|[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Hologic|Windows Selenia Mammography System| | |Not vuln| | | |[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| -|Honeywell|All| | | | | | |[Honeywell Statement](https://www.honeywell.com/us/en/press/2021/12/honeywells-statement-on-java-apache-log4j-logging-framework-vulnerability)| +|Hologic|Windows Selenia Mammography System| | |Not vuln| | ||[source](https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity)| +|Honeywell|All| | | | | ||[Honeywell Statement](https://www.honeywell.com/us/en/press/2021/12/honeywells-statement-on-java-apache-log4j-logging-framework-vulnerability)| |HostiFi|Unifi hosting| |Not vuln|Fix| | |Hosted Unifi solution|[source](https://twitter.com/hostifi_net/status/1440311322592231436)| -|HP|Teradici Cloud Access Controller|< v113|Not vuln|Fix| | | |[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| -|HP|Teradici EMSDK|< 1.0.6|Not vuln|Fix| | | |[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| -|HP|Teradici Management Console|< 21.10.3|Not vuln|Fix| | | |[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| -|HP|Teradici PCoIP Connection Manager|< 21.03.6, < 20.07.4|Not vuln|Fix| | | |[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| -|HP|Teradici PCoIP License Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| -|HPE|3PAR Service Processor|5.x|Not vuln|Fix| | |Fixed in version 5.0.9.2|"[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us) [release notes](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00002915en_us)"| -|HPE|3PAR StoreServ Arrays| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|AirWave Management Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Alletra 6000| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Alletra 9k| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba Central| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba ClearPass Policy Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba Instant (IAP)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba Location Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba NetEdit| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba NetInsight Network Analytics|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Aruba PVOS Switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba SDN VAN Controller| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba User Experience Insight (UXI)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Aruba VIA Client| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|ArubaOS SD-WAN Controllers and Gateways| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|ArubaOS Wi-Fi Controllers and Gateways| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|ArubaOS-CX switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|ArubaOS-S switches| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Authentication Server Function (AUSF)|1.2107.0, 1.2109.0 and 1.2112.0| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|B-series SN2600B SAN Extension Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|B-series SN4000B SAN Extension Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|B-series SN6000B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|B-series SN6500B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|B-series SN6600B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|B-series SN6650B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|B-series SN6700B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|BladeSystem Onboard Administrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Brocade 16Gb Fibre Channel SAN Switch for HPE Synergy| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Brocade 16Gb SAN Switch for HPE BladeSystem c-Class| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Brocade 32Gb Fibre Channel SAN Switch for HPE Synergy| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Brocade Network Advisor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|CloudAuth| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|CloudPhysics| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Compute Cloud Console| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Compute operations manager- FW UPDATE SERVICE| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Compute operations manager- FW UPDATE SERVICE (internal name olive)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|COS (Cray Operating System)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Cray EX System Monitoring Application (SMA)|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Cray Systems Management (CSM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Cray View for ClusterStor|1.3.1| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Custom SPP Portal (https://spp.hpe.com/custom)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Custom SPP Portal Link| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Customer Experience Assurance (CEA)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Data Management Framework|7.x| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Data Services Cloud Console| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Device Entitlement Gateway (DEG)|5| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Dragon|7.2 and 7.3| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Dynamic SIM Provisioning (DSP)|DSP3.3, DSP3.1 and DSP3.4| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Edge Infrastructure Automation|2.0.x| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|enhanced Internet Usage Manager (eIUM)|10.6.3| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Ezmeral Container Platform|5.x| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Ezmeral Container Platform Bluedata EPIC|3.x and 4.x| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Ezmeral Data Fabric|"Core/Client v6.2.0; MCS v6.0.1, v6.1.0, v6.1.1 and v6.2.0; Installer v1.17.0.0 and older"| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Ezmeral Ecosystem Pack (EEP)|"Elastic Search v6.8.8 and older; Data Access Gateway (DAG) v2.x and older; Hive v2.3.x and older; HBase v1.4.13 and older; Kafka HDFS Connector v10.0.0 and older"| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HP|Teradici Cloud Access Controller|< v113|Not vuln|Fix| | ||[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| +|HP|Teradici EMSDK|< 1.0.6|Not vuln|Fix| | ||[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| +|HP|Teradici Management Console|< 21.10.3|Not vuln|Fix| | ||[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| +|HP|Teradici PCoIP Connection Manager|< 21.03.6, < 20.07.4|Not vuln|Fix| | ||[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| +|HP|Teradici PCoIP License Server| |Not vuln|Not vuln|Not vuln|Not vuln||[Apache Log4j update for Teradici PCoIP Connection Manager, Teradici Cloud Access Connector, Teradici PCoIP License Server, Teradici Management Console, and Teradici EMSDK](https://support.hp.com/us-en/document/ish_5268006-5268030-16)| +|HPE|3PAR Service Processor|5.x|Not vuln|Fix| | |Fixed in version 5.0.9.2|[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us) [release notes](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00002915en_us)| +|HPE|3PAR StoreServ Arrays| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|AirWave Management Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Alletra 6000| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Alletra 9k| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba Central| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba ClearPass Policy Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba Instant (IAP)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba Location Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba NetEdit| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba NetInsight Network Analytics|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Aruba PVOS Switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba SDN VAN Controller| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba User Experience Insight (UXI)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Aruba VIA Client| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|ArubaOS SD-WAN Controllers and Gateways| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|ArubaOS Wi-Fi Controllers and Gateways| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|ArubaOS-CX switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|ArubaOS-S switches| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Authentication Server Function (AUSF)|1.2107.0, 1.2109.0 and 1.2112.0| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|B-series SN2600B SAN Extension Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|B-series SN4000B SAN Extension Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|B-series SN6000B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|B-series SN6500B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|B-series SN6600B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|B-series SN6650B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|B-series SN6700B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|BladeSystem Onboard Administrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Brocade 16Gb Fibre Channel SAN Switch for HPE Synergy| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Brocade 16Gb SAN Switch for HPE BladeSystem c-Class| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Brocade 32Gb Fibre Channel SAN Switch for HPE Synergy| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Brocade Network Advisor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|CloudAuth| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|CloudPhysics| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Compute Cloud Console| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Compute operations manager- FW UPDATE SERVICE| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Compute operations manager- FW UPDATE SERVICE (internal name olive)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|COS (Cray Operating System)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Cray EX System Monitoring Application (SMA)|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Cray Systems Management (CSM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Cray View for ClusterStor|1.3.1| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Custom SPP Portal (https://spp.hpe.com/custom)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Custom SPP Portal Link| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Customer Experience Assurance (CEA)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Data Management Framework|7.x| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Data Services Cloud Console| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Device Entitlement Gateway (DEG)|5| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Dragon|7.2 and 7.3| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Dynamic SIM Provisioning (DSP)|DSP3.3, DSP3.1 and DSP3.4| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Edge Infrastructure Automation|2.0.x| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|enhanced Internet Usage Manager (eIUM)|10.6.3| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Ezmeral Container Platform|5.x| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Ezmeral Container Platform Bluedata EPIC|3.x and 4.x| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Ezmeral Data Fabric|"Core/Client v6.2.0; MCS v6.0.1, v6.1.0, v6.1.1 and v6.2.0; Installer v1.17.0.0 and older"| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Ezmeral Ecosystem Pack (EEP)|"Elastic Search v6.8.8 and older; Data Access Gateway (DAG) v2.x and older; Hive v2.3.x and older; HBase v1.4.13 and older; Kafka HDFS Connector v10.0.0 and older"| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| |HPE|General information HPE| | |Investigation| | |Security bulletins for affected products will be posted on HPE Support Center, as the results of the investigation become available in the near future. HPE products not listed below are either vulnerable or undergoing investigation.|[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Hardware Support Manager plug-in for VMware vSphere Lifecycle Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Harmony Data Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Home Location Register (HLR/I-HLR)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|HOP public services (grafana, vault, rancher, Jenkins)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Hyper Converged 250 System|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Hyper Converged 380|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Infosight for Servers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Infosight for Storage|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Insight Cluster Management Utility (CMU)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Integrated Home Subscriber Server (I-HSS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| +|HPE|Hardware Support Manager plug-in for VMware vSphere Lifecycle Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Harmony Data Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Home Location Register (HLR/I-HLR)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|HOP public services (grafana, vault, rancher, Jenkins)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Hyper Converged 250 System|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Hyper Converged 380|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Infosight for Servers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Infosight for Storage|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Insight Cluster Management Utility (CMU)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Integrated Home Subscriber Server (I-HSS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| |HPE|Integrated Home Subscriber Server Software Series|4.0.x| |Vulnerable| | |Only vulnerable when using the nHSS 4G/5G IWK function|[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Integrated Lights-Out (iLO) Amplifier Pack| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Integrated Lights-Out 4 (iLO 4)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Integrated Lights-Out 5 (iLO 5)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Integrity BL860c, BL870c, BL890c| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Integrity Rx2800/Rx2900| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Integrity Superdome 2| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Integrity Superdome X| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Integrated Lights-Out (iLO) Amplifier Pack| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Integrated Lights-Out 4 (iLO 4)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Integrated Lights-Out 5 (iLO 5)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Integrity BL860c, BL870c, BL890c| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Integrity Rx2800/Rx2900| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Integrity Superdome 2| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Integrity Superdome X| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| |HPE|Intelligent Assurance|All| |Vulnerable| | |Only Analytics on Metrics is vulnerable|[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Intelligent Management Center (IMC) Standard and Enterprise|7.3 (E0706) and 7.3 (E0706P06)| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Intelligent Messaging (IM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Intelligent Network Server (INS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Intelligent Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|iSUT integrated smart update tool| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Maven Artifacts (Atlas)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Media Workflow Master (MWM)|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|MSA| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Multimedia Services Environment (MSE)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|NetEdit| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Network Function Virtualization Director (NFV Director)|5.1.x and 6.0.x| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Nimble Storage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|NS-T0634-OSM CONSOLE TOOLS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|NS-T0977-SCHEMA VALIDATOR| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|ntegrity Rx2800/Rx2900| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|OC Convergent Communications Platform (OCCP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|OC Media Platform Media Resource Function (OCMP-MRF)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|OC Service Access Controller (OC SAC)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|OC Service Controller (OCSC)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|OC Universal Signaling Platform (OC-USP-M)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|OfficeConnect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|OneView| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|OneView for VMware vRealize Operations (vROps)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|OneView Global Dashboard| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Performance Cluster Manager (HPCM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Performance Manager (PM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Position Determination Entity (PDE)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Primera Storage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Real Time Management System (RTMS)|3.0.x and 3.1.x| |Fix|Fix|Fix|Fixed in version 3.00.72.1|"[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us) [security bulletin](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04224en_us)"| -|HPE|Remote SIM Provisioning Manager (RSPM)|1.3.2 and 1.4.1| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|RepoServer part of OPA (on Premises aggregator)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Resource Aggregator for Open Distributed Infrastructure Management| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|RESTful Interface Tool (iLOREST)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Revenue Intelligence Software Series|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|SANnav Management Software|2.0.0 and 2.1.1| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|SAT (System Admin Toolkit)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Scripting Tools for Windows PowerShell (HPEiLOCmdlets)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Secure Identity Broker (SIB)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Service Activator (SA)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Service Director (SD)|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Service Governance Framework (SGF)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Service Orchestration Manager (SOM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Service Provisioner (SP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|SGI MC990 X Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SGI UV 2000 Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SGI UV 300, 300H, 300RL, 30EX| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SGI UV 3000 Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Shasta Monitoring Framework (SMF)|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Short Message Point-to-Point Gateway (SMPP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Silver Peak Orchestrator| |Not vuln|Workaround| | | |[source](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt) [workaround](https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf)| -|HPE|SimpliVity 325, 380 Gen9, 380 Gen10 and 2600 Gen10|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|SimpliVity OmniCube|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Slingshot| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Smart Interaction Server (SIS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|SN3000B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SN8000B 4-Slot SAN Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SN8000B 8-Slot SAN Backbone Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SN8600B 4-Slot SAN Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SN8600B 8-Slot SAN Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SN8700B 4-Slot Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|SN8700B 8-Slot Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|StoreEasy| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|StoreEver CVTL| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|StoreEver LTO Tape Drives| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|StoreEver MSL Tape Libraries| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|StoreOnce| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|StoreServ Management Console (SSMC)|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Subscriber, Network, and Application Policy (SNAP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Subscription Manager (SM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|SUM (Smart Update Manager)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Superdome Flex 280| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Superdome Flex Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Synergy Image Streamer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Systems Insight Manager (SIM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Telecom Analytics Smart Profile Server (TASPS)|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Telecom Application Server (TAS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| +|HPE|Intelligent Management Center (IMC) Standard and Enterprise|7.3 (E0706) and 7.3 (E0706P06)| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Intelligent Messaging (IM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Intelligent Network Server (INS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Intelligent Provisioning| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|iSUT integrated smart update tool| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Maven Artifacts (Atlas)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Media Workflow Master (MWM)|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|MSA| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Multimedia Services Environment (MSE)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|NetEdit| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Network Function Virtualization Director (NFV Director)|5.1.x and 6.0.x| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Nimble Storage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|NS-T0634-OSM CONSOLE TOOLS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|NS-T0977-SCHEMA VALIDATOR| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|ntegrity Rx2800/Rx2900| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|OC Convergent Communications Platform (OCCP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|OC Media Platform Media Resource Function (OCMP-MRF)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|OC Service Access Controller (OC SAC)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|OC Service Controller (OCSC)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|OC Universal Signaling Platform (OC-USP-M)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|OfficeConnect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|OneView| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|OneView for VMware vRealize Operations (vROps)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|OneView Global Dashboard| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Performance Cluster Manager (HPCM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Performance Manager (PM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Position Determination Entity (PDE)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Primera Storage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Real Time Management System (RTMS)|3.0.x and 3.1.x| |Fix|Fix|Fix|Fixed in version 3.00.72.1|[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us) [security bulletin](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04224en_us)| +|HPE|Remote SIM Provisioning Manager (RSPM)|1.3.2 and 1.4.1| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|RepoServer part of OPA (on Premises aggregator)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Resource Aggregator for Open Distributed Infrastructure Management| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|RESTful Interface Tool (iLOREST)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Revenue Intelligence Software Series|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|SANnav Management Software|2.0.0 and 2.1.1| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|SAT (System Admin Toolkit)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Scripting Tools for Windows PowerShell (HPEiLOCmdlets)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Secure Identity Broker (SIB)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Service Activator (SA)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Service Director (SD)|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Service Governance Framework (SGF)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Service Orchestration Manager (SOM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Service Provisioner (SP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|SGI MC990 X Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SGI UV 2000 Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SGI UV 300, 300H, 300RL, 30EX| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SGI UV 3000 Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Shasta Monitoring Framework (SMF)|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Short Message Point-to-Point Gateway (SMPP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Silver Peak Orchestrator| |Not vuln|Workaround| | ||[source](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-019.txt) [workaround](https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf)| +|HPE|SimpliVity 325, 380 Gen9, 380 Gen10 and 2600 Gen10|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|SimpliVity OmniCube|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Slingshot| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Smart Interaction Server (SIS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|SN3000B Fibre Channel Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SN8000B 4-Slot SAN Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SN8000B 8-Slot SAN Backbone Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SN8600B 4-Slot SAN Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SN8600B 8-Slot SAN Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SN8700B 4-Slot Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|SN8700B 8-Slot Director Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|StoreEasy| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|StoreEver CVTL| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|StoreEver LTO Tape Drives| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|StoreEver MSL Tape Libraries| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|StoreOnce| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|StoreServ Management Console (SSMC)|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Subscriber, Network, and Application Policy (SNAP)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Subscription Manager (SM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|SUM (Smart Update Manager)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Superdome Flex 280| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Superdome Flex Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Synergy Image Streamer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Systems Insight Manager (SIM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Telecom Analytics Smart Profile Server (TASPS)|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Telecom Application Server (TAS)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| |HPE|Telecom Management Information Platform Software Series| | |Vulnerable| | |Only TeMIP Rest Server 8.3.2 and TMB 3.4.0 are vulnerable|[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Trueview Inventory Software Series|8.6.x and 8.7.x| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|UAN (User Access Node)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Unified Correlation and Automation (UCA)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Unified Data Management (UDM)|1.2107.0, 1.2109.0, 1.2109.1 and 1.2112.0| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Unified Mediation Bus (UMB)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Unified OSS Console (UOC)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Unified Topology Manager (UTM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Universal Identity Repository (VIR)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Universal IoT (UioT) Platform|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Universal SLA Manager (uSLAM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Unstructured Data Storage Function (UDSF)|1.2108.0, 1.2110.0 and 1.2112.0| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|User Data Repository (UDR)|1.2106.0, 1.2110.0 and 1.2112.0| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Virtual Connect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Virtual Connect Enterprise Manager (VCEM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Virtual Headend Manager (vHM)|All| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| -|HPE|Virtual Provisioning Gateway (vPGW)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Virtual Server Environment (VSE)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| -|HPE|Virtual Subscriber Data Management (vSDM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|WebRTC Gateway Controller (WGW)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|Wi-Fi Authentication Gateway (WauG)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|"[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)"| -|HPE|XP Performance Advisor Software|7.5 through 8.4| |Vulnerable| | | |[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Trueview Inventory Software Series|8.6.x and 8.7.x| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|UAN (User Access Node)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Unified Correlation and Automation (UCA)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Unified Data Management (UDM)|1.2107.0, 1.2109.0, 1.2109.1 and 1.2112.0| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Unified Mediation Bus (UMB)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Unified OSS Console (UOC)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Unified Topology Manager (UTM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Universal Identity Repository (VIR)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Universal IoT (UioT) Platform|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Universal SLA Manager (uSLAM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Unstructured Data Storage Function (UDSF)|1.2108.0, 1.2110.0 and 1.2112.0| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|User Data Repository (UDR)|1.2106.0, 1.2110.0 and 1.2112.0| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Virtual Connect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Virtual Connect Enterprise Manager (VCEM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Virtual Headend Manager (vHM)|All| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| +|HPE|Virtual Provisioning Gateway (vPGW)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Virtual Server Environment (VSE)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_USdocId=a00120086en_us)| +|HPE|Virtual Subscriber Data Management (vSDM)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|WebRTC Gateway Controller (WGW)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|Wi-Fi Authentication Gateway (WauG)| |Not vuln|Not vuln|Not vuln|Not vuln|Support Communication Cross Reference ID: SIK7387|[(Revision) Apache Software Log4j - Security Vulnerability CVE-2021-44228](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us)| +|HPE|XP Performance Advisor Software|7.5 through 8.4| |Vulnerable| | ||[source](https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04215en_us)| |Huawei|All| | |Investigation| | |Customers have to contact the Huawei TAC|[source](https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en)| -|Hubspot|All| | | | | | |[Hubspot Notice](https://community.hubspot.com/t5/APIs-Integrations/Log4J-day-zero-exploit-CVE-2021-44228/td-p/541949)| +|Hubspot|All| | | | | ||[Hubspot Notice](https://community.hubspot.com/t5/APIs-Integrations/Log4J-day-zero-exploit-CVE-2021-44228/td-p/541949)| diff --git a/software/software_list_i.md b/software/software_list_i.md index 44e4a6e40..b021b7a1d 100644 --- a/software/software_list_i.md +++ b/software/software_list_i.md @@ -7,516 +7,516 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|I-Net software|All| | | | | | |[I-Net Software Statement](https://faq.inetsoftware.de/t/statement-about-cve-2021-44228-log4j-vulnerability-concerning-i-net-software-products/269/3)| -|I2P|All| | | | | | |[I2P Statement](https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228)| -|IBA-AG|All| | | | | | |[IBA-AG Statement](https://www.iba-ag.com/en/security)| -|Ibexa|All| | | | | | |[Ibexa Statement](https://developers.ibexa.co/security-advisories/cve-2021-44228-log4j-vulnerability)| -|IBM|A9000/R|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Accelerator Catalog|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|AIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|I-Net software|All| | | | | ||[I-Net Software Statement](https://faq.inetsoftware.de/t/statement-about-cve-2021-44228-log4j-vulnerability-concerning-i-net-software-products/269/3)| +|I2P|All| | | | | ||[I2P Statement](https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228)| +|IBA-AG|All| | | | | ||[IBA-AG Statement](https://www.iba-ag.com/en/security)| +|Ibexa|All| | | | | ||[Ibexa Statement](https://developers.ibexa.co/security-advisories/cve-2021-44228-log4j-vulnerability)| +|IBM|A9000/R|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Accelerator Catalog|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|AIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| |IBM|All| | |Investigation| | |IBM updates their advisories quite often. We will try to update accordingly. Please see their advisory|[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/)| -|IBM|Analytical Decision Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Analytics Engine Serverless|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|App Configuration|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|App Connect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Application Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Application Performance Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Application Runtime Expert for i|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Aspera Endpoint|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Aspera Enterprise (including all product components)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Aspera Enterprise on Demand|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Aspera fasp.io|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Aspera on Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|b-type Switches and Directors|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|B2B Advanced Communications|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Backup, Recovery and Media Services for i|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Bare Metal Servers|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Block Storage|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Block Storage for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Block Storage Snapshots for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Blockchain Platform|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Blockchain Platform for Cloud Private|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Blockchain Platform on IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Analytical Decision Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Analytics Engine Serverless|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|App Configuration|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|App Connect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Application Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Application Performance Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Application Runtime Expert for i|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Aspera Endpoint|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Aspera Enterprise (including all product components)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Aspera Enterprise on Demand|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Aspera fasp.io|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Aspera on Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|b-type Switches and Directors|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|B2B Advanced Communications|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Backup, Recovery and Media Services for i|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Bare Metal Servers|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Block Storage|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Block Storage for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Block Storage Snapshots for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Blockchain Platform|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Blockchain Platform for Cloud Private|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Blockchain Platform on IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| |IBM|Business Automation Workflow|18.0.0+|Not vuln|Fix| | |JR64456 / JR64096|[source](https://www.ibm.com/support/pages/node/6525834)| -|IBM|Business Process Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Business space|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|c-type Switches and Directors|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Call Center for Commerce|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|CareDiscovery Electronic Quality Measures|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|CareDiscovery Quality Measures|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|CareNotes|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Case Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Case Manager on Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Client VPN for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Activity Tracker|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud API Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Automation Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Backup|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Event Management on Cloud Private|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud foundry for IBM cloud Private|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Load Balancer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Object Storage|All|Not vuln|Fix| | |Fix: 3.16.0.53 and 3.16.2.57|"[source](https://www.ibm.com/support/pages/mitigation-and-software-update-cve-2021-44228-vulnerability?cm_sp=s033-_-OCSTXNRM-_-F&mync=F&mynp=OCSTXNRM&myns=s033)"| -|IBM|cloud Orchestrator|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Pak for Data (IBM DB2 Event Store for CP4D)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Pak for Multicloud Management Core|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Pak for Multicloud Management Infrastructure Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|cloud platform common services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Satellite|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cloud Virtual Server for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|COBOL for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|COBOL for Linux on X86|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|COBOL for Windows|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Code Engine|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cognos Analytics|11.2.1 Interim Fix 2, 11.1.7 Interim Fix 7, and 11.0.13 Interim Fix 4| |Fix|Fix| | | [source](https://www.ibm.com/support/pages/node/6528388) | -|IBM|Cognos Analytics Mobile / Cognos Analytics Mobile for Android and iOS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cognos Analytics Reports for Android|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cognos Analytics Reports for iOS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cognos Command Center|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cognos Integration Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Cognos Mobile for Blackberry Dynamics (mobile app)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Cognos Planning|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Communications Server for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Communications Server for Data Center Development|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Communications Server for Linux & CS for Linux on System z|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose Enterprise|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for Elasticsearch|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for etcd|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for MongoDB|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for MySQL|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for PostgreSQL|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for RabbitMQ|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for Redis|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for RethinkDB|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Compose for ScyllaDB|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Content Classification|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Content Collector for SAP Applications|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Content Delivery Network|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Content Integrator Enterprise Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Content Manager Enterprise Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Control Desk|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Copy Services Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Curam SPM|8.0.0, 7.0.11| |Vulnerable| | | |[source](https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-log4j-may-affect-cram-social-program-management-cve-2019-17571/)| -|IBM|Data Management Platform for EDB Postgres Enterprise|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Data Management Platform for EDB Postgres Enterprise for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Data Management Platform for EDB Postgres Standard for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Data Management Platform for MongoDB Enterprise Advnaced for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Data Server Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Database Add-Ins for Visual Studio|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Databases for DataStax|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Databases for EDB|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Databases for Elasticsearch|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Databases for etcd|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Databases for MongoDB|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Databases for PostgreSQL|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Databases for Redis|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Datapower Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|DataStax Enterprise with IBM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Datastax enterprise with IBM for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Administration Foundation for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Administration Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Administration Toolkit for z/OS SAP Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Administration Toolkit for z/OS the SAP Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Automation Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Automation Toolkit for z/OS SAP Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Bind Manager for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Change Accumulation Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Cloning Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|DB2 Connect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|DB2 Data Access Common Collector for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 DevOps Experience for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Event Store|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Db2 for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 High Performance Unload for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Log Analysis Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Merge Backup|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Db2 Mirror for i|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Object Comparison Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|DB2 Query Monitor for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Recovery Expert for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|DB2 Server|11.5| |Vulnerable| | | |[source](https://www.ibm.com/support/pages/node/6526462)| -|IBM|Db2 Sort for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 SQL Performance Analyzer for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Table Editor for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Table Editor for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Db2 Utilities Enhancement Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Decision Optimization Center|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Dedicated Host for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Direct Link Connect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Direct Link Connect on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Direct Link Dedicated (2.0)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Direct Link Dedicated Hosting on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Direct Link Dedicated on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Direct Link Exchange on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|DNS Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|EDB Postgres Advanced Server with IBM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|EDB PostgreSQL with IBM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Edge Application Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Emptoris Contract Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Emptoris Program Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Emptoris Services Procurement|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Emptoris Sourcing|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Emptoris Spend Analysis|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Emptoris Strategic Supply Management Platform|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Emptoris Supplier Lifecycle Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Enterprise Content Management System Monitor|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|enterprise records|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Enterprise Tape Controller Model C07 (3592) (ETC)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Event Notifications|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Event Streams|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|FHIR Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|File net IS HDS connectors|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|File net Print|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|File Storage|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Filenet Content Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|FileNet Image Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Financial Crimes Insight for Entity Research|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Financial Transaction Manager (FTM) for Z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Financial Transaction Manager for Corporate Payment Services for MP 2.1.1|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Financial Transaction Manager for Digital Payments for z/OS 3.2.1|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Financial Transaction Manager for Immediate Payments for Multiplatforms (Base)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Financial Transaction Manager for SWIFT Services for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Financial Transaction Manager for SWIFT Services for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Flash System 900 (& 840)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|FlashSystem 5000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|FlashSystem 7000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|FlashSystem 9000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|FlashSystem v9000|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Flexible Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Flow Logs for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Fluid Query|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Functions|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|GSKit|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Guardium S-TAP for Data Sets on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Guardium S-TAP for DB2 on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Guardium S-TAP for IMS on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|HATS (Host Access Transformation Services)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Health Insights Adhoc Report Writer (Previously known as Advantage Suite Adhoc Report Writer)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|HOD (Host On-Demand)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|HTTP Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Hyper Protect Crypto Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Access Client Solutions|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Access Family|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Access Family – Access for Web|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Advanced DBCS Printer Support|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Advanced Function Printing|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Advanced Job Scheduler|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i AFP DBCS Fonts|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i AFP Font Collection|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i AFP Fonts|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Business Graphics Utility|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i CICS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Communications Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Cryptographic Device Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Db2 Query Manager and SQL Development Kit|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Db2 UDB Extenders|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Developer Kit for Java|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|I Facsimile Support|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i HTTP Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i InfoPrint Designer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i InfoPrint Fonts|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i InfoPrint Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Integrated Domino Facsimile|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Job Scheduler|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Managed System Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Network Authentication Enablement|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Performance Tools|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Portable Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Query|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Rational Application Management Toolset|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Rational Development Studio|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Rational Open Access, RPG Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i System Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i System/38 Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i TCP/IP Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Transform Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i Universal Manageability Enablement|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i WebSphere Development Studio|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i XML Toolbox|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i2 Analyst’s Notebook|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i2 Base|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|i2 iBase|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|ICP4A-Business Automation Content Analyzer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|ILOG CP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|ILOG CPLEX Optimization Studio|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Informix 4GL|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|InfoSphere Classic Federation & Replication for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|InfoSphere Data Architect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|InfoSphere Identity Insight|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Installation Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Integrated Analytics System (Sailfish)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Integration Bus Healthcare Pack|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Integration Bus Retail Pack|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|ITCAM for Transactions – MQ DC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Kenexa LCMS Premier|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Kenexa LMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Key Lifecyle Manager for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Key Protect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Kubernetes Service|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Liberty for Java for IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Load Balancer for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Log Analysis & Cloud Activity Tracker|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Market Expert|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|MarketScan Treatment Pathways|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Mass Data Migration|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo APM – Asset Health Insights SaaS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo Archiving with InfoSphere Optim Data Growth Solution|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo Asset Performance Management On-Premises|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo EAM SaaS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo Enterprise Adapter Oracle|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo Enterprise Adapter SAP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo for Nuclear Power|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo for Oil and Gas|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo for Transportation|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo for Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo Health, Safety, and Environment Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo MRO Inventory Optimization|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo Spatial Asset Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Maximo Visual Inspection|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Merge Cardio|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Merge Hemo|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Message Hub|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Message Service Client (XMS) for C/C++|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Micromedex|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Mono2Micro|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|MQ|iFix 9.2-IBM-MQ-LinuxX64-LAIT39386|Not vuln|Fix| | | |[source](https://www.ibm.com/support/pages/node/6526274)| -|IBM|MQ – This is the PID Product name we sell|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|MQ Advanced for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|MQ Appliance|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|MQ for HPE NonStop v8.1|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|MQ for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|MQ on IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Netezza|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Netezza Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Business Process Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Business space|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|c-type Switches and Directors|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Call Center for Commerce|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|CareDiscovery Electronic Quality Measures|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|CareDiscovery Quality Measures|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|CareNotes|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Case Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Case Manager on Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Client VPN for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Activity Tracker|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud API Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Automation Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Backup|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Event Management on Cloud Private|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud foundry for IBM cloud Private|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Load Balancer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Object Storage|All|Not vuln|Fix| | |Fix: 3.16.0.53 and 3.16.2.57|[source](https://www.ibm.com/support/pages/mitigation-and-software-update-cve-2021-44228-vulnerability?cm_sp=s033-_-OCSTXNRM-_-F&mync=F&mynp=OCSTXNRM&myns=s033)| +|IBM|cloud Orchestrator|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Pak for Data (IBM DB2 Event Store for CP4D)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Pak for Multicloud Management Core|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Pak for Multicloud Management Infrastructure Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|cloud platform common services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Satellite|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cloud Virtual Server for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|COBOL for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|COBOL for Linux on X86|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|COBOL for Windows|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Code Engine|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cognos Analytics|11.2.1 Interim Fix 2, 11.1.7 Interim Fix 7, and 11.0.13 Interim Fix 4| |Fix|Fix| ||[source](https://www.ibm.com/support/pages/node/6528388)| +|IBM|Cognos Analytics Mobile / Cognos Analytics Mobile for Android and iOS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cognos Analytics Reports for Android|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cognos Analytics Reports for iOS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cognos Command Center|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cognos Integration Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Cognos Mobile for Blackberry Dynamics (mobile app)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Cognos Planning|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Communications Server for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Communications Server for Data Center Development|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Communications Server for Linux & CS for Linux on System z|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose Enterprise|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for Elasticsearch|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for etcd|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for MongoDB|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for MySQL|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for PostgreSQL|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for RabbitMQ|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for Redis|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for RethinkDB|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Compose for ScyllaDB|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Content Classification|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Content Collector for SAP Applications|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Content Delivery Network|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Content Integrator Enterprise Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Content Manager Enterprise Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Control Desk|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Copy Services Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Curam SPM|8.0.0, 7.0.11| |Vulnerable| | ||[source](https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-log4j-may-affect-cram-social-program-management-cve-2019-17571/)| +|IBM|Data Management Platform for EDB Postgres Enterprise|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Data Management Platform for EDB Postgres Enterprise for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Data Management Platform for EDB Postgres Standard for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Data Management Platform for MongoDB Enterprise Advnaced for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Data Server Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Database Add-Ins for Visual Studio|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Databases for DataStax|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Databases for EDB|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Databases for Elasticsearch|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Databases for etcd|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Databases for MongoDB|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Databases for PostgreSQL|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Databases for Redis|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Datapower Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|DataStax Enterprise with IBM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Datastax enterprise with IBM for IBM Cloud Pak for Data|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Administration Foundation for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Administration Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Administration Toolkit for z/OS SAP Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Administration Toolkit for z/OS the SAP Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Automation Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Automation Toolkit for z/OS SAP Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Bind Manager for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Change Accumulation Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Cloning Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|DB2 Connect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|DB2 Data Access Common Collector for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 DevOps Experience for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Event Store|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Db2 for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 High Performance Unload for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Log Analysis Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Merge Backup|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Db2 Mirror for i|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Object Comparison Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|DB2 Query Monitor for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Recovery Expert for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|DB2 Server|11.5| |Vulnerable| | ||[source](https://www.ibm.com/support/pages/node/6526462)| +|IBM|Db2 Sort for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 SQL Performance Analyzer for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Table Editor for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Table Editor for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Db2 Utilities Enhancement Tool for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Decision Optimization Center|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Dedicated Host for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Direct Link Connect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Direct Link Connect on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Direct Link Dedicated (2.0)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Direct Link Dedicated Hosting on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Direct Link Dedicated on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Direct Link Exchange on Classic|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|DNS Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|EDB Postgres Advanced Server with IBM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|EDB PostgreSQL with IBM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Edge Application Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Emptoris Contract Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Emptoris Program Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Emptoris Services Procurement|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Emptoris Sourcing|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Emptoris Spend Analysis|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Emptoris Strategic Supply Management Platform|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Emptoris Supplier Lifecycle Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Enterprise Content Management System Monitor|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|enterprise records|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Enterprise Tape Controller Model C07 (3592) (ETC)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Event Notifications|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Event Streams|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|FHIR Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|File net IS HDS connectors|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|File net Print|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|File Storage|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Filenet Content Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|FileNet Image Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Financial Crimes Insight for Entity Research|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Financial Transaction Manager (FTM) for Z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Financial Transaction Manager for Corporate Payment Services for MP 2.1.1|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Financial Transaction Manager for Digital Payments for z/OS 3.2.1|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Financial Transaction Manager for Immediate Payments for Multiplatforms (Base)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Financial Transaction Manager for SWIFT Services for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Financial Transaction Manager for SWIFT Services for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Flash System 900 (& 840)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|FlashSystem 5000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|FlashSystem 7000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|FlashSystem 9000 Series|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|FlashSystem v9000|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Flexible Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Flow Logs for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Fluid Query|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Functions|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|GSKit|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Guardium S-TAP for Data Sets on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Guardium S-TAP for DB2 on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Guardium S-TAP for IMS on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|HATS (Host Access Transformation Services)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Health Insights Adhoc Report Writer (Previously known as Advantage Suite Adhoc Report Writer)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|HOD (Host On-Demand)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|HTTP Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Hyper Protect Crypto Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Access Client Solutions|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Access Family|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Access Family – Access for Web|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Advanced DBCS Printer Support|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Advanced Function Printing|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Advanced Job Scheduler|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i AFP DBCS Fonts|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i AFP Font Collection|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i AFP Fonts|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Business Graphics Utility|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i CICS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Communications Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Cryptographic Device Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Db2 Query Manager and SQL Development Kit|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Db2 UDB Extenders|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Developer Kit for Java|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|I Facsimile Support|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i HTTP Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i InfoPrint Designer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i InfoPrint Fonts|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i InfoPrint Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Integrated Domino Facsimile|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Job Scheduler|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Managed System Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Network Authentication Enablement|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Performance Tools|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Portable Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Query|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Rational Application Management Toolset|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Rational Development Studio|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Rational Open Access, RPG Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i System Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i System/38 Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i TCP/IP Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Transform Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i Universal Manageability Enablement|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i WebSphere Development Studio|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i XML Toolbox|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i2 Analyst’s Notebook|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i2 Base|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|i2 iBase|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|ICP4A-Business Automation Content Analyzer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|ILOG CP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|ILOG CPLEX Optimization Studio|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Informix 4GL|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|InfoSphere Classic Federation & Replication for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|InfoSphere Data Architect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|InfoSphere Identity Insight|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Installation Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Integrated Analytics System (Sailfish)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Integration Bus Healthcare Pack|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Integration Bus Retail Pack|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|ITCAM for Transactions – MQ DC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Kenexa LCMS Premier|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Kenexa LMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Key Lifecyle Manager for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Key Protect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Kubernetes Service|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Liberty for Java for IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Load Balancer for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Log Analysis & Cloud Activity Tracker|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Market Expert|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|MarketScan Treatment Pathways|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Mass Data Migration|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo APM – Asset Health Insights SaaS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo Archiving with InfoSphere Optim Data Growth Solution|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo Asset Performance Management On-Premises|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo EAM SaaS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo Enterprise Adapter Oracle|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo Enterprise Adapter SAP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo for Nuclear Power|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo for Oil and Gas|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo for Transportation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo for Utilities|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo Health, Safety, and Environment Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo MRO Inventory Optimization|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo Spatial Asset Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Maximo Visual Inspection|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Merge Cardio|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Merge Hemo|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Message Hub|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Message Service Client (XMS) for C/C++|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Micromedex|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Mono2Micro|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|MQ|iFix 9.2-IBM-MQ-LinuxX64-LAIT39386|Not vuln|Fix| | ||[source](https://www.ibm.com/support/pages/node/6526274)| +|IBM|MQ – This is the PID Product name we sell|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|MQ Advanced for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|MQ Appliance|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|MQ for HPE NonStop v8.1|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|MQ for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|MQ on IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| |IBM|Netezza Analytics|All versions <= 3.3.9| |Vulnerable| | |Fix should be available from 14th Dec|[source](https://www.ibm.com/support/pages/node/6525816)| -|IBM|Netezza Analytics – NPS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza Analytics – NPS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| |IBM|Netezza Analytics for NPS|All versions <= 11.2.21| |Vulnerable| | |Fix should be available from 14th Dec|[source](https://www.ibm.com/support/pages/node/6525816)| -|IBM|Netezza Fluid Query|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Netezza for Cloud Pak for Data System|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Netezza SQL Extensions|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Netezza SQL Extensions – NPS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Netezza® Performance Server for Cloud Pak® for Data|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Now Factory Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Now Factory Sourceworks|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|OmniFind Text Search Server for DB2 for i|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|OPENBMC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Operational Decision Composer for Z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Operational Decision Manager on Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|OrbitalRX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Order Management Software|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Payments Director Transaction Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|PCOMM (Personal Communications)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|PL/1 for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Platform Process Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Platform RTM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza Fluid Query|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza for Cloud Pak for Data System|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza SQL Extensions|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza SQL Extensions – NPS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Netezza® Performance Server for Cloud Pak® for Data|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Now Factory Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Now Factory Sourceworks|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|OmniFind Text Search Server for DB2 for i|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|OPENBMC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Operational Decision Composer for Z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Operational Decision Manager on Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|OrbitalRX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Order Management Software|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Payments Director Transaction Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|PCOMM (Personal Communications)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|PL/1 for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Platform Process Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Platform RTM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| |IBM|Power Hardware Management Console|V10.1.1010.0,V9.2.950.0|Not vuln|Fix| | |Fix: MH01913,MF69263|[source](https://www.ibm.com/support/pages/node/6526172)| -|IBM|PowerHA System Mirror for i|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|PowerSC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|PowerVM Hypervisor|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|PowerVM VIOS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Prerequisite scanner|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Price Transparency|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Process Mining|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|PureData System for Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|QRadar Advisor|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|QRadar Incident Forensics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Qradar Network Threat Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|QRadar On Cloud (QRoC)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|QRadar SIEM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|QRadar Vulnerability Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|QRadar WinCollect Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Quantum Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Rational Business Developer (RBD)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Rational Developer for AIX and Linux|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Rational Developer for i|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Rational Integration Tester|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Rational Service Tester|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Rational Test Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Reactive Platform|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Red Hat OpenShift on IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Remote Execution and Access|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Robotic Process Automation|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Robotic Process Automation with Automation Every where|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Safer Payments|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|SAN Volume Controller and Storwize Family|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Schematics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|SDK for Node.js|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|SDK, Java Technology Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Secrets Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Secure Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Access Manager|10.0.2-ISS-ISVA-FP0000|Not vuln|Fix| | | |[source](https://www.ibm.com/support/pages/node/6526174)| -|IBM|Security Access Manager|9.0.7-ISS-ISAM-FP0002|Not vuln|Fix| | | |[source](https://www.ibm.com/support/pages/node/6526174)| -|IBM|Security Access Manager & Verify Access Integrations|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Directory Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Directory Suite|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Guardium STAPs (Windows, Linux & z/OS) and GIM clients|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Bridge|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Gateway for Linux PAM and AIX PAM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Gateway for Radius|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Gateway for Windows Login|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Privilege Account Lifecycle Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Privilege Behavior Analysis|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Privilege DevOps Vault|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Privilege Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Privilege Server Suite|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Privilege Vault|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Security Verify Privilege Vault Remote|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|SOA Policy Pattern for Red Hat Enterprise Linux Server 2.0|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Accelerate|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Archive Library Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Discover|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Client Management Service|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect for Databases: Data Protection for Oracle|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect for Databases: Data Protection for SQL|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect for Enterprise Resource Planning|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect for Mail: Data Protection for Domino|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect for Mail: Data Protection for Exchange|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect for Workstations|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect for z/OS USS Client and API|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect HSM for Windows|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Plus Db2 Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Plus Exchange Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Plus File Systems Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Plus MongoDB Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Plus O365 Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Plus Oracle Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Plus SQL Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Protect Snapshot for UNIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Spectrum Virtualize|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|PowerHA System Mirror for i|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|PowerSC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|PowerVM Hypervisor|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|PowerVM VIOS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Prerequisite scanner|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Price Transparency|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Process Mining|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|PureData System for Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|QRadar Advisor|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|QRadar Incident Forensics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Qradar Network Threat Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|QRadar On Cloud (QRoC)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|QRadar SIEM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|QRadar Vulnerability Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|QRadar WinCollect Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Quantum Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Rational Business Developer (RBD)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Rational Developer for AIX and Linux|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Rational Developer for i|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Rational Integration Tester|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Rational Service Tester|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Rational Test Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Reactive Platform|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Red Hat OpenShift on IBM Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Remote Execution and Access|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Robotic Process Automation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Robotic Process Automation with Automation Every where|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Safer Payments|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|SAN Volume Controller and Storwize Family|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Schematics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|SDK for Node.js|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|SDK, Java Technology Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Secrets Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Secure Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Access Manager|10.0.2-ISS-ISVA-FP0000|Not vuln|Fix| | ||[source](https://www.ibm.com/support/pages/node/6526174)| +|IBM|Security Access Manager|9.0.7-ISS-ISAM-FP0002|Not vuln|Fix| | ||[source](https://www.ibm.com/support/pages/node/6526174)| +|IBM|Security Access Manager & Verify Access Integrations|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Directory Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Directory Suite|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Guardium STAPs (Windows, Linux & z/OS) and GIM clients|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Bridge|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Gateway for Linux PAM and AIX PAM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Gateway for Radius|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Gateway for Windows Login|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Privilege Account Lifecycle Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Privilege Behavior Analysis|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Privilege DevOps Vault|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Privilege Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Privilege Server Suite|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Privilege Vault|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Security Verify Privilege Vault Remote|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|SOA Policy Pattern for Red Hat Enterprise Linux Server 2.0|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Accelerate|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Archive Library Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Discover|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Client Management Service|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect for Databases: Data Protection for Oracle|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect for Databases: Data Protection for SQL|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect for Enterprise Resource Planning|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect for Mail: Data Protection for Domino|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect for Mail: Data Protection for Exchange|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect for Workstations|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect for z/OS USS Client and API|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect HSM for Windows|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Plus Db2 Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Plus Exchange Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Plus File Systems Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Plus MongoDB Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Plus O365 Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Plus Oracle Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Plus SQL Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Protect Snapshot for UNIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Spectrum Virtualize|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| |IBM|SPSS Statistics|25.0, 26.0, 27.0.1, 28.0.1|Not vuln|Fix| | |Link is behind a login|[source](https://www.ibm.com/support/pages/node/6526182)| -|IBM|SQL Query|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Direct Browser User Interface|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Direct for HP NonStop|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Direct for i5/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Direct for OpenVMS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Direct for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Direct FTP+|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Enterprise for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Express for Microsoft Windows|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Express for UNIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Connect:Express for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Fulfillment Optimizer| | |Vulnerable| | | |[source](https://www.ibm.com/support/pages/node/6525544)| -|IBM|Sterling Gentran|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Inventory Visibility| | |Vulnerable| | | |[source](https://www.ibm.com/support/pages/node/6525544)| -|IBM|Sterling Order Management| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/support/pages/node/6525544)| -|IBM|Sterling Order Management (on-prem)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for ACORD|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for Financial Services|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for FIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for NACHA|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for PeopleSoft|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for SAP R/3|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for SEPA|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for Siebel|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Pack for SWIFT|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Packs for EDI|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Packs for Healthcare|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Sterling Transformation Extender Trading Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Storage TS1160|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Storage TS2280|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Storage TS2900 Library|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Storage TS3100-TS3200 Library|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Storage TS4500 Library|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Storage Virtualization Engine TS7700|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Surveillance Insight for Financial Services Solution on Cloud (stand-alone) / (also part of) IBM Financial Crimes Insight)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|System Dashboard for Enterprise Content Management|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|System Storage DS3950/DS5020/DS5100/DS5300 Refresh|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|System Storage Storwize V7000 Unified (V7000U)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tape System Library Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|TDMF for zOS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Composite Application Manager for Application Diagnostics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Composite Application Manager for Applications|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Composite Application Manager for J2EE|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Composite Application Manager for SOA|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Composite Application Manager for Transactions|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Composite Application Manager for WebSphere|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Directory Integrator|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Federated Identity Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Monitoring for Virtual Environments|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli Netcool Ominbus / (a product, and also a component of Netcool Operations Insight)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli OMEGAMON XE for DB2 Performance Expert on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli OMEGAMON XE for DB2 Performance Monitor on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli System Automation for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tivoli® Netcool/OMNIbus Knowledge Library|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tools Customizer for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Total Storage Service Console (TSSC) / TS4500 IMC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Transit Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Treatment Cost Calculator|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Tririga Anywhere|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Trusteer Mobile SDK|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Trusteer Pinpoint Assure|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Trusteer Pinpoint Detect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Trusteer Rapport|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|TS3310|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|TS3500|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|TS4300|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Unified Management Server for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Urbancode Deploy|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Virtual Private Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Virtual Server for Classic|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Virtualization Management Interface|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Visual Inspection Component|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|VM Manager Tool (part of License Metric Tool)|>9.2.21,<9.2.26| |Vulnerable| | | |[source](https://www.ibm.com/support/pages/node/6525762/)| -|IBM|Voice Agent with Watson|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Voice Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|VPN for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Watson Annotator for Clinical Data|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Watson IoT Platform – Message Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Watson Language Translator|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Weather Company Fusion|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| -|IBM|Weather Company Max Engage for Enterprise with Watson|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Weather Company Max Solution|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Weather Company Pilotbrief|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|SQL Query|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Direct Browser User Interface|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Direct for HP NonStop|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Direct for i5/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Direct for OpenVMS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Direct for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Direct FTP+|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Enterprise for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Express for Microsoft Windows|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Express for UNIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Connect:Express for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Fulfillment Optimizer| | |Vulnerable| | ||[source](https://www.ibm.com/support/pages/node/6525544)| +|IBM|Sterling Gentran|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Inventory Visibility| | |Vulnerable| | ||[source](https://www.ibm.com/support/pages/node/6525544)| +|IBM|Sterling Order Management| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/support/pages/node/6525544)| +|IBM|Sterling Order Management (on-prem)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for ACORD|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for Financial Services|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for FIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for NACHA|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for PeopleSoft|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for SAP R/3|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for SEPA|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for Siebel|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Pack for SWIFT|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Packs for EDI|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Packs for Healthcare|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Sterling Transformation Extender Trading Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Storage TS1160|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Storage TS2280|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Storage TS2900 Library|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Storage TS3100-TS3200 Library|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Storage TS4500 Library|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Storage Virtualization Engine TS7700|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Surveillance Insight for Financial Services Solution on Cloud (stand-alone) / (also part of) IBM Financial Crimes Insight)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|System Dashboard for Enterprise Content Management|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|System Storage DS3950/DS5020/DS5100/DS5300 Refresh|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|System Storage Storwize V7000 Unified (V7000U)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tape System Library Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|TDMF for zOS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Composite Application Manager for Application Diagnostics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Composite Application Manager for Applications|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Composite Application Manager for J2EE|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Composite Application Manager for SOA|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Composite Application Manager for Transactions|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Composite Application Manager for WebSphere|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Directory Integrator|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Federated Identity Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Monitoring for Virtual Environments|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli Netcool Ominbus / (a product, and also a component of Netcool Operations Insight)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli OMEGAMON XE for DB2 Performance Expert on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli OMEGAMON XE for DB2 Performance Monitor on z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli System Automation for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tivoli® Netcool/OMNIbus Knowledge Library|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tools Customizer for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Total Storage Service Console (TSSC) / TS4500 IMC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Transit Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Treatment Cost Calculator|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Tririga Anywhere|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Trusteer Mobile SDK|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Trusteer Pinpoint Assure|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Trusteer Pinpoint Detect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Trusteer Rapport|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|TS3310|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|TS3500|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|TS4300|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Unified Management Server for z/OS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Urbancode Deploy|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Virtual Private Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Virtual Server for Classic|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Virtualization Management Interface|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Visual Inspection Component|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|VM Manager Tool (part of License Metric Tool)|>9.2.21,<9.2.26| |Vulnerable| | ||[source](https://www.ibm.com/support/pages/node/6525762/)| +|IBM|Voice Agent with Watson|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Voice Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|VPN for VPC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Watson Annotator for Clinical Data|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Watson IoT Platform – Message Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Watson Language Translator|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Weather Company Fusion|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| +|IBM|Weather Company Max Engage for Enterprise with Watson|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Weather Company Max Solution|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Weather Company Pilotbrief|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products)| |IBM|Websphere|8.5| |Vulnerable| | |fix: PH42728|[source](https://www.ibm.com/support/pages/node/6525706/)| |IBM|Websphere|9.0| |Vulnerable| | |fix: PH42728|[source](https://www.ibm.com/support/pages/node/6525706/)| -|IBM|WebSphere Application Server Developer Tools for Eclipse|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Application Server for Cloud Private VM Quickstarter|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Application Server Hypervisor Edition|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Application Server Migration Toolkit|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere eXtreme Scale|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Liberty|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Message Broker Connectivity Pack for Healthcare|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Message Broker Extender for TIBCO RV|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Message Broker File Extender|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere Message Broker with Rules and Formatter Extension|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|WebSphere MQ for HP NonStop v5.3.1|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Workload Automation|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Workload Deployer Image for x86 Systems|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Workload Scheduler|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|Workstation APL2 for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|XIV Management Tools|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|XIV Storage System|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|XL C/C++ for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|XL C/C++ for Linux|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|XL Fortran for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|IBM|XL Fortran for Linux|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| -|ICONICS|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[ICONICS Advisory Link](https://iconics.com/News/Press-Releases/2021/ICONICS-Not-Subject-to-Apache-Log4j-Vulnerability)| -|IFS|All| | | | | | |[IFS Bulletin](https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436)| -|IGEL|Universal Management Suite| |Not vuln|Workaround| | | |[source](https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html)| -|Ignite Realtime|All| | | | | | |[Ignite Realtime Statement](https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108)| -|iGrafix|All|Latest|Not vuln|Fix| | | |[source](https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/)| -|iGrafx|All| | | | | | |[iGrafx Statement](https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/)| -|Illuminated Cloud|All| | | | | | |[Illuminated Cloud Statement](https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html)| -|Illumio|C-VEN| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|CLI| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|CloudSecure| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|Core on-premise PCE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|Core SaaS PCE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|Edge SaaS PCE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|Edge-CrowdStrike| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|Flowlink| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|Kubelink| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|NEN| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|QRadar App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|Splunk App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| -|Illumio|VEN| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|IBM|WebSphere Application Server Developer Tools for Eclipse|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Application Server for Cloud Private VM Quickstarter|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Application Server Hypervisor Edition|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Application Server Migration Toolkit|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere eXtreme Scale|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Liberty|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Message Broker Connectivity Pack for Healthcare|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Message Broker Extender for TIBCO RV|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Message Broker File Extender|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere Message Broker with Rules and Formatter Extension|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|WebSphere MQ for HP NonStop v5.3.1|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Workload Automation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Workload Deployer Image for x86 Systems|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Workload Scheduler|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|Workstation APL2 for Multiplatforms|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|XIV Management Tools|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|XIV Storage System|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|XL C/C++ for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|XL C/C++ for Linux|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|XL Fortran for AIX|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|IBM|XL Fortran for Linux|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#:~:text=the%20Log4j%20vulnerability.-,Products%20not%20Impacted,-IBM%E2%80%99s%20initial%20analysis)| +|ICONICS|All| |Not vuln|Not vuln|Not vuln|Not vuln||[ICONICS Advisory Link](https://iconics.com/News/Press-Releases/2021/ICONICS-Not-Subject-to-Apache-Log4j-Vulnerability)| +|IFS|All| | | | | ||[IFS Bulletin](https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436)| +|IGEL|Universal Management Suite| |Not vuln|Workaround| | ||[source](https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html)| +|Ignite Realtime|All| | | | | ||[Ignite Realtime Statement](https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108)| +|iGrafix|All|Latest|Not vuln|Fix| | ||[source](https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/)| +|iGrafx|All| | | | | ||[iGrafx Statement](https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/)| +|Illuminated Cloud|All| | | | | ||[Illuminated Cloud Statement](https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html)| +|Illumio|C-VEN| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|CLI| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|CloudSecure| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|Core on-premise PCE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|Core SaaS PCE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|Edge SaaS PCE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|Edge-CrowdStrike| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|Flowlink| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|Kubelink| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|NEN| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|QRadar App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|Splunk App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| +|Illumio|VEN| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html)| |iManage|Preview Server|10.0 or later| |Workaround| | |Link is behind a login|[source](https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2)| |iManage|Records Manager|10.3.x and later| |Workaround| | |Link is behind a login|[source](https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2)| |iManage|Security Policy Manager|10.1.x and 10.2.x| |Workaround| | |Link is behind a login|[source](https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2)| |iManage|Work Indexer powered by IDOL|10.3.0.26 and later| |Workaround| | |Link is behind a login|[source](https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2)| |iManage|Work Indexer powered by RAVN|10.2.3 - 10.2.6, 10.3.x| |Workaround| | |Link is behind a login|[source](https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2)| -|Imperva|All| | | | | | |[Imperva Statement](https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/)| +|Imperva|All| | | | | ||[Imperva Statement](https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/)| |Imprivata|ConfirmID| | |Not vuln| | |Link is behind a login|[source](https://support.imprivata.com/NewCommunityArticleView?url=ka52M000000AZkgQAG)| |Imprivata|Cortext| | |Not vuln| | |Link is behind a login|[source](https://support.imprivata.com/NewCommunityArticleView?url=ka52M000000AZkgQAG)| |Imprivata|GroundControl| | |Not vuln| | |Link is behind a login|[source](https://support.imprivata.com/NewCommunityArticleView?url=ka52M000000AZkgQAG)| @@ -525,75 +525,75 @@ |Imprivata|OneSign| | |Not vuln| | |Link is behind a login|[source](https://support.imprivata.com/NewCommunityArticleView?url=ka52M000000AZkgQAG)| |Imprivata|PAM| |Not vuln|Fix| | |Link is behind a login|[source](https://support.imprivata.com/NewCommunityArticleView?urlName=IPAM-Log4j-CVE-2021-44228-vulnerability-mitigation)| |Imprivata|PatientSecure| | |Not vuln| | |Link is behind a login|[source](https://support.imprivata.com/NewCommunityArticleView?url=ka52M000000AZkgQAG)| -|Inductive Automation|Ignition|All| |Not vuln| | | |[source](https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day)| -|IndustrialDefender|All| | | | | | |[IndustrialDefender Statement](https://www.industrialdefender.com/cve-2021-44228-log4j/)| -|infinidat|All| | | | | | |[infinidat Statement](https://support.infinidat.com/hc/en-us/articles/4413483145489-INFINIDAT-Support-Announcement-2021-010-Log4Shell-CVE-2021-44228)| -|Influxdata|All|All| |Not vuln| | | |[source](https://www.influxdata.com/blog/apache-log4j-vulnerability-cve-2021-44228/)| -|Infoblox|All|All| |Not vuln| | | |[source](https://blogs.infoblox.com/security/infoblox-response-to-apache-log4j-vulnerability/)| -|Infoland|iQualify| | |Not vuln| | | |[source](https://community.infoland.nl/infoland-nieuws-128/geen-beveiligingslek-apache-log4j2-zenya-iprova-en-iqualify-3589)| -|Infoland|Zenya (iProva)| | |Not vuln| | | |[source](https://community.infoland.nl/infoland-nieuws-128/geen-beveiligingslek-apache-log4j2-zenya-iprova-en-iqualify-3589)| -|Infor|Private Cloud Tenant (IBM Websphere)|Dependent on Infor configuration| |Vulnerable| | |No official statement from Vendor. See screenshot.|[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/InforLog4Shell.png)| -|Infor|Rich Desktop Client| | |Vulnerable| | |No official statement from Vendor. See screenshot|[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/InforLog4Shell.png)| -|Informatica|Axon|7.2.x|Not vuln|Workaround| | | |[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| -|Informatica|Data Privacy Management|10.5, 10.5.1|Not vuln|Workaround| | | |[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| -|Informatica|Information Deployment Manager| |Not vuln|Fix| | | |[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| -|Informatica|Metadata Manager|10.4, 10.4.1, 10.5, 10.5.1|Not vuln|Workaround| | | |[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| -|Informatica|PowerCenter|10.5.1|Not vuln|Workaround| | | |[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| -|Informatica|PowerExchange for CDC (Publisher) and Mainframe|10.5.1|Not vuln|Workaround| | | |[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| -|Informatica|Product 360|All|Not vuln|Workaround| | | |[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| +|Inductive Automation|Ignition|All| |Not vuln| | ||[source](https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day)| +|IndustrialDefender|All| | | | | ||[IndustrialDefender Statement](https://www.industrialdefender.com/cve-2021-44228-log4j/)| +|infinidat|All| | | | | ||[infinidat Statement](https://support.infinidat.com/hc/en-us/articles/4413483145489-INFINIDAT-Support-Announcement-2021-010-Log4Shell-CVE-2021-44228)| +|Influxdata|All|All| |Not vuln| | ||[source](https://www.influxdata.com/blog/apache-log4j-vulnerability-cve-2021-44228/)| +|Infoblox|All|All| |Not vuln| | ||[source](https://blogs.infoblox.com/security/infoblox-response-to-apache-log4j-vulnerability/)| +|Infoland|iQualify| | |Not vuln| | ||[source](https://community.infoland.nl/infoland-nieuws-128/geen-beveiligingslek-apache-log4j2-zenya-iprova-en-iqualify-3589)| +|Infoland|Zenya (iProva)| | |Not vuln| | ||[source](https://community.infoland.nl/infoland-nieuws-128/geen-beveiligingslek-apache-log4j2-zenya-iprova-en-iqualify-3589)| +|Infor|Private Cloud Tenant (IBM Websphere)|Dependent on Infor configuration| |Vulnerable| | |No official statement from Vendor. See screenshot.|[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/InforLog4Shell.png)| +|Infor|Rich Desktop Client| | |Vulnerable| | |No official statement from Vendor. See screenshot|[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/InforLog4Shell.png)| +|Informatica|Axon|7.2.x|Not vuln|Workaround| | ||[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| +|Informatica|Data Privacy Management|10.5, 10.5.1|Not vuln|Workaround| | ||[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| +|Informatica|Information Deployment Manager| |Not vuln|Fix| | ||[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| +|Informatica|Metadata Manager|10.4, 10.4.1, 10.5, 10.5.1|Not vuln|Workaround| | ||[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| +|Informatica|PowerCenter|10.5.1|Not vuln|Workaround| | ||[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| +|Informatica|PowerExchange for CDC (Publisher) and Mainframe|10.5.1|Not vuln|Workaround| | ||[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| +|Informatica|Product 360|All|Not vuln|Workaround| | ||[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-Updates-for-Informatica-On-premises-Products)| |Informatica|Secure Agents (Cloud hosted)| |Not vuln|Fix| | |Fixed agents may need to be restarted|[source](https://knowledge.informatica.com/s/article/Apache-Zero-Day-log4j-RCE-Vulnerability-updates-for-Informatica-Cloud-and-Cloud-Hosted-Software)| -|INIT GmbH|AppComm| | |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| -|INIT GmbH|Mobile Plan|4.22.x and 5.x| |Vulnerable| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| -|INIT GmbH|MOBILE-PERDIS| | |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| -|INIT GmbH|WebComm| | |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| -|Instana|All| | | | | | |[Instana Statement](https://status.instana.io/incidents/4zgcd2gzf4jw)| -|Instructure|All| | | | | | |[Instructure Statement](https://community.canvaslms.com/t5/Community-Users/Instructure-amp-the-Apache-Log4j2-Vulnerability/ba-p/501907)| -|Intel|Audio Development Kit| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|Computer Vision Annotation Tool| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|Computer Vision Annotation Tool maintained by Intel| | |Vulnerable| | | |[Intel Advisory](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|Dataleft Manager| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|Genomics Kernel Library| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|oneAPI sample browser plugin for Eclipse| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|Secure Device Onboard| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|Sensor Solution Firmware Development Kit| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|System Debugger| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| -|Intel|System Studio| | |Vulnerable| | | |[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|INIT GmbH|AppComm| | |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| +|INIT GmbH|Mobile Plan|4.22.x and 5.x| |Vulnerable| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| +|INIT GmbH|MOBILE-PERDIS| | |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| +|INIT GmbH|WebComm| | |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/INIT-GmbH.png) [source](https://archive.newsletter2go.com/?n2g=wq37zux3-w7nrbmnl-19ru)| +|Instana|All| | | | | ||[Instana Statement](https://status.instana.io/incidents/4zgcd2gzf4jw)| +|Instructure|All| | | | | ||[Instructure Statement](https://community.canvaslms.com/t5/Community-Users/Instructure-amp-the-Apache-Log4j2-Vulnerability/ba-p/501907)| +|Intel|Audio Development Kit| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|Computer Vision Annotation Tool| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|Computer Vision Annotation Tool maintained by Intel| | |Vulnerable| | ||[Intel Advisory](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|Dataleft Manager| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|Genomics Kernel Library| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|oneAPI sample browser plugin for Eclipse| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|Secure Device Onboard| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|Sensor Solution Firmware Development Kit| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|System Debugger| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| +|Intel|System Studio| | |Vulnerable| | ||[source](https://www.intel.com/content/www/us/en/security-left/advisory/intel-sa-00646.html)| |Internet Systems Consortium(ISC)|BIND 9|All|Not vuln|Not vuln|Not vuln|Not vuln|no JAVA Code|[ISC Open Source and Log4J](https://www.isc.org/blogs/2021-log4j/)| |Internet Systems Consortium(ISC)|ISC DHCP, aka dhcpd|All|Not vuln|Not vuln|Not vuln|Not vuln|no JAVA Code|[ISC Open Source and Log4J](https://www.isc.org/blogs/2021-log4j/)| |Internet Systems Consortium(ISC)|Kea DHCP|All|Not vuln|Not vuln|Not vuln|Not vuln|no JAVA Code|[ISC Open Source and Log4J](https://www.isc.org/blogs/2021-log4j/)| -|InterSystems|API Manager| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|Atelier Integration| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|Cache| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|Cloud Manager| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|Ensemble| | |Investigation| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|FHIR Accelerator| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|Health Integration as a Service| | |Investigation| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Care Community| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Clinical Viewer|2019.2 to 2021.1| |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Health Connect| | |Investigation| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Health Insight| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Message Transformation Service| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Patient Index| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Personal Community| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Provider Directory| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|HealthShare Unified Care Record| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|IRIS| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|IRIS for Health| | |Investigation| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|ISC Reports| | |Vulnerable| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|TrakCare Core| | |Vulnerable| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|TrakCare Editions| | |Investigation| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|TrakCare Lab| | |Investigation| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|InterSystems|VS Code Integration| | |Not vuln| | | |[source](https://www.intersystems.com/gt/apache-log4j2/)| -|Intland|codebeamer|<= 20.11-SP11, <= 21.09-SP3| |Vulnerable| | |"A fix has been released for 20.11 and 21.09, but not yet for 21.04"|[Apache Log4j vulnerability and fixes](https://codebeamer.com/cb/wiki/19872365)| -|IPRO|Netgovern| | | | | | || -|iRedMail|All| | | | | | |[iRedMail Statement](https://forum.iredmail.org/topic18605-log4j-cve202144228.html)| -|IronNet|All|All verisons| |Investigation| | | |[source](https://www.ironnet.com/blog/ironnet-security-notifications-related-to-log4j-vulnerability)| -|ISL Online|All|All| |Not vuln| | | |[source](https://blog.islonline.com/2021/12/13/isl-online-is-not-affected-by-log4shell-vulnerability/)| -|ISLONLINE|All| | | | | | |[ISLONLINE Statement](https://blog.islonline.com/2021/12/13/isl-online-is-not-affected-by-log4shell-vulnerability/)| -|ISPNext|All|All| |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/ISPNext.png)| +|InterSystems|API Manager| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|Atelier Integration| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|Cache| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|Cloud Manager| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|Ensemble| | |Investigation| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|FHIR Accelerator| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|Health Integration as a Service| | |Investigation| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Care Community| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Clinical Viewer|2019.2 to 2021.1| |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Health Connect| | |Investigation| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Health Insight| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Message Transformation Service| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Patient Index| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Personal Community| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Provider Directory| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|HealthShare Unified Care Record| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|IRIS| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|IRIS for Health| | |Investigation| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|ISC Reports| | |Vulnerable| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|TrakCare Core| | |Vulnerable| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|TrakCare Editions| | |Investigation| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|TrakCare Lab| | |Investigation| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|InterSystems|VS Code Integration| | |Not vuln| | ||[source](https://www.intersystems.com/gt/apache-log4j2/)| +|Intland|codebeamer|<= 20.11-SP11, <= 21.09-SP3| |Vulnerable| | |A fix has been released for https://codebeamer.com/cb/wiki/13134438 20.11 and https://codebeamer.com/cb/wiki/19418497 21.09, but not yet for https://codebeamer.com/cb/wiki/16937839 21.04|[Apache Log4j vulnerability and fixes](https://codebeamer.com/cb/wiki/19872365)| +|IPRO|Netgovern| | | | | ||| +|iRedMail|All| | | | | ||[iRedMail Statement](https://forum.iredmail.org/topic18605-log4j-cve202144228.html)| +|IronNet|All|All verisons| |Investigation| | ||[source](https://www.ironnet.com/blog/ironnet-security-notifications-related-to-log4j-vulnerability)| +|ISL Online|All|All| |Not vuln| | ||[source](https://blog.islonline.com/2021/12/13/isl-online-is-not-affected-by-log4shell-vulnerability/)| +|ISLONLINE|All| | | | | ||[ISLONLINE Statement](https://blog.islonline.com/2021/12/13/isl-online-is-not-affected-by-log4shell-vulnerability/)| +|ISPNext|All|All| |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/ISPNext.png)| |Ivanti|Avalache|6.3.[0-3]|Not vuln|Fix| | |Information behind login|[source](https://forums.ivanti.com/s/article/CVE-2021-44228-Avalanche-Remote-code-injection-Log4j)| |Ivanti|Core Connector|All|Not vuln|Workaround| | |Information behind login|[source](https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j)| |Ivanti|File Director|All|Not vuln|Workaround| | |Information behind login|[source](https://forums.ivanti.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-and-Ivanti-File-Director-CVE-2021-44228)| |Ivanti|MobileIron Core|All|Not vuln|Workaround| | |Information behind login|[source](https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j)| |Ivanti|MobileIron Sentry|9.13, 9.14|Not vuln|Workaround| | |Information behind login|[source](https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j)| -|Ivanti|Xtraction|2019.2|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US)| +|Ivanti|Xtraction|2019.2|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US)| diff --git a/software/software_list_j.md b/software/software_list_j.md index ebeb474ee..199ecf55a 100644 --- a/software/software_list_j.md +++ b/software/software_list_j.md @@ -7,140 +7,141 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|Jamasoftware|All| | | | | | |"[Jamasoftware Statement](https://community.jamasoftware.com/communities/community-home/digestviewer/viewthread?MessageKey=06d26f9c-2abe-4c10-93d4-c0f6c8a01b22&CommunityKey=c9d20d4c-5bb6-4f19-92eb-e7cee0942d51&tab=digestviewer#bm06d26f9c-2abe-4c10-93d4-c0f6c8a01b22)"| -|Jamf|Pro|10.31.0 – 10.34.0|Not vuln|Fix| | | |[Mitigating the Apache Log4j 2 Vulnerability](https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html)| -|Jamf Nation|Health Care Listener| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Cloud| |Not vuln|Fix| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Connect| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Data Policy| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Infrastructure Manager| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Now| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Private Access| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Pro (hosted on-prem)|10.34.1| |Fix| | |"<10.14 vulnerable, 10.14-10.34 patch, >= 10.34.1 fix"|[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Protect| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf School| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jamf Nation|Jamf Threat Defense| | |Not vuln| | | |[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| -|Jaspersoft|All| | | | | | |[Jaspersoft Statement](https://community.jaspersoft.com/wiki/apache-log4j-vulnerability-update-jaspersoft-products)| -|Java Melody|All|1.90.0| |Fix|Fix| | |[source](https://github.com/javamelody/javamelody/wiki/ReleaseNotes)| +|Janitza|GridVis| | |Not vuln| | ||[link](https://www.janitza.com/us/gridvis-download.html)| +|Jamasoftware|All| | | | | ||[Jamasoftware Statement](https://community.jamasoftware.com/communities/community-home/digestviewer/viewthread?MessageKey=06d26f9c-2abe-4c10-93d4-c0f6c8a01b22&CommunityKey=c9d20d4c-5bb6-4f19-92eb-e7cee0942d51&tab=digestviewer#bm06d26f9c-2abe-4c10-93d4-c0f6c8a01b22)| +|Jamf|Pro|10.31.0 – 10.34.0|Not vuln|Fix| | ||[Mitigating the Apache Log4j 2 Vulnerability](https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html)| +|Jamf Nation|Health Care Listener| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Cloud| |Not vuln|Fix| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Connect| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Data Policy| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Infrastructure Manager| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Now| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Private Access| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Pro (hosted on-prem)|10.34.1| |Fix| | |<10.14 vulnerable, 10.14-10.34 patch, >= 10.34.1 fix|[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Protect| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf School| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jamf Nation|Jamf Threat Defense| | |Not vuln| | ||[source](https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740)| +|Jaspersoft|All| | | | | ||[Jaspersoft Statement](https://community.jaspersoft.com/wiki/apache-log4j-vulnerability-update-jaspersoft-products)| +|Java Melody|All|1.90.0| |Fix|Fix| ||[source](https://github.com/javamelody/javamelody/wiki/ReleaseNotes)| |Jazz/IBM|JazzSM DASH| | |Workaround| | |DASH on WebSphere Application Server requires mitigations|[source](https://www.ibm.com/support/pages/node/6525552)| -|Jedox|All| | | | | | |[Jedox Statement](https://www.jedox.com/en/trust/)| -|Jenkins|CI| | |Not vuln| | |Invidivual plugins not developed as part of Jenkins core may be vulnerable.|[source](https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/)| -|Jenkins|CI/CD Core| |Not vuln|Not vuln|Not vuln|Not vuln| || -|Jenkins|Plugins| | | | | |"Instructions to test your installations in announcement"|[Announcement](https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/) [issue tracker](https://issues.jenkins.io/browse/JENKINS-67353)| -|JetBrains|All .NET tools (ReSharper, Rider, ReSharper C++, dotTrace, dotMemory, dotCover, dotPeek)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Code With Me| |Not vuln|Fix| | | |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Datalore| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Floating license server|30241|Not vuln|Fix| | |"update to log4j 2.16"|[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Hub|2021.1.14080|Not vuln|Fix| | | |[source](https://blog.jetbrains.com/hub/2021/12/14/hub-update-regarding-log4j2-vulnerability/)| -|JetBrains|IntelliJ platform based IDEs (AppCode, CLion, DataGrip, DataSpell, GoLand, IntelliJ IDEA Ultimate/Community/Edu, PhpStorm, PyCharm Professional/Community/Edu, Rider, RubyMine, WebStorm)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Kotlin| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Ktor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|MPS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|Space| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|TeamCity| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://youtrack.jetbrains.com/issue/TW-74298)| -|JetBrains|ToolBox| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|UpSource|2020.1.1952|Not vuln|Fix| | | |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|YouTrack InCloud| |Not vuln|Fix| | | |[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| -|JetBrains|YouTrack Standalone|2021.4.35970|Not vuln|Fix| | | |[source](https://blog.jetbrains.com/youtrack/2021/12/youtrack-update-regarding-log4j2-vulnerability/)| -|JFrog|All| | |Not vuln| | | |[source](https://twitter.com/jfrog/status/1469385793823199240)| -|JGraph|DrawIO|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/jgraph/drawio/issues/2490)| -|Jitsi|jitsi-videobridge|v2.1-595-g3637fda42|Not vuln|Fix| | | |[source](https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md)| -|Jitterbit|All| | | | | | |[Jitterbit Statement](https://success.jitterbit.com/display/DOC/Mitigating+the+Apache+Log4j2+JNDI+Vulnerability)| +|Jedox|All| | | | | ||[Jedox Statement](https://www.jedox.com/en/trust/)| +|Jenkins|CI| | |Not vuln| | |Invidivual plugins not developed as part of Jenkins core may be vulnerable.|[source](https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/)| +|Jenkins|CI/CD Core| |Not vuln|Not vuln|Not vuln|Not vuln||| +|Jenkins|Plugins| | | | | |https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/ Instructions to test your installations in announcement|[Announcement](https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/) [issue tracker](https://issues.jenkins.io/browse/JENKINS-67353)| +|JetBrains|All .NET tools (ReSharper, Rider, ReSharper C++, dotTrace, dotMemory, dotCover, dotPeek)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Code With Me| |Not vuln|Fix| | ||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Datalore| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Floating license server|30241|Not vuln|Fix| | |update to https://www.jetbrains.com/help/license_server/release_notes.html#30241 log4j 2.16|[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Hub|2021.1.14080|Not vuln|Fix| | ||[source](https://blog.jetbrains.com/hub/2021/12/14/hub-update-regarding-log4j2-vulnerability/)| +|JetBrains|IntelliJ platform based IDEs (AppCode, CLion, DataGrip, DataSpell, GoLand, IntelliJ IDEA Ultimate/Community/Edu, PhpStorm, PyCharm Professional/Community/Edu, Rider, RubyMine, WebStorm)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Kotlin| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Ktor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|MPS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|Space| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|TeamCity| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://youtrack.jetbrains.com/issue/TW-74298)| +|JetBrains|ToolBox| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|UpSource|2020.1.1952|Not vuln|Fix| | ||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|YouTrack InCloud| |Not vuln|Fix| | ||[source](https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/)| +|JetBrains|YouTrack Standalone|2021.4.35970|Not vuln|Fix| | ||[source](https://blog.jetbrains.com/youtrack/2021/12/youtrack-update-regarding-log4j2-vulnerability/)| +|JFrog|All| | |Not vuln| | ||[source](https://twitter.com/jfrog/status/1469385793823199240)| +|JGraph|DrawIO|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/jgraph/drawio/issues/2490)| +|Jitsi|jitsi-videobridge|v2.1-595-g3637fda42|Not vuln|Fix| | ||[source](https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md)| +|Jitterbit|All| | | | | ||[Jitterbit Statement](https://success.jitterbit.com/display/DOC/Mitigating+the+Apache+Log4j2+JNDI+Vulnerability)| |Johnson Controls|Athena|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|BCPro|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|C•CURE Client|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|C•CURE Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|C•CURE Web|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|C•CURE‐9000|2.90.x, 2.80.x, 2.70.x and 2.60.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|CEM AC2000|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|CEM Hardware Products|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|CK721‐A (P2000)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|CloudVue Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|CloudVue Web|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|BCPro|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|C•CURE Client|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|C•CURE Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|C•CURE Web|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|C•CURE‐9000|2.90.x, 2.80.x, 2.70.x and 2.60.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|CEM AC2000|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|CEM Hardware Products|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|CK721‐A (P2000)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|CloudVue Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|CloudVue Web|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|Connect24|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Connected Equipment Gateway (CEG)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Connected Equipment Gateway (CEG)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|DataSource|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|DLS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Entrapass|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Johnson Controls Advisory Link](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|exacqVision Client|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|exacqVision Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|exacqVision WebService|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Facility Explorer|14.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Illustra Cameras|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Illustra Insight|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|iSTAR|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Kantech Entrapass|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Metasys Products and Tools|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Active Responder|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Bridge|All|Not vuln|Fix| | | |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Chiller Utility Plant Optimizer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Connected Chiller|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Enterprise Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Location Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Risk Insight|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Twin|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|OpenBlue Workplace|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|P2000|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|PowerSeries NEO|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|PowerSeries Pro|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Qolsys IQ Panels|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|DLS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Entrapass|All|Not vuln|Not vuln|Not vuln|Not vuln||[Johnson Controls Advisory Link](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|exacqVision Client|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|exacqVision Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|exacqVision WebService|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Facility Explorer|14.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Illustra Cameras|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Illustra Insight|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|iSTAR|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Kantech Entrapass|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Metasys Products and Tools|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Active Responder|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Bridge|All|Not vuln|Fix| | ||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Chiller Utility Plant Optimizer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Connected Chiller|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Enterprise Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Location Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Risk Insight|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Twin|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|OpenBlue Workplace|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|P2000|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|PowerSeries NEO|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|PowerSeries Pro|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Qolsys IQ Panels|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|RFID Overhead360° Backend|All|Not vuln|Fix| | |Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|S321‐IP (P2000)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|S321‐IP (P2000)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|Shoppertrak Analytics (STaN) ‐ Traffic|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|Shoppertrak Market Intelligence|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|Shoppertrak Perimeter Apps|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|Shoppertrak Shopper Journey|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|Shoppertrak Video Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Sur‐Gard Receivers|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Sur‐Gard Receivers|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|TrueVue Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|Tyco AI|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|victor|5.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|victor/ C•CURE‐9000 Unified|3.81.x / victor 5.4.1 / C•CURE‐9000 2.80 and 3.91.x / victor 5.6.1 / C•CURE‐9000 2.90|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Johnson Controls|VideoEdge|5.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|Tyco AI|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|victor|5.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|victor/ C•CURE‐9000 Unified|3.81.x / victor 5.4.1 / C•CURE‐9000 2.80 and 3.91.x / victor 5.6.1 / C•CURE‐9000 2.90|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| +|Johnson Controls|VideoEdge|5.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| |Johnson Controls|Xaap|All|Not vuln|Not vuln|Not vuln|Not vuln|Cloud product|[source](https://www.johnsoncontrols.com/cyber-solutions/security-advisories)| -|Journyx|All| | | | | | |[Journeyx Statement](https://community.journyx.com/support/solutions/articles/9000209044-apache-log4j-2-vulnerability-cve-2021-44228-)| -|jPOS|(ISO-8583) bridge| | |Not vuln| | | |[source](https://github.com/jpos/jPOS/commit/d615199a1bdd35c35d63c07c10fd0bdbbc96f625)| -|Jump Desktop|All| | | | | | |[Jump Desktop Statement](https://support.jumpdesktop.com/hc/en-us/articles/4416720395021-Log4j-CVE-2021-44228-CVE-2021-45046-Statement)| -|Juniper Networks|Advanced Threat Prevention (JATP)| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|AppFormix| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Apstra System| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Connectivity Services Director| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Contrail products: Contrail Analytics, Contrail Cloud, Contrail Networking or Contrail Service Orchestration| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Cross Provisioning Platform| | |Investigation| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|CTPOS and CTPView| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|ICEAAA Manager| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|JATP Cloud| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|JSA Series| | |Investigation| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Juniper Identity Management Services (JIMS)| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Juniper Mist Edge| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Juniper Sky Enterprise| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Junos OS| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Junos OS Evolved| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Junos Space Network Management Platform| | |Vulnerable| | |Only when OpenNMS has been enabled.|"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Mist Access Points|Any version on AP12, AP21, AP32, AP33, AP34, AP41, AP43, AP45, AP61, AP63.| |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|MIST: Juniper Networks Marvis Virtual Network Assistant (VNA)| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|MIST: Juniper Networks Mist AI| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|MIST: Juniper Networks Paragon Active Assurance| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|MIST: Juniper Networks WAN Assurance| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|MIST: Juniper Networks Wi-Fi Assurance| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|MIST: Juniper Networks Wired Assurance| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Network Director| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Northstar Controller| | |Vulnerable| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Northstar Planner| | |Investigation| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Paragon Insights|">= 21 version 21.1 ; >= 22 version 22.2"| |Vulnerable| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Paragon Pathfinder|">= 21 version 21.1 ; >= 22 version 22.2"| |Vulnerable| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Paragon Planner|">= 21 version 21.1 ; >= 22 version 22.2"| |Vulnerable| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Policy Enforcer| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|products using Wind River Linux in Junos OS and Junos OS Evolved| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|ScreenOS| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|SecIntel| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Secure Analytics| | |Investigation| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Security Director| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Security Director Insights| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Session Smart Router (Formerly 128T)| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Space SDK| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|Standalone Log Collector 20.1 (as also used by Space Security Director)| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Juniper Networks|User Engagement Virtual BLE| | |Not vuln| | | |"[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)"| -|Justice Systems|All| | | | | | |[Justice Systems Support](https://www.justicesystems.com/services/support/)| +|Journyx|All| | | | | ||[Journeyx Statement](https://community.journyx.com/support/solutions/articles/9000209044-apache-log4j-2-vulnerability-cve-2021-44228-)| +|jPOS|(ISO-8583) bridge| | |Not vuln| | ||[source](https://github.com/jpos/jPOS/commit/d615199a1bdd35c35d63c07c10fd0bdbbc96f625)| +|Jump Desktop|All| | | | | ||[Jump Desktop Statement](https://support.jumpdesktop.com/hc/en-us/articles/4416720395021-Log4j-CVE-2021-44228-CVE-2021-45046-Statement)| +|Juniper Networks|Advanced Threat Prevention (JATP)| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|AppFormix| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Apstra System| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Connectivity Services Director| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Contrail products: Contrail Analytics, Contrail Cloud, Contrail Networking or Contrail Service Orchestration| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Cross Provisioning Platform| | |Investigation| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|CTPOS and CTPView| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|ICEAAA Manager| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|JATP Cloud| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|JSA Series| | |Investigation| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Juniper Identity Management Services (JIMS)| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Juniper Mist Edge| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Juniper Sky Enterprise| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Junos OS| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Junos OS Evolved| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Junos Space Network Management Platform| | |Vulnerable| | |Only when OpenNMS has been enabled.|[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Mist Access Points|Any version on AP12, AP21, AP32, AP33, AP34, AP41, AP43, AP45, AP61, AP63.| |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|MIST: Juniper Networks Marvis Virtual Network Assistant (VNA)| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|MIST: Juniper Networks Mist AI| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|MIST: Juniper Networks Paragon Active Assurance| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|MIST: Juniper Networks WAN Assurance| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|MIST: Juniper Networks Wi-Fi Assurance| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|MIST: Juniper Networks Wired Assurance| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Network Director| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Northstar Controller| | |Vulnerable| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Northstar Planner| | |Investigation| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Paragon Insights|">= 21 version 21.1 ; >= 22 version 22.2"| |Vulnerable| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Paragon Pathfinder|">= 21 version 21.1 ; >= 22 version 22.2"| |Vulnerable| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Paragon Planner|">= 21 version 21.1 ; >= 22 version 22.2"| |Vulnerable| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Policy Enforcer| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|products using Wind River Linux in Junos OS and Junos OS Evolved| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|ScreenOS| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|SecIntel| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Secure Analytics| | |Investigation| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Security Director| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Security Director Insights| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Session Smart Router (Formerly 128T)| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Space SDK| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|Standalone Log Collector 20.1 (as also used by Space Security Director)| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Juniper Networks|User Engagement Virtual BLE| | |Not vuln| | ||[source](https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&actp=SUBSCRIPTION)| +|Justice Systems|All| | | | | ||[Justice Systems Support](https://www.justicesystems.com/services/support/)| diff --git a/software/software_list_k.md b/software/software_list_k.md index 9fc0d3609..eabe39760 100644 --- a/software/software_list_k.md +++ b/software/software_list_k.md @@ -7,36 +7,36 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|K15t|All| | | | | | |[K15t Statement](https://help.k15t.com/k15t-apps-and-log4shell-193401141.html)| -|K6|All| | | | | | |[K6 Statement](https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/)| -|Kaltura|Blackboard Learn SaaS in the classic Learn experience|v3900.28.x|Fix|Fix|Fix|Fix| |[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| -|Kaltura|Blackboard Learn Self- and Managed-Hosting|v3900.26.x|Fix|Fix|Fix|Fix| |[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| -|Karakun|All| | | | | | |"[Karakun Statement](https://board.karakun.com/viewtopic.php?f=21&t=8351)"| -|Kaseya|AuthAnvil| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|BMS| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|ID Agent DarkWeb ID and BullPhish ID| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|IT Glue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|MyGlue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|Network Glue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|Passly| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|products not listed above| | |Investigation| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|RocketCyber| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|Spannign Salesforce Backup| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|Spanning O365 Backup| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|Unitrends| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|Vorex| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|Kaseya|VSA SaaS and VSA On-Premises| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| -|KeePass|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250)| -|Keeper|All| | |Fix|Fix| | |[source](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| -|Keeper Security|All| | | | | | |[Keeper Security Notice](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| -|KEMP|All| | | | | | |[KEMP Support](https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit)| -|KEMP 2|All| | | | | | |[KEMP 2 Support](https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228-)| -|Keycloak|All|all version| |Not vuln| | | |[source](https://github.com/keycloak/keycloak/discussions/9078)| -|Kofax|Capture|All| |Not vuln| | | |[source](https://knowledge.kofax.com/Capture/Kofax_Capture/Reference/Log4J_Vulnerability_CVE-2021-44228_Does_Not_Affect_Kofax_Capture)| -|Kofax|Communication Manager (KCM)|5.3-5.5|Not vuln|Fix| | | |[source](https://knowledge.kofax.com/Communications_Manager/Troubleshooting/log4j_vulnerability_in_Kofax_Communications_Manager)| -|Kofax|Robot File System (RFS)|>=10.7|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| -|Kofax|Robotic Process Automation (RPA)|11.1|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| -|Kofax|Robotic Process Automation (RPA)|11.2|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| -|Konica Minolta|All| | | | | | |[Konica Minolta Support](https://www.konicaminolta.de/de-de/support/log4j)| -|Kronos UKG|All| | | | | | |[Kronos UKG Statement](https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US)| -|Kyberna|All| | | | | | |[Kyberna Statement](https://www.kyberna.com/detail/log4j-sicherheitsluecke)| +|K15t|All| | | | | ||[K15t Statement](https://help.k15t.com/k15t-apps-and-log4shell-193401141.html)| +|K6|All| | | | | ||[K6 Statement](https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/)| +|Kaltura|Blackboard Learn SaaS in the classic Learn experience|v3900.28.x|Fix|Fix|Fix|Fix||[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| +|Kaltura|Blackboard Learn Self- and Managed-Hosting|v3900.26.x|Fix|Fix|Fix|Fix||[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| +|Karakun|All| | | | | ||[Karakun Statement](https://board.karakun.com/viewtopic.php?f=21&t=8351)| +|Kaseya|AuthAnvil| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|BMS| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|ID Agent DarkWeb ID and BullPhish ID| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|IT Glue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|MyGlue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|Network Glue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|Passly| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|products not listed above| | |Investigation| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|RocketCyber| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|Spannign Salesforce Backup| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|Spanning O365 Backup| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|Unitrends| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|Vorex| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|Kaseya|VSA SaaS and VSA On-Premises| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| +|KeePass|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250)| +|Keeper|All| | |Fix|Fix| ||[source](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| +|Keeper Security|All| | | | | ||[Keeper Security Notice](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| +|KEMP|All| | | | | ||[KEMP Support](https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit)| +|KEMP 2|All| | | | | ||[KEMP 2 Support](https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228-)| +|Keycloak|All|all version| |Not vuln| | ||[source](https://github.com/keycloak/keycloak/discussions/9078)| +|Kofax|Capture|All| |Not vuln| | ||[source](https://knowledge.kofax.com/Capture/Kofax_Capture/Reference/Log4J_Vulnerability_CVE-2021-44228_Does_Not_Affect_Kofax_Capture)| +|Kofax|Communication Manager (KCM)|5.3-5.5|Not vuln|Fix| | ||[source](https://knowledge.kofax.com/Communications_Manager/Troubleshooting/log4j_vulnerability_in_Kofax_Communications_Manager)| +|Kofax|Robot File System (RFS)|>=10.7|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| +|Kofax|Robotic Process Automation (RPA)|11.1|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| +|Kofax|Robotic Process Automation (RPA)|11.2|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| +|Konica Minolta|All| | | | | ||[Konica Minolta Support](https://www.konicaminolta.de/de-de/support/log4j)| +|Kronos UKG|All| | | | | ||[Kronos UKG Statement](https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US)| +|Kyberna|All| | | | | ||[Kyberna Statement](https://www.kyberna.com/detail/log4j-sicherheitsluecke)| diff --git a/software/software_list_l.md b/software/software_list_l.md index 8ba22c044..bc207e3e0 100644 --- a/software/software_list_l.md +++ b/software/software_list_l.md @@ -7,218 +7,219 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|L-Soft|All| | | | | | |[L-Soft Info](http://www.lsoft.com/news/log4jinfo.asp)| -|L3Harris Geospatial|All| | | | | | |[L3Harris Geospatial](https://www.l3harrisgeospatial.com/Support/Self-Help-Tools/Help-Articles/Help-Articles-Detail/ArtMID/10220/ArticleID/24141/Impact-of-Log4j-Java-Security-Vulnerability-CVE-2021-44228-on-L3Harris-Geospatial-software)| -|Lancom Systems|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.lancom-systems.com/service-support/instant-help/general-security-information)| -|Lansweeper|All|All| |Not vuln| | | |[source](https://www.lansweeper.com/vulnerability/critical-log4j-vulnerability-affects-millions-of-applications/)| -|Laserfiche|All| | | | | | |[Laserfiche Product Information](https://answers.laserfiche.com/questions/194037/Do-any-Laserfiche-products-use-the-Apache-log4j-library#194038)| +|Logit.io|Platform| | |Not vuln| | ||[link](https://logit.io/blog/post/logit-io-log4shell-security-update)| +|L-Soft|All| | | | | ||[L-Soft Info](http://www.lsoft.com/news/log4jinfo.asp)| +|L3Harris Geospatial|All| | | | | ||[L3Harris Geospatial](https://www.l3harrisgeospatial.com/Support/Self-Help-Tools/Help-Articles/Help-Articles-Detail/ArtMID/10220/ArticleID/24141/Impact-of-Log4j-Java-Security-Vulnerability-CVE-2021-44228-on-L3Harris-Geospatial-software)| +|Lancom Systems|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.lancom-systems.com/service-support/instant-help/general-security-information)| +|Lansweeper|All|All| |Not vuln| | ||[source](https://www.lansweeper.com/vulnerability/critical-log4j-vulnerability-affects-millions-of-applications/)| +|Laserfiche|All| | | | | ||[Laserfiche Product Information](https://answers.laserfiche.com/questions/194037/Do-any-Laserfiche-products-use-the-Apache-log4j-library#194038)| |LastPass|MFA| |Not vuln|Fix| | |Universal Proxy on Windows with Debug logging enabled are highly recommended to update to the newest version of the Universal Proxy 3.0.2 or 4.1.2|[source](https://support.logmeininc.com/lastpass/help/log4j-vulnerability-faq-for-lastpass-universal-proxy)| -|LastPass|Other products| | |Not vuln| | | |[source](https://support.logmeininc.com/lastpass/help/log4j-vulnerability-faq-for-lastpass-universal-proxy)| -|LaunchDarkly|All| | | | | | |[LaunchDarkly Statement](https://launchdarkly.com/blog/audit-shows-systems-unaffected-by-log4j/)| -|LeanIX|All|All|Not vuln|Fix| | | |[source](https://www.leanix.net/en/blog/log4j-vulnerability-log4shell)| -|Lecia biosystem|Aperio AT2| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio AT2 DX| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio CS2| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio eSlide Manager| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio GT 450| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio GT 450 DX| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio ImageScope| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio ImageScope DX| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio LV1| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| +|LastPass|Other products| | |Not vuln| | ||[source](https://support.logmeininc.com/lastpass/help/log4j-vulnerability-faq-for-lastpass-universal-proxy)| +|LaunchDarkly|All| | | | | ||[LaunchDarkly Statement](https://launchdarkly.com/blog/audit-shows-systems-unaffected-by-log4j/)| +|LeanIX|All|All|Not vuln|Fix| | ||[source](https://www.leanix.net/en/blog/log4j-vulnerability-log4shell)| +|Lecia biosystem|Aperio AT2| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio AT2 DX| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio CS2| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio eSlide Manager| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio GT 450| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio GT 450 DX| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio ImageScope| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio ImageScope DX| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio LV1| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| |Lecia biosystem|Aperio SAM DX Server For GT 450 DX| |Vulnerable|Not vuln| | |Uses Mirth Connect - See supplier Vyaire Medical further in the list|[source](https://www.leicabiosystems.com/about/product-security/)| |Lecia biosystem|Aperio Scanner Administration Manager (SAM) Server for GT 450| | |Not vuln| | |Uses Mirth Connect - See supplier Vyaire Medical further in the list|[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio VERSA| |Vulnerable|Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Aperio WebViewer DX| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|BOND Controller| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|BOND RX / RXm| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|BOND-ADVANCE| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|BOND-III| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|BOND-MAX| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio VERSA| |Vulnerable|Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Aperio WebViewer DX| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|BOND Controller| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|BOND RX / RXm| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|BOND-ADVANCE| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|BOND-III| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|BOND-MAX| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| |Lecia biosystem|CEREBRO| |Vulnerable|Not vuln| | |Uses Mirth Connect - See supplier Vyaire Medical further in the list|[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|CytoVision| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|HistoCore PEARL| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|HistoCore PEGASUS| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|HistoCore SPECTRA CV| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|HistoCore SPECTRA ST| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|HistoCore SPIRIT ST| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|HistoCore SPRING ST| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Leica ASP300S| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Leica CV5030| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Leica ST4020| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Leica ST5010| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Leica ST5020| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|Leica TP1020| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|CytoVision| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|HistoCore PEARL| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|HistoCore PEGASUS| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|HistoCore SPECTRA CV| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|HistoCore SPECTRA ST| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|HistoCore SPIRIT ST| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|HistoCore SPRING ST| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Leica ASP300S| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Leica CV5030| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Leica ST4020| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Leica ST5010| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Leica ST5020| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|Leica TP1020| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| |Lecia biosystem|LIS Connect| |Vulnerable|Not vuln| | |Uses Mirth Connect - See supplier Vyaire Medical further in the list|[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|PathDX| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Lecia biosystem|ThermoBrite Elite| | |Not vuln| | | |[source](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio AT2| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio AT2 DX| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio CS2| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio eSlide Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio GT 450| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio GT 450 DX| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio ImageScope| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio ImageScope DX| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio LV1| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio SAM DX Server For GT 450 DX| | |Investigation| | | |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio Scanner Administration Manager (SAM) Server for GT 450| | |Investigation| | | |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio VERSA| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Aperio WebViewer DX| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|BOND Controller| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|BOND RX| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|BOND RXm| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|BOND-ADVANCE| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|BOND-III| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|BOND-MAX| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|CEREBRO| | |Investigation| | | |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|CytoVision| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|HistoCore PEARL| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|HistoCore PEGASUS| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|HistoCore SPECTRA CV| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|HistoCore SPECTRA ST| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|HistoCore SPIRIT ST| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|HistoCore SPRING ST| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Leica ASP300S| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Leica CV5030| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Leica ST4020| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Leica ST5010| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Leica ST5020| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|Leica TP1020| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|LIS Connect| | |Investigation| | | |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|PathDX| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Leica BIOSYSTEMS|ThermoBrite Elite| |Not vuln|Not vuln|Not vuln|Not vuln| |[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| -|Lenovo|Any 5594 UPS unit| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Any 5595 UPS unit| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|B300 FC SAN Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|B6505 FC SAN Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|B6510 FC SAN Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|BIOS/UEFI| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Chassis Management Module 2 (CMM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Cloud Deploy| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Commercial Vantage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Confluent| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-CB-10 (Lenovo)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-CB-10E (Lenovo)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-CN-10 (ThinkAgile)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-CN-10E (ThinkAgile)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-I-10 (ThinkAgile)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-SB-D20 (ThinkAgile)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-SB-D20E (ThinkAgile)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP-SB-S10 (ThinkAgile)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|CP6000 (ThinkAgile)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Device Intelligence (LDI)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|DM120S (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM240N (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM240S (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM3000H (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM5000F (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM5000H (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM5100F (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM600S (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM7000F (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM7000H (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM7100F (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DM7100H (ThinkSystem)| |Not vuln|Workaround| | | |[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| -|Lenovo|DSS-G| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Dynamic System Analysis (DSA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Eaton UPS Network Management Card (NMC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Embedded System Management Java-based KVM clients| |Not vuln|Not vuln|Not vuln|Not vuln| |[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|Fan Power Controller (FPC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Fan Power Controller2 (FPC2)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|GCM16 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|GCM32 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|IBM Advanced Management Module (AMM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|IBM GCM16 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|IBM GCM32 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|IBM LCM16 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|IBM LCM8 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Integrated Management Module II (IMM2)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|LCM16 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|LCM8 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|NetApp ONTAP Tools for VMware vSphere| | |Vulnerable| | |"See NetApp advisory."|[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lecia biosystem|PathDX| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Lecia biosystem|ThermoBrite Elite| | |Not vuln| | ||[source](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio AT2| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio AT2 DX| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio CS2| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio eSlide Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio GT 450| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio GT 450 DX| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio ImageScope| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio ImageScope DX| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio LV1| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio SAM DX Server For GT 450 DX| | |Investigation| | ||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio Scanner Administration Manager (SAM) Server for GT 450| | |Investigation| | ||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio VERSA| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Aperio WebViewer DX| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|BOND Controller| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|BOND RX| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|BOND RXm| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|BOND-ADVANCE| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|BOND-III| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|BOND-MAX| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|CEREBRO| | |Investigation| | ||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|CytoVision| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|HistoCore PEARL| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|HistoCore PEGASUS| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|HistoCore SPECTRA CV| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|HistoCore SPECTRA ST| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|HistoCore SPIRIT ST| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|HistoCore SPRING ST| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Leica ASP300S| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Leica CV5030| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Leica ST4020| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Leica ST5010| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Leica ST5020| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|Leica TP1020| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|LIS Connect| | |Investigation| | ||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|PathDX| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Leica BIOSYSTEMS|ThermoBrite Elite| |Not vuln|Not vuln|Not vuln|Not vuln||[Leica BIOSYSTEMS Advisory Link](https://www.leicabiosystems.com/about/product-security/)| +|Lenovo|Any 5594 UPS unit| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Any 5595 UPS unit| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|B300 FC SAN Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|B6505 FC SAN Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|B6510 FC SAN Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|BIOS/UEFI| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Chassis Management Module 2 (CMM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Cloud Deploy| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Commercial Vantage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Confluent| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-CB-10 (Lenovo)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-CB-10E (Lenovo)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-CN-10 (ThinkAgile)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-CN-10E (ThinkAgile)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-I-10 (ThinkAgile)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-SB-D20 (ThinkAgile)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-SB-D20E (ThinkAgile)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP-SB-S10 (ThinkAgile)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|CP6000 (ThinkAgile)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Device Intelligence (LDI)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|DM120S (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM240N (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM240S (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM3000H (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM5000F (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM5000H (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM5100F (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM600S (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM7000F (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM7000H (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM7100F (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DM7100H (ThinkSystem)| |Not vuln|Workaround| | ||[source](https://dataleftsupport.lenovo.com/us/en/solutions/ht513178)| +|Lenovo|DSS-G| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Dynamic System Analysis (DSA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Eaton UPS Network Management Card (NMC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Embedded System Management Java-based KVM clients| |Not vuln|Not vuln|Not vuln|Not vuln||[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|Fan Power Controller (FPC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Fan Power Controller2 (FPC2)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|GCM16 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|GCM32 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|IBM Advanced Management Module (AMM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|IBM GCM16 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|IBM GCM32 Global Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|IBM LCM16 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|IBM LCM8 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Integrated Management Module II (IMM2)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|LCM16 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|LCM8 Local Console Managers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|NetApp ONTAP Tools for VMware vSphere| | |Vulnerable| | |See https://security.netapp.com/advisory/ntap-20211210-0007/ NetApp advisory.|[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| |Lenovo|Network Switches| |Not vuln|Not vuln|Not vuln|Not vuln|Lenovo CNOS, Lenovo ENOS, IBM ENOS, Brocade FOS|[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Network Switches running: Lenovo CNOS, Lenovo ENOS, IBM ENOS, or Brocade FOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|Network Switches running: Lenovo CNOS, Lenovo ENOS, IBM ENOS, or Brocade FOS| |Not vuln|Not vuln|Not vuln|Not vuln||[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| |Lenovo|P920 Rack Workstation| | |Vulnerable| | |Patch 2021-12-20|[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Patch for MEM| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR530 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR550 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR570 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR590 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR630 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR630 V2 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR645 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR650 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR650 V2 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR665 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR850 V2 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|SR860 V2 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ST550 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ST558 (ThinkSystem)| | |Vulnerable| | | |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Storage Management utilities| | |Investigation| | | |[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|System Management Module (SMM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|System Management Module 2 (SMM2)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|System Update| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Thin Installer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ThinkAgile HX| | |Vulnerable| | |"Nutanix and VMware components only; hardware not affected. See Nutanix and VMWare advisories."|[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|ThinkAgile HX (VMware Components)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ThinkAgile VX| | |Vulnerable| | |"VMware components only; hardware not affected. See VMWare advisory."|[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|ThinkAgile VX (VMware Components)| |Not vuln|Fix| | | |[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|Lenovo|ThinkSystem 2x1x16 Digital KVM Switch - Type 1754D1T| |Not vuln|Fix| | | |[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|Lenovo|ThinkSystem DB400D FC Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ThinkSystem DB610S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|ThinkSystem DB620S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|ThinkSystem DB630S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|ThinkSystem DB720S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|ThinkSystem DB800D FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|ThinkSystem DE Series Storage|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | | |[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| -|Lenovo|ThinkSystem Digital 2x1x16 KVM Switch, 1754-D1T| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ThinkSystem DM Series Storage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ThinkSystem DS Series Storage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|ThinkSystem Manager (TSM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Update Retriever| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|UPS Network Management Card, p/n 46M4110| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Vantage| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|Vertiv rPDUs for Lenovo| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Administrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Administrator (LXCA)| | |Vulnerable| | | |[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|XClarity Controller (XCC)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Energy Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Energy Manager (LXEM)| | |Vulnerable| | | |[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|XClarity Essentials (LXCE)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|xClarity Integrator| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Integrator (LXCI) for Microsoft Azure Analytics| |Not vuln|Fix| | | |[source](https://dataleftsupport.lenovo.com/us/en/products/solutions-and-software/software/lenovo-xclarity/lxca/downloads/ds554079-lenovo-xclarity-administrator-ga-fix-345-for-anyos)| -|Lenovo|XClarity Integrator (LXCI) for Microsoft Azure Log Analytics| | |Investigation| | | |[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|XClarity Integrator (LXCI) for Microsoft System Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Integrator (LXCI) for Nagios| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Patch for MEM| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR530 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR550 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR570 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR590 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR630 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR630 V2 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR645 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR650 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR650 V2 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR665 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR850 V2 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|SR860 V2 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ST550 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ST558 (ThinkSystem)| | |Vulnerable| | ||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Storage Management utilities| | |Investigation| | ||[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|System Management Module (SMM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|System Management Module 2 (SMM2)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|System Update| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Thin Installer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ThinkAgile HX| | |Vulnerable| | |Nutanix and VMware components only; hardware not affected. See https://download.nutanix.com/alerts/Security_Advisory_0023.pdf Nutanix and https://www.vmware.com/security/advisories/VMSA-2021-0028.html VMWare advisories.|[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|ThinkAgile HX (VMware Components)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ThinkAgile VX| | |Vulnerable| | |VMware components only; hardware not affected. See https://www.vmware.com/security/advisories/VMSA-2021-0028.html VMWare advisory.|[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|ThinkAgile VX (VMware Components)| |Not vuln|Fix| | ||[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|Lenovo|ThinkSystem 2x1x16 Digital KVM Switch - Type 1754D1T| |Not vuln|Fix| | ||[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|Lenovo|ThinkSystem DB400D FC Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ThinkSystem DB610S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|ThinkSystem DB620S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|ThinkSystem DB630S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|ThinkSystem DB720S FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|ThinkSystem DB800D FC Switch|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|ThinkSystem DE Series Storage|2.0.0, 2.1.0, 2.1.1|Not vuln|Workaround| | ||[source](https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1651)| +|Lenovo|ThinkSystem Digital 2x1x16 KVM Switch, 1754-D1T| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ThinkSystem DM Series Storage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ThinkSystem DS Series Storage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|ThinkSystem Manager (TSM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Update Retriever| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|UPS Network Management Card, p/n 46M4110| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Vantage| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|Vertiv rPDUs for Lenovo| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Administrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Administrator (LXCA)| | |Vulnerable| | ||[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|XClarity Controller (XCC)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Energy Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Energy Manager (LXEM)| | |Vulnerable| | ||[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|XClarity Essentials (LXCE)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|xClarity Integrator| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Integrator (LXCI) for Microsoft Azure Analytics| |Not vuln|Fix| | ||[source](https://dataleftsupport.lenovo.com/us/en/products/solutions-and-software/software/lenovo-xclarity/lxca/downloads/ds554079-lenovo-xclarity-administrator-ga-fix-345-for-anyos)| +|Lenovo|XClarity Integrator (LXCI) for Microsoft Azure Log Analytics| | |Investigation| | ||[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|XClarity Integrator (LXCI) for Microsoft System Center| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Integrator (LXCI) for Nagios| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| |Lenovo|XClarity Integrator (LXCI) for ServiceNow| | |Vulnerable| | |Patch 2021-12-20|[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Integrator (LXCI) for VMware vCenter| | |Vulnerable| | | |[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| -|Lenovo|XClarity Integrator (LXCI) for Windows Admin Center| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Mobile (LXCM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Integrator (LXCI) for VMware vCenter| | |Vulnerable| | ||[Apache Log4j Vulnerability](https://support.lenovo.com/ca/en/product_security/len-76573)| +|Lenovo|XClarity Integrator (LXCI) for Windows Admin Center| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|Lenovo|XClarity Mobile (LXCM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| |Lenovo|XClarity Orchestrator (LXCO)| | |Vulnerable| | |Patch 2021-12-21|[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|Lenovo|XClarity Provisioning Manager (LXPM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| -|LeoStream|All| | | | | | |[LeoStream Discussion](https://support.leostream.com/support/discussions/topics/66000507567)| -|Let's Encrypt|All| | | | | | |[Let's Enrypt Statement](https://community.letsencrypt.org/t/log4j-vulnerability-cve-2021-44228/167464)| -|LibreNMS|All| | | | | | |[LibreNMS Statement](https://community.librenms.org/t/is-librenms-affected-by-vulnerable-to-cve-2021-25218-cve-2021-44228/17675/6)| -|LifeRay|All| | | | | | |[LifeRay Blog](https://liferay.dev/blogs/-/blogs/log4j2-zero-day-vulnerability)| -|LifeSize|All| | | | | | |[LifeSize Statement](https://community.lifesize.com/s/article/Apache-Log4j2-CVE-2021-44228)| -|Lightbend|Akka| | |Not vuln| | | |[source](https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275)| -|Lightbend|Akka Serverless| | |Not vuln| | | |[source](https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275)| +|Lenovo|XClarity Provisioning Manager (LXPM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.lenovo.com/us/en/product_security/LEN-76573)| +|LeoStream|All| | | | | ||[LeoStream Discussion](https://support.leostream.com/support/discussions/topics/66000507567)| +|Let's Encrypt|All| | | | | ||[Let's Enrypt Statement](https://community.letsencrypt.org/t/log4j-vulnerability-cve-2021-44228/167464)| +|LibreNMS|All| | | | | ||[LibreNMS Statement](https://community.librenms.org/t/is-librenms-affected-by-vulnerable-to-cve-2021-25218-cve-2021-44228/17675/6)| +|LifeRay|All| | | | | ||[LifeRay Blog](https://liferay.dev/blogs/-/blogs/log4j2-zero-day-vulnerability)| +|LifeSize|All| | | | | ||[LifeSize Statement](https://community.lifesize.com/s/article/Apache-Log4j2-CVE-2021-44228)| +|Lightbend|Akka| | |Not vuln| | ||[source](https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275)| +|Lightbend|Akka Serverless| | |Not vuln| | ||[source](https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275)| |Lightbend|Lagom Framework| | |Not vuln| | |Users that switched from logback to log4j (non-default) are affected|[source](https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275)| |Lightbend|Play Framework| | |Not vuln| | |Users that switched from logback to log4j (non-default) are affected|[source](https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275)| -|Lime CRM|All| | | | | | |[Lime CRM Statement](https://docs.lime-crm.com/security/lcsec21-01)| -|Liongard|All| | |Not vuln|Not vuln|Investigation| |[source](https://insights.liongard.com/faq-apache-log4j-vulnerability)| -|LiquidFiles|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://mailchi.mp/liquidfiles/liquidfiles-log4j)| -|LiveAction|LiveNA|<21.5.1|Not vuln|Fix| | | |[source](https://documentation.liveaction.com/LiveNA/LiveNA%2021.5.1%20Release%20Notes/Release%20Notes%20LiveNA%2021.5.1.1.2)| -|LiveAction|LiveNX|<21.5.1|Not vuln|Fix| | | |[source](https://documentation.liveaction.com/LiveNX/LiveNX%2021.5.1%20Release%20Notes/Release%20Notes%20LiveNX%2021.5.1.1.3)| -|Loftware|All| | | | | | |[Loftware](https://help.loftware.com/lps-kb/content/log4j%20cve-2021-44228.htm?Highlight=CVE-2021-44228)| +|Lime CRM|All| | | | | ||[Lime CRM Statement](https://docs.lime-crm.com/security/lcsec21-01)| +|Liongard|All| | |Not vuln|Not vuln|Investigation||[source](https://insights.liongard.com/faq-apache-log4j-vulnerability)| +|LiquidFiles|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://mailchi.mp/liquidfiles/liquidfiles-log4j)| +|LiveAction|LiveNA|<21.5.1|Not vuln|Fix| | ||[source](https://documentation.liveaction.com/LiveNA/LiveNA%2021.5.1%20Release%20Notes/Release%20Notes%20LiveNA%2021.5.1.1.2)| +|LiveAction|LiveNX|<21.5.1|Not vuln|Fix| | ||[source](https://documentation.liveaction.com/LiveNX/LiveNX%2021.5.1%20Release%20Notes/Release%20Notes%20LiveNX%2021.5.1.1.3)| +|Loftware|All| | | | | ||[Loftware](https://help.loftware.com/lps-kb/content/log4j%20cve-2021-44228.htm?Highlight=CVE-2021-44228)| |LOGalyze|SIEM & log analyzer tool|v4.x| |Vulnerable| | |local-log4j-vuln-scanner result: indicator for vulnerable component found in /logalyze/lib/log4j-1.2.17.jar (org/apache/log4j/net/SocketNode.class): log4j 1.2.17|[abandoned open-source software repo (sourceforge.net)](https://sourceforge.net/software/product/LOGalyze/)| -|LogiAnalytics|All| | | | | | |[LogiAnalytics Statement](https://devnet.logianalytics.com/hc/en-us/articles/4415781801751-Statement-on-Log4j-Vulnerability-CVE-2021-44228-)| -|LogicMonitor|Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[Log4j Security Vulnerabilities](https://www.logicmonitor.com/support/log4shell-security-vulnerability-cve-2021-44228)| -|LogMeIn|All| | | | | | |[LogMeIn Statement](https://community.logmein.com/t5/LogMeIn-Central-Discussions/LOG4J-Vulnerability/m-p/280317/highlight/true#M8327)| +|LogiAnalytics|All| | | | | ||[LogiAnalytics Statement](https://devnet.logianalytics.com/hc/en-us/articles/4415781801751-Statement-on-Log4j-Vulnerability-CVE-2021-44228-)| +|LogicMonitor|Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[Log4j Security Vulnerabilities](https://www.logicmonitor.com/support/log4shell-security-vulnerability-cve-2021-44228)| +|LogMeIn|All| | | | | ||[LogMeIn Statement](https://community.logmein.com/t5/LogMeIn-Central-Discussions/LOG4J-Vulnerability/m-p/280317/highlight/true#M8327)| |LogRhythm|SIEM|7.4-7.8|Not vuln|Workaround| | |Link is behind a login|[source](https://community.logrhythm.com/t5/Product-Security/Log4J-Remediation-Update-CloudAI-and-NetMon-Complete-LogRhythm/td-p/494350)| |LogZilla|NEO|All|Not vuln|Not vuln|Not vuln|Not vuln|LogZilla's engine is C++|| -|Looker|All|21.0, 21.6, 21.12, 21.16, 21.18, 21.20|Not vuln|Fix| | | |[Looker Statement](https://docs.google.com/document/d/e/2PACX-1vQGN1AYNMHxsRQ9AZNu1bKyTGRUSK_9xkQBge-nu4p8PYvBKIYHhc3914KTfVtDFIXtDhc3k6SZnR2M/pub)| -|LucaNet|All|12 LTS - 1911.0.192+3, 13 LTS - 2011.0.112+7, 22 LTS - 2111.0.11+9|Not vuln|Fix| | | |[source](https://www.lucanet.com/en/blog/update-vulnerability-log4j)| -|Lucee|All| | | | | | |[Lucee Statement](https://dev.lucee.org/t/lucee-is-not-affected-by-the-log4j-jndi-exploit-cve-2021-44228/9331/4)| -|Lyrasis|DSpace|7.1.1|Not vuln|Fix| | | |[source](https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE)| +|Looker|All|21.0, 21.6, 21.12, 21.16, 21.18, 21.20|Not vuln|Fix| | ||[Looker Statement](https://docs.google.com/document/d/e/2PACX-1vQGN1AYNMHxsRQ9AZNu1bKyTGRUSK_9xkQBge-nu4p8PYvBKIYHhc3914KTfVtDFIXtDhc3k6SZnR2M/pub)| +|LucaNet|All|12 LTS - 1911.0.192+3, 13 LTS - 2011.0.112+7, 22 LTS - 2111.0.11+9|Not vuln|Fix| | ||[source](https://www.lucanet.com/en/blog/update-vulnerability-log4j)| +|Lucee|All| | | | | ||[Lucee Statement](https://dev.lucee.org/t/lucee-is-not-affected-by-the-log4j-jndi-exploit-cve-2021-44228/9331/4)| +|Lyrasis|DSpace|7.1.1|Not vuln|Fix| | ||[source](https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE)| |Lyrasis|Fedora Repository|3.x,4.x,5.x,6.x|Not vuln|Not vuln|Not vuln|Not vuln|Fedora Repository is unaffiliated with Fedora Linux. Uses logback and explicitly excludes log4j.|[Fedora Repository Statement](https://groups.google.com/g/fedora-tech/c/dQMQ5jaX8Xo)| diff --git a/software/software_list_m.md b/software/software_list_m.md index 7b7f0cc0c..3bc3a30df 100644 --- a/software/software_list_m.md +++ b/software/software_list_m.md @@ -7,165 +7,169 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|Macrium Software|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.macrium.com/log4j-vulnerabilities-update)| -|Mailcow|Solr Docker|< 1.8|Not vuln|Fix| | | |[source](https://community.mailcow.email/d/1229-cve-2021-44228-vulnerability-solr)| -|MailStore|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mailstore.com/en/blog/mailstore-affected-by-log4shell/)| -|Maltego|All| | | | | | |[Maltego Response to Logj4](https://www.maltego.com/blog/our-response-to-log4j-cve-2021-44228/)| -|ManageEngine|ADAudit Plus| |Not vuln|Workaround|Workaround|Workaround| |[source](https://pitstop.manageengine.com/portal/en/community/topic/apache-log4j-vulnerability-cve-2021-44228-1)| -|ManageEngine|ADManager Plus| |Not vuln|Workaround|Workaround|Workaround| |[source](https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus)| -|ManageEngine|Desktop Central|10.1.2127.20|Fix|Not vuln|Not vuln|Not vuln| |[source](https://pitstop.manageengine.com/portal/en/community/topic/log4j-security-issue)| -|ManageEngine|EventLog Analyzer| |Not vuln|Workaround|Workaround|Workaround| |[source](https://pitstop.manageengine.com/portal/en/community/topic/fixing-log4j-cve-2021-44228-vulnerability-in-log360)| -|ManageEngine|Servicedesk Plus|11305 and below| |Vulnerable| | | |[Manage Engine Advisory](https://www.manageengine.com/products/service-desk/security-response-plan.html)| -|ManageEngine Zoho|ADAudit Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|ADManager Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|ADSelfService Plus| | Not vuln| Not vuln| Not vuln|Not vuln | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/log4j-advisory-adselfservice-plus-6119-released-to-remove-log4j-dependency)| -|ManageEngine Zoho|All| | | | | | |[Manage Engine Link](https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus)| -|ManageEngine Zoho|Analytics Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|Cloud Security Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|DataSecurity Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|EventLog Analyzer|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|Exchange Reporter Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|Log360|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|Log360 UEBA|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|M365 Manager Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|M365 Security Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|ManageEngine Zoho|RecoveryManager Plus|On-Prem| | | | | |[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| -|MariaDB|All| | | | | | |[MariaDB Statement](https://mariadb.com/resources/blog/log4shell-and-mariadb-cve-2021-44228/)| -|Mathworks|All MathWorks general release desktop or server products| |Not vuln|Not vuln|Not vuln|Not vuln| |[MathWorks statement regarding CVE-2021-44228](https://www.mathworks.com/matlabcentral/answers/1610640-apache-log4j-vulnerability-cve-2021-44228-how-does-it-affect-matlab-run-time)| -|Mathworks|MATLAB|All| |Not vuln| | | |[source](https://www.mathworks.com/content/dam/mathworks/policies/mathworks-response-to-cve-2021-44228-log4j-vulnerability.pdf)| -|MathWorks Matlab|All| | | | | | |[MathWorks Matlab Statement](https://www.mathworks.com/matlabcentral/answers/1610640-apache-log4j-vulnerability-cve-2021-44228-how-does-it-affect-matlab-run-time)| -|Matillion|All| | | | | | |[Matillion Security Advisory](https://documentation.matillion.com/docs/security-advisory-14th-december-2021)| -|Matomo|All| | | | | | |[Matomo Statement](https://forum.matomo.org/t/matomo-is-not-concerned-by-the-log4j-security-breach-cve-2021-44228-discovered-on-december-2021-the-9th/44089)| -|Mattermost|All| | |Not vuln| | | |[source](https://forum.mattermost.org/t/security-update-log4j-security-vulnerability/12695)| -|Mattermost FocalBoard|All| | | | | | |[Mattermost FocalBoard Concern](https://forum.mattermost.org/t/log4j-vulnerability-concern/12676)| -|McAfee|Active Response (MAR)| | |Not vuln| | |Standalone MAR not vulnerable, for MAR included in bundle see TIE|"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|Agent (MA)| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Application and Change Control (MACC) for Linux| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Application and Change Control (MACC) for Windows| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Client Proxy (MCP) for Mac| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Client Proxy (MCP) for Windows| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Data Exchange Layer (DXL)| | |Not vuln| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|Data Exchange Layer (DXL) Client| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Data Loss Prevention (DLP) Discover| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Data Loss Prevention (DLP) Endpoint for Mac| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Data Loss Prevention (DLP) Endpoint for Windows| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Data Loss Prevention (DLP) Monitor| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Data Loss Prevention (DLP) Prevent| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Drive Encryption (MDE)| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Endpoint Security (ENS) for Linux| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Endpoint Security (ENS) for Mac| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Endpoint Security (ENS) for Windows| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Enterprise Security Manager (ESM)|11.x|Not vuln|Workaround| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|ePolicy Orchestrator Agent Handlers (ePO-AH)| | |Not vuln| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|ePolicy Orchestrator Application Server (ePO)|<= 5.10 CU10| |Not vuln| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|ePolicy Orchestrator Application Server (ePO)|5.10 CU11|Not vuln|Workaround| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|Host Intrusion Prevention (Host IPS)| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Management of Native Encryption (MNE)| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Network Security Manager (NSM)| | |Not vuln| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|Network Security Platform (NSP)| | |Not vuln| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|Policy Auditor| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Security for Microsoft Exchange (MSME)| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Security for Microsoft SharePoint (MSMS)| |Not vuln|Not vuln|Not vuln|Not vuln| || -|McAfee|Threat Intelligence Exchange (TIE)|2.2, 2.3, 3.0|Not vuln|Workaround| | | |"[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)"| -|McAfee|Web Gateway (MWG)| |Not vuln|Fix| | | |"[source](https://kc.mcafee.com/agent/index?page=content&id=SB10377)"| -|Medtronic|All| | |Investigation| | | |[Medtronic Advisory Link](https://global.medtronic.com/xg-en/product-security/security-bulletins/log4j-vulnerabilities.html)| -|Meinberg|LANTIME|All| |Not vuln| | | |[source](https://www.meinbergglobal.com/english/sw/mbgsecurityadvisory.htm#mbgsa_535)| -|Meinberg|microSync|All| |Not vuln| | | |[source](https://www.meinbergglobal.com/english/sw/mbgsecurityadvisory.htm#mbgsa_535)| +|MMM Group|Control software of all MMM series| | | | | ||[link](https://www.mmmgroup.com/en/news/cybersecurity-vulnerability-log4shell-java-library-log4j)| +|MMM Group|RUMED360 Cycles, RUMED360 Cycles View, RUMED360 Sicon, RUMED360 ISA-Server| | | | | ||[link](https://www.mmmgroup.com/en/news/cybersecurity-vulnerability-log4shell-java-library-log4j)| +|Mitsubishi Electric Corporation|CC-Link IE TSN|<=1.02C| |Vulnerable| | |Product number: SW1DNN-GN610SRC-M|[link](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-030_en.pdf)| +|Mitsubishi Electric Corporation|CC-Link IE TSN| | |Fix| | |Product number: SW1DNN-GN610SRC-M|[link](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-030_en.pdf)| +|Macrium Software|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.macrium.com/log4j-vulnerabilities-update)| +|Mailcow|Solr Docker|< 1.8|Not vuln|Fix| | ||[source](https://community.mailcow.email/d/1229-cve-2021-44228-vulnerability-solr)| +|MailStore|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mailstore.com/en/blog/mailstore-affected-by-log4shell/)| +|Maltego|All| | | | | ||[Maltego Response to Logj4](https://www.maltego.com/blog/our-response-to-log4j-cve-2021-44228/)| +|ManageEngine|ADAudit Plus| |Not vuln|Workaround|Workaround|Workaround||[source](https://pitstop.manageengine.com/portal/en/community/topic/apache-log4j-vulnerability-cve-2021-44228-1)| +|ManageEngine|ADManager Plus| |Not vuln|Workaround|Workaround|Workaround||[source](https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus)| +|ManageEngine|Desktop Central|10.1.2127.20|Fix|Not vuln|Not vuln|Not vuln||[source](https://pitstop.manageengine.com/portal/en/community/topic/log4j-security-issue)| +|ManageEngine|EventLog Analyzer| |Not vuln|Workaround|Workaround|Workaround||[source](https://pitstop.manageengine.com/portal/en/community/topic/fixing-log4j-cve-2021-44228-vulnerability-in-log360)| +|ManageEngine|Servicedesk Plus|11305 and below| |Vulnerable| | ||[Manage Engine Advisory](https://www.manageengine.com/products/service-desk/security-response-plan.html)| +|ManageEngine Zoho|ADAudit Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|ADManager Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|ADSelfService Plus| |Not vuln|Not vuln|Not vuln|Not vuln||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/log4j-advisory-adselfservice-plus-6119-released-to-remove-log4j-dependency)| +|ManageEngine Zoho|All| | | | | ||[Manage Engine Link](https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus)| +|ManageEngine Zoho|Analytics Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|Cloud Security Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|DataSecurity Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|EventLog Analyzer|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|Exchange Reporter Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|Log360|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|Log360 UEBA|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|M365 Manager Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|M365 Security Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|ManageEngine Zoho|RecoveryManager Plus|On-Prem| | | | ||[ManageEngine Vulnerability Impact](https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1)| +|MariaDB|All| | | | | ||[MariaDB Statement](https://mariadb.com/resources/blog/log4shell-and-mariadb-cve-2021-44228/)| +|Mathworks|All MathWorks general release desktop or server products| |Not vuln|Not vuln|Not vuln|Not vuln||[MathWorks statement regarding CVE-2021-44228](https://www.mathworks.com/matlabcentral/answers/1610640-apache-log4j-vulnerability-cve-2021-44228-how-does-it-affect-matlab-run-time)| +|Mathworks|MATLAB|All| |Not vuln| | ||[source](https://www.mathworks.com/content/dam/mathworks/policies/mathworks-response-to-cve-2021-44228-log4j-vulnerability.pdf)| +|MathWorks Matlab|All| | | | | ||[MathWorks Matlab Statement](https://www.mathworks.com/matlabcentral/answers/1610640-apache-log4j-vulnerability-cve-2021-44228-how-does-it-affect-matlab-run-time)| +|Matillion|All| | | | | ||[Matillion Security Advisory](https://documentation.matillion.com/docs/security-advisory-14th-december-2021)| +|Matomo|All| | | | | ||[Matomo Statement](https://forum.matomo.org/t/matomo-is-not-concerned-by-the-log4j-security-breach-cve-2021-44228-discovered-on-december-2021-the-9th/44089)| +|Mattermost|All| | |Not vuln| | ||[source](https://forum.mattermost.org/t/security-update-log4j-security-vulnerability/12695)| +|Mattermost FocalBoard|All| | | | | ||[Mattermost FocalBoard Concern](https://forum.mattermost.org/t/log4j-vulnerability-concern/12676)| +|McAfee|Active Response (MAR)| | |Not vuln| | |Standalone MAR not vulnerable, for MAR included in bundle see TIE|[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|Agent (MA)| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Application and Change Control (MACC) for Linux| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Application and Change Control (MACC) for Windows| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Client Proxy (MCP) for Mac| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Client Proxy (MCP) for Windows| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Data Exchange Layer (DXL)| | |Not vuln| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|Data Exchange Layer (DXL) Client| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Data Loss Prevention (DLP) Discover| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Data Loss Prevention (DLP) Endpoint for Mac| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Data Loss Prevention (DLP) Endpoint for Windows| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Data Loss Prevention (DLP) Monitor| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Data Loss Prevention (DLP) Prevent| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Drive Encryption (MDE)| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Endpoint Security (ENS) for Linux| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Endpoint Security (ENS) for Mac| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Endpoint Security (ENS) for Windows| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Enterprise Security Manager (ESM)|11.x|Not vuln|Workaround| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|ePolicy Orchestrator Agent Handlers (ePO-AH)| | |Not vuln| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|ePolicy Orchestrator Application Server (ePO)|<= 5.10 CU10| |Not vuln| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|ePolicy Orchestrator Application Server (ePO)|5.10 CU11|Not vuln|Workaround| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|Host Intrusion Prevention (Host IPS)| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Management of Native Encryption (MNE)| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Network Security Manager (NSM)| | |Not vuln| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|Network Security Platform (NSP)| | |Not vuln| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|Policy Auditor| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Security for Microsoft Exchange (MSME)| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Security for Microsoft SharePoint (MSMS)| |Not vuln|Not vuln|Not vuln|Not vuln||| +|McAfee|Threat Intelligence Exchange (TIE)|2.2, 2.3, 3.0|Not vuln|Workaround| | ||[source](https://kc.mcafee.com/corporate/index?page=content&id=KB95091)| +|McAfee|Web Gateway (MWG)| |Not vuln|Fix| | ||[source](https://kc.mcafee.com/agent/index?page=content&id=SB10377)| +|Medtronic|All| | |Investigation| | ||[Medtronic Advisory Link](https://global.medtronic.com/xg-en/product-security/security-bulletins/log4j-vulnerabilities.html)| +|Meinberg|LANTIME|All| |Not vuln| | ||[source](https://www.meinbergglobal.com/english/sw/mbgsecurityadvisory.htm#mbgsa_535)| +|Meinberg|microSync|All| |Not vuln| | ||[source](https://www.meinbergglobal.com/english/sw/mbgsecurityadvisory.htm#mbgsa_535)| |Meltano|All| |Not vuln|Not vuln|Not vuln|Not vuln|Project is written in Python|[Meltano](https://github.com/meltano/meltano)| -|Memurai|All| | |Not vuln| | | |[source](https://www.memurai.com/blog/apache-log4j2-cve-2021-44228)| -|messageconcept|PeopleSync|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://messageconcept.atlassian.net/wiki/spaces/PSKB/pages/2139095041/Is+PeopleSync+affected+by+Log4Shell)| +|Memurai|All| | |Not vuln| | ||[source](https://www.memurai.com/blog/apache-log4j2-cve-2021-44228)| +|messageconcept|PeopleSync|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://messageconcept.atlassian.net/wiki/spaces/PSKB/pages/2139095041/Is+PeopleSync+affected+by+Log4Shell)| |Metabase|All|<0.41.4|Not vuln|Fix| | |Mitigations available for earlier versions|[source](https://github.com/metabase/metabase/releases/tag/v0.41.4)| -|Micro Focus|ArcSight Connectors|8.2 and above| |Vulnerable| | | |[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| -|Micro Focus|ArcSight ESM|7.2, 7.5| |Vulnerable| | | |[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| -|Micro Focus|ArcSight Intelligence|All| |Vulnerable| | | |[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| -|Micro Focus|ArcSight Logger|7.2 and above| |Vulnerable| | | |[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| -|Micro Focus|ArcSight Recon|All| |Vulnerable| | | |[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| -|Micro Focus|ArcSight Transformation Hub|All| |Vulnerable| | | |[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| +|Micro Focus|ArcSight Connectors|8.2 and above| |Vulnerable| | ||[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| +|Micro Focus|ArcSight ESM|7.2, 7.5| |Vulnerable| | ||[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| +|Micro Focus|ArcSight Intelligence|All| |Vulnerable| | ||[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| +|Micro Focus|ArcSight Logger|7.2 and above| |Vulnerable| | ||[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| +|Micro Focus|ArcSight Recon|All| |Vulnerable| | ||[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| +|Micro Focus|ArcSight Transformation Hub|All| |Vulnerable| | ||[source](https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228)| |Micro Focus|Data Protector|All| |Vulnerable| | |Workaround only for supported versions. Earlier versions are not checked/worked on.|[workaround](https://portal.microfocus.com/s/article/KM000003052) [source](https://community.microfocus.com/img/bandr/f/itrc-251/512701/data-protector-v9-0-9-patch-workaround-for-log4j)| |Micro Focus|Silk Performer|21.0| |Vulnerable| | |Workaround|[source](https://portal.microfocus.com/s/article/KM000003066) [workaround](https://microfocus.my.salesforce.com/sfc/p/1t000000vhDP/a/8e000000c7fR/JrOxnycbJxIXDpzlzCCfBOy6pqqRcPD_cu.ySvH5Vc8)| |Micro Focus|Silk Test|20.0 up to 21.0.1 (included)| |Vulnerable| | |Workaround|[source](https://portal.microfocus.com/s/article/KM000003066) [workaround](https://microfocus.my.salesforce.com/sfc/p/1t000000vhDP/a/8e000000c7fR/JrOxnycbJxIXDpzlzCCfBOy6pqqRcPD_cu.ySvH5Vc8)| -|MicroFocus|All| | | | | | |"[MicroFocus Statement](https://portal.microfocus.com/s/customportalsearch?language=en_US&searchtext=CVE-2021-44228)"| +|MicroFocus|All| | | | | ||[MicroFocus Statement](https://portal.microfocus.com/s/customportalsearch?language=en_US&searchtext=CVE-2021-44228)| |Microsoft|Azure AD| | |Not vuln| | |ADFS itself is not vulnerable, federation providers may be|[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| -|Microsoft|Azure API Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[Microsoft’s Response to CVE-2021-44228 Apache Log4j 2](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| +|Microsoft|Azure API Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[Microsoft’s Response to CVE-2021-44228 Apache Log4j 2](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| |Microsoft|Azure App Service| | |Not vuln| | |This product itself is not vulnerable, Microsoft provides guidance on remediation for hosted applications|[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| -|Microsoft|Azure Application Gateway| | |Not vuln| | | |[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| +|Microsoft|Azure Application Gateway| | |Not vuln| | ||[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| |Microsoft|Azure Data Lake Store Java|< 2.3.10|Not vuln|Not vuln|Not vuln|Not vuln|Fix has been made to upgrade log4j-core. But this dependency has scope 'test' meaning it is not part of the final product/artifact. So there's no risk for end users here.|[source](https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310)| -|Microsoft|Azure DevOps| | |Not vuln| | | |[source](https://devblogs.microsoft.com/devops/azure-devops-and-azure-devops-server-and-the-log4j-vulnerability/?WT.mc_id=DOP-MVP-5001511)| +|Microsoft|Azure DevOps| | |Not vuln| | ||[source](https://devblogs.microsoft.com/devops/azure-devops-and-azure-devops-server-and-the-log4j-vulnerability/?WT.mc_id=DOP-MVP-5001511)| |Microsoft|Azure DevOps Server|2019-2020.1| |Vulnerable| | |When Azure DevOps Server Search is configured. Uses Elasticsearch OSS 6.2.4 (vulnerable) see Elasticsearch above for mitigation|[source](https://devblogs.microsoft.com/devops/azure-devops-and-azure-devops-server-and-the-log4j-vulnerability/?WT.mc_id=DOP-MVP-5001511)| -|Microsoft|Azure Front Door| | |Not vuln| | | |[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| -|Microsoft|Azure Traffic Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[Microsoft’s Response to CVE-2021-44228 Apache Log4j 2](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| -|Microsoft|Azure WAF| | |Not vuln| | | |[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| -|Microsoft|Cosmos DB Kafka Connector|1.2.1| |Fix| | | |[source](https://github.com/microsoft/kafka-connect-cosmosdb/releases/tag/v1.2.1)| -|Microsoft|Defender for IoT|10.5.2|Not vuln|Fix| | | |[source](https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes#october-2021)| -|Microsoft|Events Hub Extension|3.3.1| |Fix| | | |[source](https://mvnrepository.com/artifact/com.microsoft.azure/azure-eventhubs-extensions/3.3.1)| -|Microsoft|Kafka Connect for Azure Cosmo DB|< 1.2.1|Not vuln|Fix| | | |[source](https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md)| -|Microsoft|Minecraft Java Edition|1.18.1|Not vuln|Fix| | | |[source](https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition) [fix](https://www.minecraft.net/en-us/article/minecraft-java-edition-1-18-1)| +|Microsoft|Azure Front Door| | |Not vuln| | ||[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| +|Microsoft|Azure Traffic Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[Microsoft’s Response to CVE-2021-44228 Apache Log4j 2](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| +|Microsoft|Azure WAF| | |Not vuln| | ||[source](https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/)| +|Microsoft|Cosmos DB Kafka Connector|1.2.1| |Fix| | ||[source](https://github.com/microsoft/kafka-connect-cosmosdb/releases/tag/v1.2.1)| +|Microsoft|Defender for IoT|10.5.2|Not vuln|Fix| | ||[source](https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes#october-2021)| +|Microsoft|Events Hub Extension|3.3.1| |Fix| | ||[source](https://mvnrepository.com/artifact/com.microsoft.azure/azure-eventhubs-extensions/3.3.1)| +|Microsoft|Kafka Connect for Azure Cosmo DB|< 1.2.1|Not vuln|Fix| | ||[source](https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md)| +|Microsoft|Minecraft Java Edition|1.18.1|Not vuln|Fix| | ||[source](https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition) [fix](https://www.minecraft.net/en-us/article/minecraft-java-edition-1-18-1)| |Microsoft|Team Foundation Server|2018.2+| |Vulnerable| | |When Team Foundation Server Search is configured. Uses Elasticsearch OSS 5.4.1 (vulnerable) see Elasticsearch above for mitigation|[source](https://devblogs.microsoft.com/devops/azure-devops-and-azure-devops-server-and-the-log4j-vulnerability/?WT.mc_id=DOP-MVP-5001511)| |MicroStrategy|Secure Enterprise|11.1.7+ 11.2.x 11.3.x|Not vuln|Workaround| | |Workaround available, Update scheduled for Week 51/2021|[source](https://community.microstrategy.com/s/article/MicroStrategy-s-response-to-CVE-2021-44228-The-Log4j-0-Day-Vulnerability?language=en_US)| |MIDITEC|All| |Not vuln|Not vuln|Not vuln|Not vuln|MTZ Time uses Log4j v1.x|[source](https://www.miditec.de/_download/files/information/Entwarnung%20-%20Schwachstelle.pdf)| -|Midori Global|All| | | | | | |[Midori Global Statement](https://www.midori-global.com/blog/2021/12/15/cve-2021-44228-log4shell-midori-apps-are-not-affected)| -|Mikrotik|All| | | | | | |[Mikrotik Statement](https://forum.mikrotik.com/viewtopic.php?p=897938)| -|Milestone|VMS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US)| -|Milestone sys|All| | | | | | |[Milestone sys Statement](https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US)| -|Mimecast|All| | | | | | |[Mimecast Information](https://community.mimecast.com/s/article/Mimecast-Information-for-Customers-on-the-Log4Shell-Vulnerability)| -|Minecraft|All| | | | | | |[Minecraft Vulnerability Message](https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition)| -|Mirantis|Container Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| -|Mirantis|Container Runtime|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| -|Mirantis|K0s|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| -|Mirantis|Kubernetes Engine|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| -|Mirantis|Lens|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| -|Mirantis|OpenStack|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| -|Mirantis|Secure Registry|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| -|Miro|All| | | | | | |[Miro Log4j Updates](https://miro.com/trust/updates/log4j/)| -|MISP|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://twitter.com/MISPProject/status/1470051242038673412)| -|Mitel|CMG Suite|All| |Investigation| | | |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|InAttend|All| |Investigation| | | |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Midori Global|All| | | | | ||[Midori Global Statement](https://www.midori-global.com/blog/2021/12/15/cve-2021-44228-log4shell-midori-apps-are-not-affected)| +|Mikrotik|All| | | | | ||[Mikrotik Statement](https://forum.mikrotik.com/viewtopic.php?p=897938)| +|Milestone|VMS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US)| +|Milestone sys|All| | | | | ||[Milestone sys Statement](https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US)| +|Mimecast|All| | | | | ||[Mimecast Information](https://community.mimecast.com/s/article/Mimecast-Information-for-Customers-on-the-Log4Shell-Vulnerability)| +|Minecraft|All| | | | | ||[Minecraft Vulnerability Message](https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition)| +|Mirantis|Container Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| +|Mirantis|Container Runtime|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| +|Mirantis|K0s|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| +|Mirantis|Kubernetes Engine|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| +|Mirantis|Lens|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| +|Mirantis|OpenStack|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| +|Mirantis|Secure Registry|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md)| +|Miro|All| | | | | ||[Miro Log4j Updates](https://miro.com/trust/updates/log4j/)| +|MISP|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://twitter.com/MISPProject/status/1470051242038673412)| +|Mitel|CMG Suite|All| |Investigation| | ||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|InAttend|All| |Investigation| | ||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| |Mitel|Interaction Recording (MIR)|6.3 to 6.7|Not vuln|Fix| | |see SA211213-17|[source](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_21-0010-001.pdf)| -|Mitel|Management Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|Management Portal|All| |Investigation| | | |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiCollab|>=7.1 to <=9.4|Not vuln|Workaround|Workaround| |"Below v7.0 not vuln, Fix"|[source](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_21-0010-002-v4.pdf)| -|Mitel|MiContact Center Enterprise|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiContact Center Business|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiVoice 5000|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiVoice Border Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiVoice Business|All (excluding EX)|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiVoice Business EX and MiConfig Wizard|9.2 only|Not vuln|Fix| | | |[source](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_21-0010-004.pdf)| -|Mitel|MiVoice Call Recording|All| |Investigation| | | |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiVoice Connect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|MiVoice MX-ONE|7.4 only|Not vuln|Fix| | | |[source](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_21-0010-003.pdf)| -|Mitel|MiVoice Office 400|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|Mobility Router|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|Open Integration Gateway (OIG)|All| |Investigation| | | |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|Performance Analytics Server and Probe|All| |Investigation| | | |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|Standard Linux (MSL)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitel|Virtual Reception|All| |Investigation| | | |[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| -|Mitsubishi|CS-141|Not vuln|Not vuln|Not vuln|Not vuln| |"source"|| -|Mitsubishi|LookUPS N002|Not vuln|Not vuln|Not vuln|Not vuln| |"source"|| -|Mitsubishi|LookUPS N003|Not vuln|Not vuln|Not vuln|Not vuln| |"source"|| -|Mitsubishi|MUCM|Not vuln|Not vuln|Not vuln|Not vuln| |"source"|| -|Mitsubishi|Netcom|Not vuln|Not vuln|Not vuln|Not vuln| |"source"|| -|Mitsubishi|Netcom 2| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://user-images.githubusercontent.com/89155495/146846042-4c923ea4-58ec-452f-94b2-6a1aa7918ece.png)| +|Mitel|Management Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|Management Portal|All| |Investigation| | ||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiCollab|>=7.1 to <=9.4|Not vuln|Workaround|Workaround| |Below v7.0 not vuln, https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/log4j_micollab_remediation_details.pdf Fix|[source](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_21-0010-002-v4.pdf)| +|Mitel|MiContact Center Enterprise|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiContact Center Business|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiVoice 5000|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiVoice Border Gateway|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiVoice Business|All (excluding EX)|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiVoice Business EX and MiConfig Wizard|9.2 only|Not vuln|Fix| | ||[source](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_21-0010-004.pdf)| +|Mitel|MiVoice Call Recording|All| |Investigation| | ||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiVoice Connect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|MiVoice MX-ONE|7.4 only|Not vuln|Fix| | ||[source](https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_21-0010-003.pdf)| +|Mitel|MiVoice Office 400|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|Mobility Router|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|Open Integration Gateway (OIG)|All| |Investigation| | ||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|Performance Analytics Server and Probe|All| |Investigation| | ||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|Standard Linux (MSL)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitel|Virtual Reception|All| |Investigation| | ||[source](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010)| +|Mitsubishi|CS-141|Not vuln|Not vuln|Not vuln|Not vuln| |https://user-images.githubusercontent.com/89155495/146846042-4c923ea4-58ec-452f-94b2-6a1aa7918ece.png|| +|Mitsubishi|LookUPS N002|Not vuln|Not vuln|Not vuln|Not vuln| |https://user-images.githubusercontent.com/89155495/146846042-4c923ea4-58ec-452f-94b2-6a1aa7918ece.png|| +|Mitsubishi|LookUPS N003|Not vuln|Not vuln|Not vuln|Not vuln| |https://user-images.githubusercontent.com/89155495/146846042-4c923ea4-58ec-452f-94b2-6a1aa7918ece.png|| +|Mitsubishi|MUCM|Not vuln|Not vuln|Not vuln|Not vuln| |https://user-images.githubusercontent.com/89155495/146846042-4c923ea4-58ec-452f-94b2-6a1aa7918ece.png|| +|Mitsubishi|Netcom|Not vuln|Not vuln|Not vuln|Not vuln| |https://user-images.githubusercontent.com/89155495/146846042-4c923ea4-58ec-452f-94b2-6a1aa7918ece.png|| +|Mitsubishi|Netcom 2| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://user-images.githubusercontent.com/89155495/146846042-4c923ea4-58ec-452f-94b2-6a1aa7918ece.png)| |MobileIron|Core|All|Not vuln|Fix| | |The mitigation instructions listed in a subsequent section removes a vulnerable Java class (JNDILookUp.class) from the affected Log4J Java library and as a result removes the ability to perform the RCE attack. The workaround needs to be applied in a maintenance window. You will not be able to access the admin portal during the procedure, however, end user devices will continue to function.|[source](https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US)| |MobileIron|Core Connector|All|Not vuln|Fix| | |The mitigation instructions listed in a subsequent section removes a vulnerable Java class (JNDILookUp.class) from the affected Log4J Java library and as a result removes the ability to perform the RCE attack. The workaround needs to be applied in a maintenance window. You will not be able to access the admin portal during the procedure, however, end user devices will continue to function.|[source](https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US)| |MobileIron|Reporting Database (RDB)|All|Not vuln|Fix| | |The mitigation instructions listed in a subsequent section removes a vulnerable Java class (JNDILookUp.class) from the affected Log4J Java library and as a result removes the ability to perform the RCE attack. The workaround needs to be applied in a maintenance window. You will not be able to access the admin portal during the procedure, however, end user devices will continue to function.|[source](https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US)| |MobileIron|Sentry|9.13, 9.14|Not vuln|Fix| | |The mitigation instructions listed in a subsequent section removes a vulnerable Java class (JNDILookUp.class) from the affected Log4J Java library and as a result removes the ability to perform the RCE attack. The workaround needs to be applied in a maintenance window. You will not be able to access the admin portal during the procedure, however, end user devices will continue to function.|[source](https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US)| -|MONARC|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://twitter.com/MONARCproject/status/1470349937443491851)| -|MongoDB|All other components of MongoDB Atlas (including Atlas Database, Data Lake, Charts)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| +|MONARC|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://twitter.com/MONARCproject/status/1470349937443491851)| +|MongoDB|All other components of MongoDB Atlas (including Atlas Database, Data Lake, Charts)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| |MongoDB|Atlas| |Not vuln|Not vuln|Not vuln|Not vuln|Including Atlas Database, Data Lake, Charts|[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| |MongoDB|Atlas Search| |Not vuln|Fix| | |Affected and patched. No evidence of exploitation or indicators of compromise prior to the patch were discovered.|[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| |MongoDB|Community Edition| |Not vuln|Not vuln|Not vuln|Not vuln|Including Community Server, Cloud Manager, Community Kubernetes Operators.|[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| -|MongoDB|Community Edition (including Community Server, Cloud Manager, Community Kubernetes Operators)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| -|MongoDB|Drivers| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| +|MongoDB|Community Edition (including Community Server, Cloud Manager, Community Kubernetes Operators)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| +|MongoDB|Drivers| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| |MongoDB|Enterprise Advanced| |Not vuln|Not vuln|Not vuln|Not vuln|Including Enterprise Server, Ops Manager, Enterprise Kubernetes Operators.|[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| -|MongoDB|Enterprise Advanced (including Enterprise Server, Ops Manager, Enterprise Kubernetes Operators)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| +|MongoDB|Enterprise Advanced (including Enterprise Server, Ops Manager, Enterprise Kubernetes Operators)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| |MongoDB|Realm| |Not vuln|Not vuln|Not vuln|Not vuln|including Realm Database, Sync, Functions, APIs|[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| -|MongoDB|Realm (including Realm Database, Sync, Functions, APIs)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| +|MongoDB|Realm (including Realm Database, Sync, Functions, APIs)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| |MongoDB|Tools| |Not vuln|Not vuln|Not vuln|Not vuln|Including Compass, Database Shell, VS Code Plugin, Atlas CLI, Database Connectors|[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| -|MongoDB|Tools (including Compass, Database Shell, VS Code Plugin, Atlas CLI, Database Connectors)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| -|Moodle|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://moodle.org/mod/forum/discuss.php?d=429966)| -|MoogSoft|All| | | | | | |[MoogSoft Vulnerability Information](https://servicedesk.moogsoft.com/hc/en-us/articles/4412463233811?input_string=log4j+vulnerability+%7C%7C+cve-2021-44228)| -|Motorola Avigilon|All| | | | | | |[Motorola Avigilon Technical Notification](https://support.avigilon.com/s/article/Technical-Notification-Apache-Log4j2-vulnerability-impact-on-Avigilon-products-CVE-2021-44228?language=en_US)| -|Moxa|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.moxa.com/en/support/product-support/security-advisory/moxa-s-response-regarding-the-apache-log4j-vulnerability)| +|MongoDB|Tools (including Compass, Database Shell, VS Code Plugin, Atlas CLI, Database Connectors)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb)| +|Moodle|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://moodle.org/mod/forum/discuss.php?d=429966)| +|MoogSoft|All| | | | | ||[MoogSoft Vulnerability Information](https://servicedesk.moogsoft.com/hc/en-us/articles/4412463233811?input_string=log4j+vulnerability+%7C%7C+cve-2021-44228)| +|Motorola Avigilon|All| | | | | ||[Motorola Avigilon Technical Notification](https://support.avigilon.com/s/article/Technical-Notification-Apache-Log4j2-vulnerability-impact-on-Avigilon-products-CVE-2021-44228?language=en_US)| +|Moxa|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.moxa.com/en/support/product-support/security-advisory/moxa-s-response-regarding-the-apache-log4j-vulnerability)| |Mulesoft|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[Mulesoft Statement](https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021)| |Mulesoft|Anypoint Studio|7.x|Not vuln|Fix| | |This advisory is available to account holders only and has not been reviewed by CISA.|[Apache Log4j2 vulnerability - December 2021](https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021)| |Mulesoft|Cloudhub| |Not vuln|Fix| | |This advisory is available to account holders only and has not been reviewed by CISA.|[Apache Log4j2 vulnerability - December 2021](https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021)| diff --git a/software/software_list_n.md b/software/software_list_n.md index 196a2bd4c..0a89af4a8 100644 --- a/software/software_list_n.md +++ b/software/software_list_n.md @@ -7,121 +7,122 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|N-able|Backup| | |Not vuln| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|N-able|Mail Assure| | |Not vuln| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|N-able|MSP Manager| | |Not vuln| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|N-able|N-central| | |Not vuln| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|N-able|Passportal| | |Not vuln| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|N-able|Risk Intelligence| | |Vulnerable| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|N-able|RMM| |Not vuln|Fix| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|N-able|Take Control| | |Not vuln| | | |[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| -|Nagios|Core| | |Not vuln| | | |[source](https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/)| -|Nagios|Log Server| | |Not vuln| | | |[source](https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/)| -|Nagios|XI| | |Not vuln| | | |[source](https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/)| -|Nakivo|Backup & Replication| |Not vuln|Workaround| | |"manual fix by removing JndiLookup.class located in libs\log4j-core-2.2.jar. source"|[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/nakivo_email.png)| +|National Instruments|OptimalPlus|Vertica, Cloudera, Logstash| |Vulnerable| | |(Limited to deployments running Vertica, Cloudera, or Logstash) Contact Technical Support|[link](https://www.ni.com/en-us/support/documentation/supplemental/21/ni-response-to-apache-log4j-vulnerability-.html)| +|N-able|Backup| | |Not vuln| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|N-able|Mail Assure| | |Not vuln| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|N-able|MSP Manager| | |Not vuln| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|N-able|N-central| | |Not vuln| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|N-able|Passportal| | |Not vuln| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|N-able|Risk Intelligence| | |Vulnerable| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|N-able|RMM| |Not vuln|Fix| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|N-able|Take Control| | |Not vuln| | ||[source](https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability)| +|Nagios|Core| | |Not vuln| | ||[source](https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/)| +|Nagios|Log Server| | |Not vuln| | ||[source](https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/)| +|Nagios|XI| | |Not vuln| | ||[source](https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/)| +|Nakivo|Backup & Replication| |Not vuln|Workaround| | |manual fix by removing JndiLookup.class located in libs\log4j-core-2.2.jar. https://forum.nakivo.com/index.php?/topic/7574-log4j-cve-2021-44228/#comment-9145|[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/nakivo_email.png)| |Nelson|All|0.16.185| |Vulnerable| | |Workaround is available, but not released yet.|[source](https://github.com/getnelson/nelson/blob/f4d3dd1f1d4f8dfef02487f67aefb9c60ab48bf5/project/custom.scala)| -|Neo4j|All|>=4.2.12, >=4.3.8, >=4.4.1|Not vuln|Fix| | | |"[source](https://community.neo4j.com/t/log4j-cve-mitigation-for-neo4j/48856) [source_fix](https://neo4j.com/security/log4j/?_gl=1*21owwo*_ga*MjE0NzMyNTYxMy4xNjM4MTE2NTM0*_ga_DL38Q8KGQC*MTYzOTY1NTgyMS4yNS4wLjE2Mzk2NTU4MjEuMA..&_ga=2.221851932.50302124.1639655825-2147325613.1638116534)"| -|Neo4j|Graph Database|Version >4.2, <4..2.12| |Vulnerable| | | || -|NetApp|Brocade SAN Naviator| | |Vulnerable| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|Cloud Insights Acquisition Unit| | |Vulnerable| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|Cloud Manager| | |Vulnerable| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|Cloud Secure| | |Vulnerable| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|Element Plug-in for vCenter Server| | |Not vuln| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|HCI Compute Node| | |Not vuln| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|Management Services for Element Software and NetApp HCI| | |Not vuln| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|Multiple NetApp products| | |Vulnerable| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|OnCommand Insight| | |Vulnerable| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|ONTAP Tools for VMware vSphere| | |Vulnerable| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|SnapCenter Plug-in for VMware vSphere| |Not vuln|Workaround| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/#:~:text=Workarounds-,snapleft%20plug-in%20for%20vmware%20vsphere)| -|NetApp|SolidFire & HCI Management Node| | |Not vuln| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|SolidFire Plug-in for vRealize Orchestrator (SolidFire vRO)| | |Not vuln| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|SolidFire, Enterprise SDS & HCI Storage| | |Not vuln| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetApp|SolidFireStorage Replication Adapter| | |Not vuln| | | |[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| -|NetCore|Unimus|2.1.4|Not vuln|Fix| | | |[source](https://download.unimus.net/unimus/Changelog.txt)| -|Netcup|All| | | | | | |[Netcup Statement](https://www.netcup-news.de/2021/12/14/pruefung-log4j-sicherheitsluecken-abgeschlossen/)| -|Netflix|atlas|1.6.6|Not vuln|Workaround| | | |[source](https://github.com/Netflix/atlas/commit/5baff2b656a45886b85968a4b66f33bd36c648be)| -|Netflix|dgs-framework|< 4.9.11|Not vuln|Fix| | | |[source](https://github.com/Netflix/dgs-framework/releases/tag/v4.9.11)| -|Netflix|spectator|< 1.0.9|Not vuln|Fix| | | |[source](https://github.com/Netflix/spectator/releases/tag/v1.0.9)| -|Netflix|zuul| |Not vuln|Workaround| | | |[source](https://github.com/Netflix/zuul/commit/280f20cd51deb7e72275625d5ec556aae06f6a29)| -|Netgate|pfSense|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forum.netgate.com/topic/168417/java-log4j-vulnerability-is-pfsense-affected)| -|NetGate PFSense|All| | | | | | |[NetGate PFSense Forum](https://forum.netgate.com/topic/168417/java-log4j-vulnerability-is-pfsense-affected/35)| -|Netgear|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.netgear.com/t5/Smart-Plus-and-Smart-Pro-Managed/Has-Netgear-GS748TS-been-affected-by-Log4J/m-p/2173582#M19998)| -|NetIQ|Access Manager|>= 4.5.x & >= 5.0.x|Not vuln|Workaround| | | |[source](https://portal.microfocus.com/s/article/KM000002997)| -|NetIQ|Advanced Authentication|>= 6.x|Not vuln|Workaround| | | |[source](https://portal.microfocus.com/s/article/KM000003047)| -|NetIQ|eDirectory|>= 9.2.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://portal.microfocus.com/s/article/KM000003035)| -|NetIQ|Identity Manager|>= 4.7.x & >= 4.8.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://portal.microfocus.com/s/article/KM000003035)| -|NetIQ|iManager|>= 3.2.x|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://portal.microfocus.com/s/article/KM000003035)| -|Netwrix|Auditor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](http://www.publicnow.com/view/EA90CB461F5F0A1BA339E2AC55C719CA5AD58CE4)| -|New Relic|Containerized Private Minion (CPM)|3.0.55|Not vuln|Fix| | | |[source](https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-04/)| -|New Relic|Java Agent|6.5.1 & 7.4.1|Not vuln|Fix| | | |[source](https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-03/)| +|Neo4j|All|>=4.2.12, >=4.3.8, >=4.4.1|Not vuln|Fix| | ||[source](https://community.neo4j.com/t/log4j-cve-mitigation-for-neo4j/48856) [source_fix](https://neo4j.com/security/log4j/?_gl=1*21owwo*_ga*MjE0NzMyNTYxMy4xNjM4MTE2NTM0*_ga_DL38Q8KGQC*MTYzOTY1NTgyMS4yNS4wLjE2Mzk2NTU4MjEuMA..&_ga=2.221851932.50302124.1639655825-2147325613.1638116534)| +|Neo4j|Graph Database|Version >4.2, <4..2.12| |Vulnerable| | ||| +|NetApp|Brocade SAN Naviator| | |Vulnerable| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|Cloud Insights Acquisition Unit| | |Vulnerable| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|Cloud Manager| | |Vulnerable| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|Cloud Secure| | |Vulnerable| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|Element Plug-in for vCenter Server| | |Not vuln| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|HCI Compute Node| | |Not vuln| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|Management Services for Element Software and NetApp HCI| | |Not vuln| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|Multiple NetApp products| | |Vulnerable| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|OnCommand Insight| | |Vulnerable| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|ONTAP Tools for VMware vSphere| | |Vulnerable| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|SnapCenter Plug-in for VMware vSphere| |Not vuln|Workaround| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/#:~:text=Workarounds-,snapleft%20plug-in%20for%20vmware%20vsphere)| +|NetApp|SolidFire & HCI Management Node| | |Not vuln| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|SolidFire Plug-in for vRealize Orchestrator (SolidFire vRO)| | |Not vuln| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|SolidFire, Enterprise SDS & HCI Storage| | |Not vuln| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetApp|SolidFireStorage Replication Adapter| | |Not vuln| | ||[source](https://security.netapp.com/advisory/ntap-20211210-0007/)| +|NetCore|Unimus|2.1.4|Not vuln|Fix| | ||[source](https://download.unimus.net/unimus/Changelog.txt)| +|Netcup|All| | | | | ||[Netcup Statement](https://www.netcup-news.de/2021/12/14/pruefung-log4j-sicherheitsluecken-abgeschlossen/)| +|Netflix|atlas|1.6.6|Not vuln|Workaround| | ||[source](https://github.com/Netflix/atlas/commit/5baff2b656a45886b85968a4b66f33bd36c648be)| +|Netflix|dgs-framework|< 4.9.11|Not vuln|Fix| | ||[source](https://github.com/Netflix/dgs-framework/releases/tag/v4.9.11)| +|Netflix|spectator|< 1.0.9|Not vuln|Fix| | ||[source](https://github.com/Netflix/spectator/releases/tag/v1.0.9)| +|Netflix|zuul| |Not vuln|Workaround| | ||[source](https://github.com/Netflix/zuul/commit/280f20cd51deb7e72275625d5ec556aae06f6a29)| +|Netgate|pfSense|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forum.netgate.com/topic/168417/java-log4j-vulnerability-is-pfsense-affected)| +|NetGate PFSense|All| | | | | ||[NetGate PFSense Forum](https://forum.netgate.com/topic/168417/java-log4j-vulnerability-is-pfsense-affected/35)| +|Netgear|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.netgear.com/t5/Smart-Plus-and-Smart-Pro-Managed/Has-Netgear-GS748TS-been-affected-by-Log4J/m-p/2173582#M19998)| +|NetIQ|Access Manager|>= 4.5.x & >= 5.0.x|Not vuln|Workaround| | ||[source](https://portal.microfocus.com/s/article/KM000002997)| +|NetIQ|Advanced Authentication|>= 6.x|Not vuln|Workaround| | ||[source](https://portal.microfocus.com/s/article/KM000003047)| +|NetIQ|eDirectory|>= 9.2.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://portal.microfocus.com/s/article/KM000003035)| +|NetIQ|Identity Manager|>= 4.7.x & >= 4.8.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://portal.microfocus.com/s/article/KM000003035)| +|NetIQ|iManager|>= 3.2.x|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://portal.microfocus.com/s/article/KM000003035)| +|Netwrix|Auditor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](http://www.publicnow.com/view/EA90CB461F5F0A1BA339E2AC55C719CA5AD58CE4)| +|New Relic|Containerized Private Minion (CPM)|3.0.55|Not vuln|Fix| | ||[source](https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-04/)| +|New Relic|Java Agent|6.5.1 & 7.4.1|Not vuln|Fix| | ||[source](https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-03/)| |NextCloud|All| |Not vuln|Not vuln|Not vuln|Not vuln|Invidivual plugins not developed as part of Nextcloud core may be vulnerable.|[source](https://help.nextcloud.com/t/apache-log4j-does-not-affect-nextcloud/129244)| -|Nextflow|All|21.04.0.5552|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.nextflow.io/docs/latest/index.html)| -|NextGen Healthcare|Mirth| | |Not vuln| | | |[source](https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526)| -|Nexus Group|All| | | | | | |[Nexus Group Docs](https://doc.nexusgroup.com/pages/viewpage.action?pageId=83133294)| -|NI (National Instruments)|All| | | | | | |[NI Support Link](https://www.ni.com/en-us/support/documentation/supplemental/21/ni-response-to-apache-log4j-vulnerability-.html)| -|Nice Software (AWS) EnginFRAME|All| | | | | | |[Nice Software EnginFRAME Link](https://download.enginframe.com/)| -|NiceLabel|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://help.nicelabel.com/hc/en-001/articles/4413846986385-Apache-Log4j-Vulnerability-Log4Shell-CVE-2021-44228-does-not-affect-NiceLabel-applications)| +|Nextflow|All|21.04.0.5552|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.nextflow.io/docs/latest/index.html)| +|NextGen Healthcare|Mirth| | |Not vuln| | ||[source](https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526)| +|Nexus Group|All| | | | | ||[Nexus Group Docs](https://doc.nexusgroup.com/pages/viewpage.action?pageId=83133294)| +|NI (National Instruments)|All| | | | | ||[NI Support Link](https://www.ni.com/en-us/support/documentation/supplemental/21/ni-response-to-apache-log4j-vulnerability-.html)| +|Nice Software (AWS) EnginFRAME|All| | | | | ||[Nice Software EnginFRAME Link](https://download.enginframe.com/)| +|NiceLabel|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://help.nicelabel.com/hc/en-001/articles/4413846986385-Apache-Log4j-Vulnerability-Log4Shell-CVE-2021-44228-does-not-affect-NiceLabel-applications)| |NinjaRMM|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[NinjaRMM Article](https://ninjarmm.zendesk.com/hc/en-us/articles/4416226194189-12-10-21-Security-Declaration-NinjaOne-not-affected-by-CVE-2021-44228-log4j-)| -|Nomachine|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forums.nomachine.com/topic/apache-log4j-notification)| -|NoviFlow|All| | | | | | |[Noviflow Link](https://noviflow.com/noviflow-products-and-the-log4shell-exploit-cve-2021-44228/)| -|NSA|Ghidra|< 10.1|Not vuln|Fix| | | |[source](https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning) [fix](https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_10.1_build)| -|Nulab|Backlog|N/A (SaaS)|Not vuln|Fix|Fix|Fix| |[source](https://nulab.com/blog/company-news/log4shell/)| -|Nulab|Backlog Enterprise (On-premises)|1.11.7|Not vuln|Fix|Fix|Fix| |[source](https://nulab.com/blog/company-news/log4shell/)| -|Nulab|Cacoo|N/A (SaaS)|Not vuln|Fix|Fix|Fix| |[source](https://nulab.com/blog/company-news/log4shell/)| -|Nulab|Cacoo Enterprise (On-premises)|4.0.4|Not vuln|Fix|Fix|Fix| |[source](https://nulab.com/blog/company-news/log4shell/)| -|Nulab|Typetalk|N/A (SaaS)|Not vuln|Fix|Fix|Fix| |[source](https://nulab.com/blog/company-news/log4shell/)| -|Nutanix|AHV|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|AOS|LTS (including Prism Element), Community Edition|Not vuln|Not vuln|Not vuln|Not vuln| |[Nutanix Security Advisory](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nomachine|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forums.nomachine.com/topic/apache-log4j-notification)| +|NoviFlow|All| | | | | ||[Noviflow Link](https://noviflow.com/noviflow-products-and-the-log4shell-exploit-cve-2021-44228/)| +|NSA|Ghidra|< 10.1|Not vuln|Fix| | ||[source](https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning) [fix](https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_10.1_build)| +|Nulab|Backlog|N/A (SaaS)|Not vuln|Fix|Fix|Fix||[source](https://nulab.com/blog/company-news/log4shell/)| +|Nulab|Backlog Enterprise (On-premises)|1.11.7|Not vuln|Fix|Fix|Fix||[source](https://nulab.com/blog/company-news/log4shell/)| +|Nulab|Cacoo|N/A (SaaS)|Not vuln|Fix|Fix|Fix||[source](https://nulab.com/blog/company-news/log4shell/)| +|Nulab|Cacoo Enterprise (On-premises)|4.0.4|Not vuln|Fix|Fix|Fix||[source](https://nulab.com/blog/company-news/log4shell/)| +|Nulab|Typetalk|N/A (SaaS)|Not vuln|Fix|Fix|Fix||[source](https://nulab.com/blog/company-news/log4shell/)| +|Nutanix|AHV|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|AOS|LTS (including Prism Element), Community Edition|Not vuln|Not vuln|Not vuln|Not vuln||[Nutanix Security Advisory](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|AOS|STS (including Prism Element)|Not vuln|Fix| | |Patched in 6.0.2.4, available on the Portal for|[Nutanix Security Advisory](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|AOS (Community Edition)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|AOS (LTS)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|AOS (Community Edition)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|AOS (LTS)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|AOS (STS)|All|Not vuln|Workaround|Workaround|Vulnerable|Non exploitable dormant code present, Patch 6.0.2.4 will remove dormant code|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Beam|SaaS|Not vuln|Fix|Fix|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|BeamGov|SaaS|Not vuln|Fix|Fix|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Calm|All|Not vuln|Not vuln|Not vuln|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Beam|SaaS|Not vuln|Fix|Fix|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|BeamGov|SaaS|Not vuln|Fix|Fix|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Calm|All|Not vuln|Not vuln|Not vuln|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|Calm|SaaS|Not vuln|Vulnerable|Vulnerable|Vulnerable|WAF updated to block exploit, backend patch pending|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Calm Tunnel VM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Collector|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Collector Portal|SaaS|Not vuln|Fix|Fix|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Calm Tunnel VM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Collector|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Collector Portal|SaaS|Not vuln|Fix|Fix|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|Data Lens|SaaS|Not vuln|Not vuln|Not vuln|Not vuln|WAF updated to block exploit|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Era|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|File Analytics|2.1.x, 2.2.x, 3.0+| |Vulnerable| | |"Mitigated in version 3.0.1 which is available on the Portal for download. Mitigation is available here"|[Nutanix Security Advisory](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Files|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Flow|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Era|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|File Analytics|2.1.x, 2.2.x, 3.0+| |Vulnerable| | |Mitigated in version 3.0.1 which is available on the Portal for download. Mitigation is available https://portal.nutanix.com/kb/12499 here|[Nutanix Security Advisory](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Files|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Flow|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|Flow Security Cental| |Not vuln|Fix| | |Saas-Based Procuct. See Advisory.|[Nutanix Security Advisory](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Flow Security Central|SaaS|Not vuln|Fix|Fix|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Foundation|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Frame|SaaS|Not vuln|Fix|Fix|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|FrameGov|SaaS|Not vuln|Fix|Fix|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|FSCVM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Flow Security Central|SaaS|Not vuln|Fix|Fix|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Foundation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Frame|SaaS|Not vuln|Fix|Fix|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|FrameGov|SaaS|Not vuln|Fix|Fix|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|FSCVM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|General Guidance| | | | | |Nutanix updating Security Advisory #23 multiple times per day, please check source link for absolute latest status|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|Insights|SaaS|Not vuln|Not vuln|Not vuln|Not vuln|WAF updated to block exploit|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Karbon|All|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://portal.nutanix.com/kb/12483)| +|Nutanix|Karbon|All|Not vuln|Workaround|Workaround|Vulnerable||[source](https://portal.nutanix.com/kb/12483)| |Nutanix|Karbon Platform Service|SaaS|Not vuln|Vulnerable|Vulnerable|Vulnerable|WAF updated to block exploit, Patch is verifying|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|LCM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|LCM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| |Nutanix|Leap|SaaS|Not vuln|Vulnerable|Vulnerable|Vulnerable|WAF updated to block exploit, Patch is pending|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Mine|All|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://portal.nutanix.com/kb/12484)| -|Nutanix|Move|All|Not vuln|Not vuln|Not vuln|Not vuln|"source"|| -|Nutanix|MSP|All|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://portal.nutanix.com/kb/12482)| -|Nutanix|NCC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|NGT|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Objects|All|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://portal.nutanix.com/kb/12482)| +|Nutanix|Mine|All|Not vuln|Workaround|Workaround|Vulnerable||[source](https://portal.nutanix.com/kb/12484)| +|Nutanix|Move|All|Not vuln|Not vuln|Not vuln|Not vuln|https://download.nutanix.com/alerts/Security_Advisory_0023.pdf|| +|Nutanix|MSP|All|Not vuln|Workaround|Workaround|Vulnerable||[source](https://portal.nutanix.com/kb/12482)| +|Nutanix|NCC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|NGT|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Objects|All|Not vuln|Workaround|Workaround|Vulnerable||[source](https://portal.nutanix.com/kb/12482)| |Nutanix|Prism Central|All|Not vuln|Vulnerable|Vulnerable|Vulnerable|Release pending|[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Sizer|SaaS|Not vuln|Fix|Fix|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Volumes|All|Not vuln|Not vuln|Not vuln|Vulnerable| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -|Nutanix|Witness VM|All|Not vuln|Workaround|Workaround|Vulnerable| |[source](https://portal.nutanix.com/kb/12491)| -|Nutanix|X-Ray|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| -| NVIDIA | CUDA Toolkit Nsight Eclipse Edition | 11.0 | Not vuln | Fix | Fix | | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | CUDA Toolkit Visual Profiler | 11.5 and Prior | | Vulnerable | Vulnerable | | Updated CUDA Toolkit version available mid-January 2022 | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | DGX systems | DGX OS 4 and DGX OS 5 | Not vuln | Fix | Fix | Fix | Updates can be installed through the package manager | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | GeForce Experience client software | | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | GeForceNOW client software | | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | GPU Display Drivers for Windows and Linux | | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | L4T Jetson Products | | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | NetQ | 4.1.0 | | Fix | Fix | Fix | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | Networking products | All (except for NetQ) | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | NVIDIA Broadcast | All | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | NVIDIA Maxine | All | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | SHIELD TV | | | Not vuln | Not vuln | Not vuln | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -| NVIDIA | vGPU software license server | 2021.7 and 2020.5 Update 1 | | Workaround | Workaround | Workaround | | [source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294) | -|NXLog|Manager|5.x| |Not vuln| | | |[source](https://nxlog.co/news/apache-log4j-vulnerability-cve-2021-44228)| +|Nutanix|Sizer|SaaS|Not vuln|Fix|Fix|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Volumes|All|Not vuln|Not vuln|Not vuln|Vulnerable||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|Nutanix|Witness VM|All|Not vuln|Workaround|Workaround|Vulnerable||[source](https://portal.nutanix.com/kb/12491)| +|Nutanix|X-Ray|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://download.nutanix.com/alerts/Security_Advisory_0023.pdf)| +|NVIDIA|CUDA Toolkit Nsight Eclipse Edition|11.0|Not vuln|Fix|Fix| ||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|CUDA Toolkit Visual Profiler|11.5 and Prior| |Vulnerable|Vulnerable| |Updated CUDA Toolkit version available mid-January 2022|[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|DGX systems|DGX OS 4 and DGX OS 5|Not vuln|Fix|Fix|Fix|Updates can be installed through the package manager|[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|GeForce Experience client software| | |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|GeForceNOW client software| | |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|GPU Display Drivers for Windows and Linux| | |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|L4T Jetson Products| | |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|NetQ|4.1.0| |Fix|Fix|Fix||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|Networking products|All (except for NetQ)| |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|Broadcast|All| |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|Maxine|All| |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|SHIELD TV| | |Not vuln|Not vuln|Not vuln||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NVIDIA|vGPU software license server|2021.7 and 2020.5 Update 1| |Workaround|Workaround|Workaround||[source](https://nvidia.custhelp.com/app/answers/detail/a_id/5294)| +|NXLog|Manager|5.x| |Not vuln| | ||[source](https://nxlog.co/news/apache-log4j-vulnerability-cve-2021-44228)| diff --git a/software/software_list_o.md b/software/software_list_o.md index aedf7cfee..c79692f1a 100644 --- a/software/software_list_o.md +++ b/software/software_list_o.md @@ -7,125 +7,130 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|Objectif Lune|All| | | | | | |[Objectif Lune Blog Post](https://learn.objectiflune.com/blog/security/statement-on-log4j-vulnerability-cve-2021-4428/)| -|Obsidian Dynamics|kafdrop|All| |Investigation| | | |[source](https://github.com/obsidiandynamics/kafdrop/issues/315)| -|OCLC|All|All|Not vuln|Fix| | | |[source](https://oc.lc/status)| -|Octopus|All| | | | | | |[Octopus Advisory](https://advisories.octopus.com/adv/December.2306508680.html)| -|Ogest|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.ogest.fr/20211216-vulnerability-java-log4j)| -|Okta|Access Gateway| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|AD Agent| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|Advanced Server Access| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|Browser Plugin| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|IWA Web Agent| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|LDAP Agent| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|Mobile| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|On-Prem MFA Agent|<1.4.6|Not vuln|Fix| | | |[source](https://sec.okta.com/articles/2021/12/log4shell) [fix](https://trust.okta.com/security-advisories/okta-on-prem-mfa-agent-cve-2021-44228)| -|Okta|Radius Server Agent|2.17.0|Not vuln|Fix| | | |[source/fix](https://trust.okta.com/security-advisories/okta-radius-server-agent-cve-2021-44228)| -|Okta|RADIUS Server Agent|< 2.17.0| |Vulnerable| | | |[Okta RADIUS Server Agent CVE-2021-44228 Okta](https://trust.okta.com/security-advisories/okta-radius-server-agent-cve-2021-44228)| -|Okta|Verify| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|Workflow| | |Not vuln| | | |[source](https://sec.okta.com/articles/2021/12/log4shell)| -|Okta|Workflows| |Not vuln|Not vuln|Not vuln|Not vuln| |[Okta’s response to CVE-2021-44228 (“Log4Shell”) Okta Security](https://sec.okta.com/articles/2021/12/log4shell)| -|Olympus|Medical Products|All| |Not Vuln| | | |[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| +|OpenText|All| | | | | ||[link](https://www.opentext.com/support/log4j-remote-code-execution-advisory)| +|Opto 22|GROOV-AR1, GROOV-AR1-BASE, GROOV-AR1-SNAP|< 4.3g| |Fix| | |The Log4j vulnerability affects all products running groov View software|[link](https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit)| +|Opto 22|GROOV-AT1, GROOV-AT1-SNAP|< 4.3g| |Fix| | |The Log4j vulnerability affects all products running groov View software|[link](https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit)| +|Opto 22|GROOV-SVR-WIN, GROOV-SVR-WIN-BASE, GROOV-SVR-WIN-SNAP|< 4.3g| |Fix| | |The Log4j vulnerability affects all products running groov View software|[link](https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit)| +|Opto 22|GRV-EPIC-PR1, GRV-EPIC-PR2|< 3.3.2| |Fix| | |The Log4j vulnerability affects all products running groov View software|[link](https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit)| +|Objectif Lune|All| | | | | ||[Objectif Lune Blog Post](https://learn.objectiflune.com/blog/security/statement-on-log4j-vulnerability-cve-2021-4428/)| +|Obsidian Dynamics|kafdrop|All| |Investigation| | ||[source](https://github.com/obsidiandynamics/kafdrop/issues/315)| +|OCLC|All|All|Not vuln|Fix| | ||[source](https://oc.lc/status)| +|Octopus|All| | | | | ||[Octopus Advisory](https://advisories.octopus.com/adv/December.2306508680.html)| +|Ogest|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.ogest.fr/20211216-vulnerability-java-log4j)| +|Okta|Access Gateway| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|AD Agent| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|Advanced Server Access| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|Browser Plugin| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|IWA Web Agent| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|LDAP Agent| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|Mobile| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|On-Prem MFA Agent|<1.4.6|Not vuln|Fix| | ||[source](https://sec.okta.com/articles/2021/12/log4shell) [fix](https://trust.okta.com/security-advisories/okta-on-prem-mfa-agent-cve-2021-44228)| +|Okta|Radius Server Agent|2.17.0|Not vuln|Fix| | ||[source/fix](https://trust.okta.com/security-advisories/okta-radius-server-agent-cve-2021-44228)| +|Okta|RADIUS Server Agent|< 2.17.0| |Vulnerable| | ||[Okta RADIUS Server Agent CVE-2021-44228 Okta](https://trust.okta.com/security-advisories/okta-radius-server-agent-cve-2021-44228)| +|Okta|Verify| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|Workflow| | |Not vuln| | ||[source](https://sec.okta.com/articles/2021/12/log4shell)| +|Okta|Workflows| |Not vuln|Not vuln|Not vuln|Not vuln||[Okta’s response to CVE-2021-44228 (“Log4Shell”) Okta Security](https://sec.okta.com/articles/2021/12/log4shell)| +|Olympus|Medical Products|All| |Not Vuln| | ||[source](https://www.olympus-europa.com/medical/en/Contact-and-Support/Product-Security.html)| |OneSpan|Authentication Appliance| | |Vulnerable| | |Fix availability will be announced soon|[source](https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776)| |OneSpan|Authentication Server| | |Vulnerable| | |Fix availability will be announced soon|[source](https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776)| |OneSpan|Digipass Gateway| | |Vulnerable| | |Fix availability will be announced soon|[source](https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776)| -|OneSpan|Mobile Security Suite|4.31.1|Not vuln|Fix| | | |[source](https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776)| +|OneSpan|Mobile Security Suite|4.31.1|Not vuln|Fix| | ||[source](https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776)| |OneSpan|Sign| | |Vulnerable| | |Fix availability will be announced soon|[source](https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776)| -|Open Text|Content Server|21.3, 21.4| Not vuln | Vulnerable | | | |Mitigations are available, [source](https://www.opentext.com/support/log4j-remote-code-execution-advisory)| -|Open Text|Extended ECM for Microsoft Office 365|21.3, 21.4 | Not vuln | Vulnerable | | | | Mitigations are available, [source](https://www.opentext.com/support/log4j-remote-code-execution-advisory)| -|Opengear|All| | | | | | |[Opengear Link](https://opengear.zendesk.com/hc/en-us/articles/4412713339419-CVE-2021-44228-aka-Log4Shell-Opengear-products-are-not-affected)| -|openHAB|All|3.0.4, 3.1.1|Not vuln|Fix| | | |[source](https://github.com/openhab/openhab-distro/security/advisories/GHSA-j99j-qp89-pcfq)| +|Open Text|Content Server|21.3, 21.4|Not vuln|Vulnerable| | ||[source](https://www.opentext.com/support/log4j-remote-code-execution-advisory)| +|Open Text|Extended ECM for Microsoft Office 365|21.3, 21.4|Not vuln|Vulnerable| | ||[source](https://www.opentext.com/support/log4j-remote-code-execution-advisory)| +|Opengear|All| | | | | ||[Opengear Link](https://opengear.zendesk.com/hc/en-us/articles/4412713339419-CVE-2021-44228-aka-Log4Shell-Opengear-products-are-not-affected)| +|openHAB|All|3.0.4, 3.1.1|Not vuln|Fix| | ||[source](https://github.com/openhab/openhab-distro/security/advisories/GHSA-j99j-qp89-pcfq)| |OpenMRS|Talk|2.4.0-2.4.1| |Vulnerable| | |Mitigations are available, pending a new release|[source](https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341)| -|OpenMRS TALK|All| | | | | | |[OpenMRS TALK Link](https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341)| +|OpenMRS TALK|All| | | | | ||[OpenMRS TALK Link](https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341)| |OpenNMS|Horizon (including derived Sentinels)|< 29.0.3|Not vuln|Fix| | |Workarounds are available too for earlier versions|[source](https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/)| |OpenNMS|Meridian (including derived Minions and Sentinels)|< 2021.1.8, 2020.1.15, 2019.1.27|Not vuln|Fix| | |Workarounds are available too for earlier versions|[source](https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/)| -|OpenNMS|Minion appliance| |Not vuln|Fix| | | |[source](https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/)| -|OpenNMS|PoweredBy OpenNMS| |Not vuln|Workaround| | | |[source](https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/)| -|Openpath (Motorola)|All|Not vuln|Not vuln|Not vuln|Not vuln| | |[source](https://user-images.githubusercontent.com/89155495/146846543-d55c8278-7cba-4fca-a20d-58ffa1ca7b7a.png)| -|OpenSearch|All|< 1.2.1|Not vuln|Fix| | | |[source](https://opensearch.org/blog/releases/2021/12/update-to-1-2-1/)| -|OpenVPN|All| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://forums.openvpn.net/viewtopic.php?f=4&p=103724#p103750)"| -|Oracle|Access Manager| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|Data Integrator (ODI)|>= 12.2.1.3.210119, Marketplace - >= 2.1.0|Not vuln|Workaround| | |"Patch Available, Support Note 2827793.1"|"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)"| -|Oracle|Database| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|eBusiness Suite| |Not vuln|Workaround| | |"MOS note 2827804.1"|"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|Enterprise Manager| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|Enterprise Repository| |Not vuln|Workaround| | |"Mitigation, Support Note 2827793.1"|"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)"| -|Oracle|Forms| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|Fusion Middleware|12.2.1.3.0 to 12.2.1.4.0|Not vuln|Fix| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [MOS note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)"| -|Oracle|Golden Gate| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|HTTP Server| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|Internet Directory| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|JDeveloper| |Not vuln|Workaround| | |"Mitigation Available, Support Note 2827793.1"|"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)"| -|Oracle|NoSQL Database| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|Policy Automation (OPA)| |Not vuln|Fix| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|SOA Suite| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|SQL Developer|21.4.1|Not vuln|Fix| | | |[source](https://www.oracle.com/tools/sqldev/sqldev-relnotes-21.4.html)| -|Oracle|VM VirtualBox| | |Not vuln| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|WebCenter Portal|12.2.1.3 & 12.2.1.4|Not vuln|Workaround| | |"MOS note 2827977.1 using Elasticsearch which uses Log4j 2.X jars"|"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)"| -|Oracle|WebCenter Sites| |Not vuln|Workaround| | |"Mitigation Available, Support Note 2827793.1"|"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)"| -|Oracle|WebLogic Server|12.2.1.3.0 to 14.1.1.0.0|Not vuln|Fix| | | |"[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [MOS Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)"| -|Orgavision|All| | | | | | |[Orgavision Link](https://www.orgavision.com/neuigkeiten/sicherheitsluecke-java-library-log4j)| -|Osirium|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.osirium.com/blog/apache-log4j-vulnerability)| -|OTRS|All| | |Not vuln| | | |[source](https://portal.otrs.com/external)| -| Ovarro | AlarmVision | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Atrium | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | BurstDetect | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | CA Tools | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | ControlPoint | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | DSG | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | EDGE Connect | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | EDGE Connect+ | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Enigma | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Enigma3m/Phocus3m/Enigma4G/IOT | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | EnigmaWeb | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Eureka3 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Eureka5 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Flowsure | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | IOT-Connector | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Kingfisher CP12 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Kingfisher CP30 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Kingfisher CP35/MC35 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | LeakVision/LeakInsight | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | LoggerVision | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Mikron3 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Mikron5 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Miser | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | MS-CPU42 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Other software packages (Adroit/DX-Server) | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Phocus3 (IR & Radio) | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Pioneer | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | PrimeWeb | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | S2000 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | S2000 Micro | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | S2000 Micro Mk2 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | S2000 Mk2 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | S2000 Nano | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | SCOPE | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | Stream | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | TBox LT2/TG2 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | TBox MS-CPU32 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | TBox MS-CPU32-S2 | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | TConnect | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | ToolBox | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | ToolBoxPlus | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | TWinSoft | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | XiLog+ | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| -| Ovarro | XiLog4G/IOT | | |Not vuln|Not vuln |Not vuln ||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|OpenNMS|Minion appliance| |Not vuln|Fix| | ||[source](https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/)| +|OpenNMS|PoweredBy OpenNMS| |Not vuln|Workaround| | ||[source](https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/)| +|Openpath (Motorola)|All|Not vuln|Not vuln|Not vuln|Not vuln| ||[source](https://user-images.githubusercontent.com/89155495/146846543-d55c8278-7cba-4fca-a20d-58ffa1ca7b7a.png)| +|OpenSearch|All|< 1.2.1|Not vuln|Fix| | ||[source](https://opensearch.org/blog/releases/2021/12/update-to-1-2-1/)| +|OpenVPN|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forums.openvpn.net/viewtopic.php?f=4&p=103724#p103750)| +|Oracle|Access Manager| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|Data Integrator (ODI)|>= 12.2.1.3.210119, Marketplace - >= 2.1.0|Not vuln|Workaround| | |Patch Available, Support Note 2827793.1|[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)| +|Oracle|Database| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|eBusiness Suite| |Not vuln|Workaround| | |MOS note 2827804.1|[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|Enterprise Manager| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|Enterprise Repository| |Not vuln|Workaround| | |Mitigation, Support Note 2827793.1|[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)| +|Oracle|Forms| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|Fusion Middleware|12.2.1.3.0 to 12.2.1.4.0|Not vuln|Fix| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [MOS note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)| +|Oracle|Golden Gate| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|HTTP Server| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|Internet Directory| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|JDeveloper| |Not vuln|Workaround| | |Mitigation Available, Support Note 2827793.1|[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)| +|Oracle|NoSQL Database| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|Policy Automation (OPA)| |Not vuln|Fix| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|SOA Suite| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|SQL Developer|21.4.1|Not vuln|Fix| | ||[source](https://www.oracle.com/tools/sqldev/sqldev-relnotes-21.4.html)| +|Oracle|VM VirtualBox| | |Not vuln| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|WebCenter Portal|12.2.1.3 & 12.2.1.4|Not vuln|Workaround| | |MOS note 2827977.1 using Elasticsearch which uses Log4j 2.X jars|[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1)| +|Oracle|WebCenter Sites| |Not vuln|Workaround| | |Mitigation Available, Support Note 2827793.1|[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [Support Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)| +|Oracle|WebLogic Server|12.2.1.3.0 to 14.1.1.0.0|Not vuln|Fix| | ||[source](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) [Support note 209768.1](https://support.oracle.com/rs?type=doc&id=209768.1) [Support note 2827611.1](https://support.oracle.com/rs?type=doc&id=2827611.1) [MOS Note 2827793.1](https://support.oracle.com/rs?type=doc&id=2827793.1)| +|Orgavision|All| | | | | ||[Orgavision Link](https://www.orgavision.com/neuigkeiten/sicherheitsluecke-java-library-log4j)| +|Osirium|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.osirium.com/blog/apache-log4j-vulnerability)| +|OTRS|All| | |Not vuln| | ||[source](https://portal.otrs.com/external)| +|Ovarro|AlarmVision| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Atrium| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|BurstDetect| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|CA Tools| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|ControlPoint| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|DSG| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|EDGE Connect| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|EDGE Connect+| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Enigma| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Enigma3m/Phocus3m/Enigma4G/IOT| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|EnigmaWeb| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Eureka3| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Eureka5| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Flowsure| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|IOT-Connector| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Kingfisher CP12| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Kingfisher CP30| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Kingfisher CP35/MC35| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|LeakVision/LeakInsight| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|LoggerVision| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Mikron3| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Mikron5| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Miser| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|MS-CPU42| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Other software packages (Adroit/DX-Server)| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Phocus3 (IR & Radio)| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Pioneer| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|PrimeWeb| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|S2000| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|S2000 Micro| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|S2000 Micro Mk2| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|S2000 Mk2| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|S2000 Nano| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|SCOPE| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|Stream| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|TBox LT2/TG2| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|TBox MS-CPU32| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|TBox MS-CPU32-S2| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|TConnect| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|ToolBox| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|ToolBoxPlus| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|TWinSoft| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|XiLog+| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| +|Ovarro|XiLog4G/IOT| | |Not vuln|Not vuln|Not vuln||[source](https://www.ovarro.com/en/europe/news/log4j-overview-related-software/)| |OVHCloud|Hosted Private Cloud powered by VMware| | |Vulnerable| | |Deploying the workarounds provided by VMWare|[source](https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/)| -|OVHCloud|Logs Data Platform| |Not vuln|Fix| | | |[source](https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/)| -|OVHCloud|ML serving| |Not vuln|Fix| | | |[source](https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/)| -|OVHCloud|OVHcloud Internal Systems| |Not vuln|Investigation| | | |[source](https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/)| -|OWASP|ZAP|< 2.11.1|Not vuln|Fix| | | |[source](https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/)| -|Owncloud|All Products| | |Not vuln| | | |[source](https://central.owncloud.org/t/owncloud-not-directly-affected-by-log4j-vulnerability/35493)| -|OxygenXML|Author| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Developer| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Editor| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Oxygen Content Fusion|2.0, 3.0, 4.1| |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Oxygen Feedback Enterprise|1.4.4 & older| |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Oxygen License Server|v22.1 to v24.0| |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Oxygen PDF Chemistry|v22.1, 23.0, 23.1, 24.0| |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Oxygen SDK| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Plugins (see advisory link)| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Publishing Engine| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|Web Author| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| -|OxygenXML|WebHelp| | |Vulnerable| | |"https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html"|| +|OVHCloud|Logs Data Platform| |Not vuln|Fix| | ||[source](https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/)| +|OVHCloud|ML serving| |Not vuln|Fix| | ||[source](https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/)| +|OVHCloud|OVHcloud Internal Systems| |Not vuln|Investigation| | ||[source](https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/)| +|OWASP|ZAP|< 2.11.1|Not vuln|Fix| | ||[source](https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/)| +|Owncloud|All| | |Not vuln| | ||[source](https://central.owncloud.org/t/owncloud-not-directly-affected-by-log4j-vulnerability/35493)| +|OxygenXML|Author| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Developer| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Editor| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Oxygen Content Fusion|2.0, 3.0, 4.1| |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Oxygen Feedback Enterprise|1.4.4 & older| |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Oxygen License Server|v22.1 to v24.0| |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Oxygen PDF Chemistry|v22.1, 23.0, 23.1, 24.0| |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Oxygen SDK| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Plugins (see advisory link)| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Publishing Engine| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|Web Author| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| +|OxygenXML|WebHelp| | |Vulnerable| | |https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html|| diff --git a/software/software_list_p.md b/software/software_list_p.md index ec045df59..985db1c5d 100644 --- a/software/software_list_p.md +++ b/software/software_list_p.md @@ -7,271 +7,290 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|Paessler|PRTG| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228)| -|PagerDuty|Rundeck|3.3+|Not vuln|Fix| | | |[source](https://docs.rundeck.com/docs/history/CVEs/#log4shell-cves) [fix](https://github.com/rundeck/rundeck/pull/7427)| +|Panasonic|KX-HDV100| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-HDV130| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-HDV230| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-HDV330| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-HDV340| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-HDV430| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-HDV800| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-TGP500| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-TGP550| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-TGP600| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-TGP700| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-UDS124| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-UT113| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-UT123| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-UT133| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-UT136| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-UT248| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Panasonic|KX-UT670| | |Not vuln| | ||[link](https://panasonic.net/cns/pcc/support/sipphone/disposaldoc-Apache_Log4j_Vulnerability.html)| +|Procentec (HMS Group)|All| | |Not vuln| | ||[link](https://mailchi.mp/procentec.com/security_message)| +|Paessler|PRTG| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228)| +|PagerDuty|Rundeck|3.3+|Not vuln|Fix| | ||[source](https://docs.rundeck.com/docs/history/CVEs/#log4shell-cves) [fix](https://github.com/rundeck/rundeck/pull/7427)| |PagerDuty|SaaS| |Not vuln|Fix| | |We currently see no evidence of compromises on our platform. Our teams continue to monitor for new developments and for impacts on sub-processors and dependent systems. PagerDuty SaaS customers do not need to take any additional action for their PagerDuty SaaS environment|[PagerDuty Log4j Zero-Day Vulnerability Updates](https://support.pagerduty.com/docs/pagerduty-log4j-zero-day-vulnerability)| |Palantir|AI Inference Platform (AIP)|All|Not vuln|Fix| | |Fully remediated as of 1.97.0. Disconnected customer instances may require manual updates.|[Palantir Response to Log4j Vulnerability (palantir.com)](https://www.palantir.com/security-advisories/log4j-vulnerability/)| |Palantir|Apollo|All|Not vuln|Not vuln|Not vuln|Not vuln|No impact, and updates have been deployed for full remediation.|[Palantir Response to Log4j Vulnerability (palantir.com)](https://www.palantir.com/security-advisories/log4j-vulnerability/)| |Palantir|Foundry|All|Not vuln|Fix| | |No impact to Palantir-hosted or Apollo-connected instances, and updates have been deployed for full remediation. Disconnected customer instances may require manual updates.|[Palantir Response to Log4j Vulnerability (palantir.com)](https://www.palantir.com/security-advisories/log4j-vulnerability/)| |Palantir|Gotham|All|Not vuln|Fix| | |No impact to Palantir-hosted or Apollo-connected instances, and updates have been deployed for full remediation. Disconnected customer instances may require manual updates.|[Palantir Response to Log4j Vulnerability (palantir.com)](https://www.palantir.com/security-advisories/log4j-vulnerability/)| -|Palo Alto|Bridgecrew| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|CloudGenix| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|Cortex XDR Agent| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|Cortex XSOAR| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|Exact Data Matching CLI|< 1.2| |Vulnerable| | |">= 1.2 Not vuln"|[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|GlobalProtect App| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|PAN-OS for Firewall and Wildfire| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|PAN-OS for Panorama|< 9.0.15, < 10.0.8-h8, < 9.1.12-h3| |Fix|Fix|Fix|"8.1., 10.1., >= 9.0.15, >= 10.0.8-h8, >= 9.1.12-h3 Not vuln"|[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|Prisma Cloud| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|Prisma Cloud Compute| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo Alto|WildFire Appliance| | |Not vuln| | | |[source](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Bridgecrew| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|CloudGenix| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Cortex Data Lake| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Cortex XDR Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Cortex Xpanse| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Cortex XSOAR| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Exact Data Matching CLI|1.2|Not vuln|Fix|Fix|Investigation| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Expedition| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|GlobalProtect App| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|IoT Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Okyo Grade| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|PAN-DB Private Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|PAN-OS for Firewall and Wildfire| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|PAN-OS for Panorama|9.0.15, 9.1.12-h3, 10.0.8-h8|Not vuln|Fix| | | |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Prisma Access| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Prisma Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Prisma Cloud Compute| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|Prisma SD-WAN (CloudGenix)| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|SaaS Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|User-ID Agent| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|WildFire Appliance| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Palo-Alto Networks|WildFire Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| -|Panopto|All| | | | | | |[Panopto Support Link](https://support.panopto.com/s/article/Panopto-Statement-on-the-Log4j2-Zero-Day-Vulnerability)| -|PaperCut|Hive| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|MF|>= 21.0|Not vuln|Workaround| | | |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|MobilityPrint| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|MultiVerse| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|NG|>= 21.0|Not vuln|Workaround| | | |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|Online Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|Pocket| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|Print Logger| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|PaperCut|Views| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| -|Parallels|Remote Application Server|All| |Not vuln| | | |[source](https://kb.parallels.com/en/128696)| -|Parse.ly|All| | | | | | |[Parse.ly Blog Post](https://blog.parse.ly/parse-ly-log4shell/)| +|Palo Alto|Bridgecrew| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|CloudGenix| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|Cortex XDR Agent| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|Cortex XSOAR| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|Exact Data Matching CLI|< 1.2| |Vulnerable| | |>= 1.2 Not vuln|[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|GlobalProtect App| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|PAN-OS for Firewall and Wildfire| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|PAN-OS for Panorama|< 9.0.15, < 10.0.8-h8, < 9.1.12-h3| |Fix|Fix|Fix|8.1., 10.1., >= 9.0.15, >= 10.0.8-h8, >= 9.1.12-h3 Not vuln|[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|Prisma Cloud| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|Prisma Cloud Compute| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo Alto|WildFire Appliance| | |Not vuln| | ||[source](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Bridgecrew| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|CloudGenix| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Cortex Data Lake| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Cortex XDR Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Cortex Xpanse| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Cortex XSOAR| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Exact Data Matching CLI|1.2|Not vuln|Fix|Fix|Investigation||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Expedition| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|GlobalProtect App| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|IoT Security| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Okyo Grade| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|PAN-DB Private Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|PAN-OS for Firewall and Wildfire| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|PAN-OS for Panorama|9.0.15, 9.1.12-h3, 10.0.8-h8|Not vuln|Fix| | ||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Prisma Access| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Prisma Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Prisma Cloud Compute| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|Prisma SD-WAN (CloudGenix)| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|SaaS Security| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|User-ID Agent| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|WildFire Appliance| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Palo-Alto Networks|WildFire Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228 Informational: Impact of Log4j Vulnerability CVE-2021-44228 (paloaltonetworks.com)](https://security.paloaltonetworks.com/CVE-2021-44228)| +|Panopto|All| | | | | ||[Panopto Support Link](https://support.panopto.com/s/article/Panopto-Statement-on-the-Log4j2-Zero-Day-Vulnerability)| +|PaperCut|Hive| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|MF|>= 21.0|Not vuln|Workaround| | ||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|MobilityPrint| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|MultiVerse| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|NG|>= 21.0|Not vuln|Workaround| | ||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|Online Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|Pocket| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|Print Logger| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|PaperCut|Views| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228)| +|Parallels|Remote Application Server|All| |Not vuln| | ||[source](https://kb.parallels.com/en/128696)| +|Parse.ly|All| | | | | ||[Parse.ly Blog Post](https://blog.parse.ly/parse-ly-log4shell/)| |PBXMonitor|RMM for 3CX PBX| |Not vuln|Not vuln|Not vuln|Not vuln|Mirror Servers were also checked to ensure Log4J was not installed or being used by any of our systems.|[PBXMonitor Changelog](https://www.pbxmonitor.net/changelog.php)| -|PDQ|Deploy|All| |Investigation| | | |"[source](https://www.pdq.com/blog/log4j-vulnerability-cve-2021-44228/?utm_content=190941012&utm_medium=social&utm_source=twitter&hss_channel=tw-90432152)"| -|PDQ|Inventory|All| |Investigation| | | |"[source](https://www.pdq.com/blog/log4j-vulnerability-cve-2021-44228/?utm_content=190941012&utm_medium=social&utm_source=twitter&hss_channel=tw-90432152)"| +|PDQ|Deploy|All| |Investigation| | ||[source](https://www.pdq.com/blog/log4j-vulnerability-cve-2021-44228/?utm_content=190941012&utm_medium=social&utm_source=twitter&hss_channel=tw-90432152)| +|PDQ|Inventory|All| |Investigation| | ||[source](https://www.pdq.com/blog/log4j-vulnerability-cve-2021-44228/?utm_content=190941012&utm_medium=social&utm_source=twitter&hss_channel=tw-90432152)| |Pega|Platform|7.3.x - 8.6.x|Not vuln|Fix| | |Hotfixes made available for registered customers by Pega. When using Stream nodes, the embedded Kafka instances require a separate hotfix to be installed.|[source](https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability)| -|Pentaho|All| | | | | | |[Pentaho Support Link](https://support.pentaho.com/hc/en-us/articles/4416229254541-log4j-2-zero-day-vulnerability-No-impact-to-supported-versions-of-Pentaho-)| -|Pepperl+Fuchs|All| | |Investigation| | | |[Pepperl+Fuchs Advisory Link](https://www.pepperl-fuchs.com/global/en/29079.htm)| -|Percona|All| | | | | | |[Percona Blog Post](https://www.percona.com/blog/log4jshell-vulnerability-update/)| -|Personio|All| | |Fix|Investigation| | |[source](https://status.personio.de/incidents/kn4c6mf6lpdv)| -|Pexip|Endpoint Activation|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|Eptools|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|Infinity|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|Infinity Connect client|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|Microsoft Teams Connector|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|My Meeting Video|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|Reverse Proxy and TURN Server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|Service|All|Not vuln|Fix| | | |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Pexip|VMR self-service portal|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| -|Phenix Id|All| | | | | | |[Phenix Id Support Link](https://support.phenixid.se/uncategorized/log4j-fix/)| -|Philips|Event Analytics (All Vue PACS Versions)|All| |Vulnerable| | | |[source](https://www.philips.com/a-w/security/security-advisories.html)| +|Pentaho|All| | | | | ||[Pentaho Support Link](https://support.pentaho.com/hc/en-us/articles/4416229254541-log4j-2-zero-day-vulnerability-No-impact-to-supported-versions-of-Pentaho-)| +|Pepperl+Fuchs|All| | |Investigation| | ||[Pepperl+Fuchs Advisory Link](https://www.pepperl-fuchs.com/global/en/29079.htm)| +|Percona|All| | | | | ||[Percona Blog Post](https://www.percona.com/blog/log4jshell-vulnerability-update/)| +|Personio|All| | |Fix|Investigation| ||[source](https://status.personio.de/incidents/kn4c6mf6lpdv)| +|Pexip|Endpoint Activation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|Eptools|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|Infinity|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|Infinity Connect client|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|Microsoft Teams Connector|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|My Meeting Video|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|Reverse Proxy and TURN Server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|Service|All|Not vuln|Fix| | ||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Pexip|VMR self-service portal|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability)| +|Phenix Id|All| | | | | ||[Phenix Id Support Link](https://support.phenixid.se/uncategorized/log4j-fix/)| +|Philips|Event Analytics (All Vue PACS Versions)|All| |Vulnerable| | ||[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|HealthSuite Marketplace|1.2| |Fix| | |Philips hosting environment has deployed a patch.|[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|IntelliBridge Enterprise|B.13 and B.15| |Vulnerable| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided it is customer responsibility to validate and deploy patches.|[source](https://www.philips.com/a-w/security/security-advisories.html)| -|Philips|IntelliSite Pathology Solution 5.1|L1| |Vulnerable| | | |[source](https://www.philips.com/a-w/security/security-advisories.html)| +|Philips|IntelliSite Pathology Solution 5.1|L1| |Vulnerable| | ||[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|IntelliSpace Enterprise|v11 and above| |Fix| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided by Philips, it will be Philips responsibility to validate and provide patches. Information or patch available in Inleft. Please contact your local service support team.|[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|IntelliSpace PACS| |Not vuln|Workaround| | |Philips hosting environment is evaluating the VMware provided workaround and in the process of deploying for managed service customers.|[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|IntelliSpace Portal Server/workstation|v9 and above| | | | |Software only products with customer owned Operating Systems. For products solutions where the server was provided by Philips, it will be Philips responsibility to validate and provide patches. Information or patch available in Inleft. Please contact your local service support team.|| |Philips|IntelliSpace Precision Medicine| | |Vulnerable| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided it is customer responsibility to validate and deploy patches.|[source](https://www.philips.com/a-w/security/security-advisories.html)| -|Philips|Multiple products| | | | | | |[Philips Security Advisory](https://www.philips.com/a-w/security/security-advisories.html)| -|Philips|Pathology De-identifier 1.0|L1| |Vulnerable| | | |[source](https://www.philips.com/a-w/security/security-advisories.html)| +|Philips|Multiple products| | | | | ||[Philips Security Advisory](https://www.philips.com/a-w/security/security-advisories.html)| +|Philips|Pathology De-identifier 1.0|L1| |Vulnerable| | ||[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|Performance Bridge|2.0 with Practice| |Fix| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided by Philips, it will be Philips responsibility to validate and provide patches. Information or patch available in Inleft. Please contact your local service support team.|[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|Performance Bridge|3.0| |Fix| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided by Philips, it will be Philips responsibility to validate and provide patches. Information or patch available in Inleft. Please contact your local service support team.|[source](https://www.philips.com/a-w/security/security-advisories.html)| -|Philips|Pinnacle|18.x| |Vulnerable| | | |[source](https://www.philips.com/a-w/security/security-advisories.html)| +|Philips|Pinnacle|18.x| |Vulnerable| | ||[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|Protocol Analytics|1.1| |Fix| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided by Philips, it will be Philips responsibility to validate and provide patches. Information or patch available in Inleft. Please contact your local service support team.|[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|Protocol Applications|1.1| |Vulnerable| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided by Philips, it will be Philips responsibility to validate and provide patches.|[source](https://www.philips.com/a-w/security/security-advisories.html)| -|Philips|Report Analytics (All Vue PACS Versions)|All| |Vulnerable| | | |[source](https://www.philips.com/a-w/security/security-advisories.html)| -|Philips|RIS Clinic| | |Vulnerable| | | |[source](https://www.philips.com/a-w/security/security-advisories.html)| +|Philips|Report Analytics (All Vue PACS Versions)|All| |Vulnerable| | ||[source](https://www.philips.com/a-w/security/security-advisories.html)| +|Philips|RIS Clinic| | |Vulnerable| | ||[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|Scanner Protocol Manager|1.1| |Vulnerable| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided by Philips, it will be Philips responsibility to validate and provide patches.|[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|Tasy EMR| | |Vulnerable| | |Software only products with customer owned Operating Systems. For products solutions where the server was provided it is customer responsibility to validate and deploy patches.|[source](https://www.philips.com/a-w/security/security-advisories.html)| |Philips|Universal Data Manager (UDM)| | |Vulnerable| | |Philips hosting environment is evaluating the VMware provided workaround and in the process of deploying for managed service customers.|[source](https://www.philips.com/a-w/security/security-advisories.html)| -|Philips|VuePACS|12.2.8| |Vulnerable| | | |[source](https://www.philips.com/a-w/security/security-advisories.html)| +|Philips|VuePACS|12.2.8| |Vulnerable| | ||[source](https://www.philips.com/a-w/security/security-advisories.html)| |Phoenix Contact|Cloud Services| | |Fix|Fix|Fix|Cloud Services were either not vulnerable or are completely fixed. No exploits observed.|[source](https://dam-mdc.phoenixcontact.com/asset/156443151564/1a0f6db6bbc86540bfe4f05fd65877f4/Vulnerability.pdf)| -|Phoenix Contact|Physical products containing firmware| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://dam-mdc.phoenixcontact.com/asset/156443151564/1a0f6db6bbc86540bfe4f05fd65877f4/Vulnerability.pdf)| -|Phoenix Contact|Software products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://dam-mdc.phoenixcontact.com/asset/156443151564/1a0f6db6bbc86540bfe4f05fd65877f4/Vulnerability.pdf)| -|Ping Identity|PingAccess|4.0 <= version <= 6.3.2|Not vuln|Fix| | | |[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| -|Ping Identity|PingCentral| |Not vuln|Fix| | | |[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| -|Ping Identity|PingFederate|8.0 <= version <= 10.3.4|Not vuln|Fix| | | |[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| -|Ping Identity|PingFederate Java Integration Kit|< 2.7.2|Not vuln|Fix| | | |[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| -|Ping Identity|PingFederate OAuth Playground|< 4.3.1|Not vuln|Fix| | | |[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| -|Ping Identity|PingIntelligence| |Not vuln|Fix| | | |[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| -|Pitney Bowes|All| | | | | | |[Pitney Bowes Support Link](https://www.pitneybowes.com/us/support/apache-log4j-vulnerability.html)| -|Planmeca|All| | | | | | |[Planmeca Link](https://www.planmeca.com/apache-log4j-vulnerability-in-planmeca-products/)| -|Planon Software|Planon Universe|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://my.planonsoftware.com/uk/news/log4j-impact-on-planon/)| -|Platform.SH|All| | | | | | |[Platform.SH Blog Post](https://platform.sh/blog/2021/platformsh-protects-from-apache-log4j/)| -|Plesk|All| | | | | | |[Plesk Support Link](https://support.plesk.com/hc/en-us/articles/4412182812818-CVE-2021-44228-vulnerability-in-log4j-package-of-Apache)| +|Phoenix Contact|Physical products containing firmware| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://dam-mdc.phoenixcontact.com/asset/156443151564/1a0f6db6bbc86540bfe4f05fd65877f4/Vulnerability.pdf)| +|Phoenix Contact|Software products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://dam-mdc.phoenixcontact.com/asset/156443151564/1a0f6db6bbc86540bfe4f05fd65877f4/Vulnerability.pdf)| +|Ping Identity|PingAccess|4.0 <= version <= 6.3.2|Not vuln|Fix| | ||[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| +|Ping Identity|PingCentral| |Not vuln|Fix| | ||[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| +|Ping Identity|PingFederate|8.0 <= version <= 10.3.4|Not vuln|Fix| | ||[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| +|Ping Identity|PingFederate Java Integration Kit|< 2.7.2|Not vuln|Fix| | ||[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| +|Ping Identity|PingFederate OAuth Playground|< 4.3.1|Not vuln|Fix| | ||[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| +|Ping Identity|PingIntelligence| |Not vuln|Fix| | ||[Log4j2 vulnerability CVE-2021-44228](https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228)| +|Pitney Bowes|All| | | | | ||[Pitney Bowes Support Link](https://www.pitneybowes.com/us/support/apache-log4j-vulnerability.html)| +|Planmeca|All| | | | | ||[Planmeca Link](https://www.planmeca.com/apache-log4j-vulnerability-in-planmeca-products/)| +|Planon Software|Planon Universe|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://my.planonsoftware.com/uk/news/log4j-impact-on-planon/)| +|Platform.SH|All| | | | | ||[Platform.SH Blog Post](https://platform.sh/blog/2021/platformsh-protects-from-apache-log4j/)| +|Plesk|All| | | | | ||[Plesk Support Link](https://support.plesk.com/hc/en-us/articles/4412182812818-CVE-2021-44228-vulnerability-in-log4j-package-of-Apache)| |Plex|Industrial IoT| |Not vuln|Not vuln|Not vuln|Not vuln|Mitigation already applied, patch will be issued today|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| -|Plex|Media Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forums.plex.tv/t/seeking-information-is-plex-media-server-vulnerable-to-the-cve-2021-44228-log4j-vulnerability/763642)| -|Polycom|Cloud Relay (OTD and RealConnect hybrid use case)| | |Investigation| | | |[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| -|Polycom|Poly Clariti Core/Edge (a.k.a. DMA/CCE)|9.0 and above|Not vuln|Fix| | | |[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| -|Polycom|Poly Clariti Relay version 1.x|1.0.2|Not vuln|Fix| | | |[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| -|Polycom|Poly RealConnect for Microsoft Teams and Skype for Business| |Not vuln|Workaround| | | |[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| -|Polycom|RealAccess| |Not vuln|Workaround| | | |[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| -|Portainer|All| | | | | | |[Portainer Blog Post](https://www.portainer.io/blog/portainer-statement-re-log4j-cve-2021-44228)| -|Portex|All|<3.0.2|Not vuln|Fix| | | |[source](https://github.com/katjahahn/PortEx/releases)| -|PortSwigger|All| | | | | | |[PortSwigger Forum](https://forum.portswigger.net/thread/are-burp-collaborator-or-burp-enterprise-vulnerable-to-log4j-dc6524e0)| -|Postgres|PostgreSQL JDBC| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.postgresql.org/about/news/postgresql-jdbc-and-the-log4j-cve-2371/)| -|PostGreSQL|All| | | | | | |[PostGreSQL News](https://www.postgresql.org/about/news/postgresql-jdbc-and-the-log4j-cve-2371/)| -|Postman|All| | | | | | |[Postman Support Link](https://support.postman.com/hc/en-us/articles/4415791933335-Is-Postman-impacted-by-the-Log4j-vulnerability-CVE-2021-44228-)| -|Power Admin LLC|PA File Sight|NONE|Not vuln|Not vuln|Not vuln|Not vuln| |[Update December 2021: None of our products (PA Server Monitor, PA Storage Monitor, PA File Sight and PA WatchDISK), and none of our websites, use log4j. One less thing to worry about](https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/)| -|Power Admin LLC|PA Server Monitor|NONE|Not vuln|Not vuln|Not vuln|Not vuln| |[Update December 2021: None of our products (PA Server Monitor, PA Storage Monitor, PA File Sight and PA WatchDISK), and none of our websites, use log4j. One less thing to worry about](https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/)| -|Power Admin LLC|PA Storage Monitor|NONE|Not vuln|Not vuln|Not vuln|Not vuln| |[Update December 2021: None of our products (PA Server Monitor, PA Storage Monitor, PA File Sight and PA WatchDISK), and none of our websites, use log4j. One less thing to worry about](https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/)| -|PowerDNS|Authoritative| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.powerdns.com/2021/12/16/powerdns-and-log4j-log4shell/)| -|PowerDNS|dnsdist| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.powerdns.com/2021/12/16/powerdns-and-log4j-log4shell/)| -|PowerDNS|Recursor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.powerdns.com/2021/12/16/powerdns-and-log4j-log4shell/)| -|Pretix|All| | | | | | |[Pretix Blog Post](https://pretix.eu/about/de/blog/20211213-log4j/)| -|PrimeKey|All| | | | | | |[PrimeKey Support Link](https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228)| -|Procentec (HMS Group|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Procentec Product Notification](https://mailchi.mp/procentec.com/security_message)| -|Progress|DataDirect Hybrid Data Pipeline| |Not vuln|Workaround| | | |[source](https://www.progress.com/security) [mitigations](https://knowledgebase.progress.com/articles/Knowledge/Is-Hybrid-Data-Pipeline-vulnerable-CVE-2021-44228-Log4j)| -|Progress|OpenEdge| |Not vuln|Workaround| | | |[source](https://www.progress.com/security) [mitigations](https://knowledgebase.progress.com/articles/Knowledge/Is-OpenEdge-vulnerable-to-CVE-2021-44228-Log4j)| -|Progress / IpSwitch|All| | | | | | |[Progress / IpSwitch Link](https://www.progress.com/security)| -|Proofpoint|Archiving Appliance| | |Vulnerable| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Archiving Backend| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Cloud App Security Broker| | |Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Cloudmark Cloud/Cloudmark Hybrid| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Cloudmark on Premise| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Compliance Gateway| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Content Patrol| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Data Discover| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|DLP Core Engine| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Email Continuity| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Email Fraud Defense (EFD)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Email Protection on Demand (PoD), including Email DLP and Email Encryption| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Email Security Relay| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Endpoint DLP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Essentials Archive| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Essentials Email| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Insider Threat Management On-prem| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Insider Threat Management SaaS| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Isolation| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|ITM SaaS Endpoint Agents| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|mail Protection On-Premises (PPS), including Email DLP and Email Encryption| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Meta/ZTNA| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Nexus People Risk Explorer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Secure Email Relay| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Secure Share| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Security Awareness Training| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Plex|Media Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forums.plex.tv/t/seeking-information-is-plex-media-server-vulnerable-to-the-cve-2021-44228-log4j-vulnerability/763642)| +|Polycom|Cloud Relay (OTD and RealConnect hybrid use case)| | |Investigation| | ||[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| +|Polycom|Poly Clariti Core/Edge (a.k.a. DMA/CCE)|9.0 and above|Not vuln|Fix| | ||[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| +|Polycom|Poly Clariti Relay version 1.x|1.0.2|Not vuln|Fix| | ||[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| +|Polycom|Poly RealConnect for Microsoft Teams and Skype for Business| |Not vuln|Workaround| | ||[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| +|Polycom|RealAccess| |Not vuln|Workaround| | ||[source](https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf)| +|Portainer|All| | | | | ||[Portainer Blog Post](https://www.portainer.io/blog/portainer-statement-re-log4j-cve-2021-44228)| +|Portex|All|<3.0.2|Not vuln|Fix| | ||[source](https://github.com/katjahahn/PortEx/releases)| +|PortSwigger|All| | | | | ||[PortSwigger Forum](https://forum.portswigger.net/thread/are-burp-collaborator-or-burp-enterprise-vulnerable-to-log4j-dc6524e0)| +|Postgres|PostgreSQL JDBC| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.postgresql.org/about/news/postgresql-jdbc-and-the-log4j-cve-2371/)| +|PostGreSQL|All| | | | | ||[PostGreSQL News](https://www.postgresql.org/about/news/postgresql-jdbc-and-the-log4j-cve-2371/)| +|Postman|All| | | | | ||[Postman Support Link](https://support.postman.com/hc/en-us/articles/4415791933335-Is-Postman-impacted-by-the-Log4j-vulnerability-CVE-2021-44228-)| +|Power Admin LLC|PA File Sight|NONE|Not vuln|Not vuln|Not vuln|Not vuln||[Update December 2021: None of our products (PA Server Monitor, PA Storage Monitor, PA File Sight and PA WatchDISK), and none of our websites, use log4j. One less thing to worry about](https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/)| +|Power Admin LLC|PA Server Monitor|NONE|Not vuln|Not vuln|Not vuln|Not vuln||[Update December 2021: None of our products (PA Server Monitor, PA Storage Monitor, PA File Sight and PA WatchDISK), and none of our websites, use log4j. One less thing to worry about](https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/)| +|Power Admin LLC|PA Storage Monitor|NONE|Not vuln|Not vuln|Not vuln|Not vuln||[Update December 2021: None of our products (PA Server Monitor, PA Storage Monitor, PA File Sight and PA WatchDISK), and none of our websites, use log4j. One less thing to worry about](https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/)| +|PowerDNS|Authoritative| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.powerdns.com/2021/12/16/powerdns-and-log4j-log4shell/)| +|PowerDNS|dnsdist| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.powerdns.com/2021/12/16/powerdns-and-log4j-log4shell/)| +|PowerDNS|Recursor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.powerdns.com/2021/12/16/powerdns-and-log4j-log4shell/)| +|Pretix|All| | | | | ||[Pretix Blog Post](https://pretix.eu/about/de/blog/20211213-log4j/)| +|PrimeKey|All| | | | | ||[PrimeKey Support Link](https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228)| +|Procentec (HMS Group|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Procentec Product Notification](https://mailchi.mp/procentec.com/security_message)| +|Progress|DataDirect Hybrid Data Pipeline| |Not vuln|Workaround| | ||[source](https://www.progress.com/security) [mitigations](https://knowledgebase.progress.com/articles/Knowledge/Is-Hybrid-Data-Pipeline-vulnerable-CVE-2021-44228-Log4j)| +|Progress|OpenEdge| |Not vuln|Workaround| | ||[source](https://www.progress.com/security) [mitigations](https://knowledgebase.progress.com/articles/Knowledge/Is-OpenEdge-vulnerable-to-CVE-2021-44228-Log4j)| +|Progress / IpSwitch|All| | | | | ||[Progress / IpSwitch Link](https://www.progress.com/security)| +|Proofpoint|Archiving Appliance| | |Vulnerable| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Archiving Backend| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Cloud App Security Broker| | |Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Cloudmark Cloud/Cloudmark Hybrid| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Cloudmark on Premise| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Compliance Gateway| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Content Patrol| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Data Discover| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|DLP Core Engine| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Email Continuity| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Email Fraud Defense (EFD)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Email Protection on Demand (PoD), including Email DLP and Email Encryption| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Email Security Relay| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Endpoint DLP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Essentials Archive| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Essentials Email| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Insider Threat Management On-prem| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Insider Threat Management SaaS| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Isolation| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|ITM SaaS Endpoint Agents| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|mail Protection On-Premises (PPS), including Email DLP and Email Encryption| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Meta/ZTNA| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Nexus People Risk Explorer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Secure Email Relay| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Secure Share| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Security Awareness Training| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| |Proofpoint|Sentrion| |Not vuln|Fix| | |Version 4.4 and earlier are not vulnerable. For version 4.5 patches have been made available to remediate the vulnerability.|[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Social Discover| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|SocialPatrol| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Targeted Attack Protection (TAP)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Threat Response (TRAP)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Web Gateway| |Not vuln|Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|Proofpoint|Web Security| | |Fix| | | |[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| -|ProSeS|All| | | | | | |[ProSeS Link](https://www.proses.de/en/2021/12/16/log4shell-cve-2021-44228/)| -|Prosys|All| | | | | | |[Prosys News Link](https://prosysopc.com/news/important-security-release/)| -|Proxmox|Backup Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880)| -|Proxmox|Mail Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880)| -|Proxmox|VE| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880)| -|PRTG Paessler|All| | | | | | |[PRTG Paessler Link](https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228)| -|PTC|ACA Client| |Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358990)| -|PTC|Adapter Toolkit| |Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|AdaWorld| | |Not vuln| | | |[source](https://www.ptc.com/en/documents/log4j)| -|PTC|ApexAda| | |Not vuln| | | |[source](https://www.ptc.com/en/documents/log4j)| -|PTC|Arbortext Editor, Styler & Publishing Engine|>8.0.0.0|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358998)| -|PTC|Arena| | |Not vuln| | | |[source](https://www.ptc.com/en/documents/log4j)| -|PTC|Axeda| |Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358990)| -|PTC|Axeda Platform|6.9.2| |Vulnerable| | | |[source](https://www.ptc.com/en/support/article/CS358990)| -|PTC|Creo Elements/Direct Model Manager| |Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358965)| -|PTC|Creo Parametric| |Not vuln| | | | |[source](vendor-statements/Creo%20Parametric.png)| -|PTC|Creo View| | |Not vuln| | | |[source](vendor-statements/Creo%20View.png)| -|PTC|Flexnet License Server| |Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358831)| -|PTC|FlexPLM|<= 11.1 M020, 11.2.1, 12.0.0| |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|FlexPLM|12.0.2.0 (CPS01 and CPS02)|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|FlexPLM|12.0.2.2 (CPS03), 12.0.2.3| |Vulnerable| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|Implementer| | |Investigation| | | |[source](https://www.ptc.com/en/support/article/CS359084)| -|PTC|Intellicus|>=19.1 SP11|Not vuln|Fix| | | |[source](https://www.ptc.com/en/support/article/CS358886)| -|PTC|OnShape| | |Not vuln| | | |[source](https://forum.onshape.com/discussion/comment/77206#Comment_77206)| -|PTC|Servigistics Service Parts Management|12.1, 12.2|Not vuln|Fix| | | |[source](https://www.ptc.com/en/support/article/CS358886)| -|PTC|Servigistics Service Parts Pricing|12.1, 12.2|Not vuln|Fix| | | |[source](https://www.ptc.com/en/support/article/CS358886)| -|PTC|ThingsWorx Analytics|8.5,9.0,9.1,9.2, All supported versions| |Vulnerable| | | |[ThingWorx Apache log4j vulnerability - Incident Response](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingsWorx Platform|8.5,9.0,9.1,9.2, All supported versions| |Vulnerable| | | |[ThingWorx Apache log4j vulnerability - Incident Response](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Advisor Apps| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Agents| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Analytics|8.5, 9.0, 9.1, 9.2|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx DPM| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Extensions| |Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Flow|8.5, 9.0, 9.1, 9.2| |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Kepware|<=1.3|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358996)| -|PTC|ThingWorx Manufacturing Apps| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Navigate|9.1, 9.2|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Ping Federate Integration|>=9.1|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Platform|>=8.5.7|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|ThingWorx Platform High Availability|9.0, 9.1, 9.2| |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358901)| -|PTC|WCTK| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|Windchill PDMLink|<=11.1 M020, 11.2.1| |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|Windchill PDMLink|12.0.2.0 (CPS01 & CPS02)|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|Windchill PDMLink|12.0.2.2 (CPS03)| |Vulnerable| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|Windchill Performance Advisor| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|Windchill Rest Services| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTC|Windchill RV&S (Integrity Lifecycle Manager)|4.6/ 8.6 4.6 SP0 to 12.5|Not vuln|Workaround| | | |[source](https://www.ptc.com/en/support/article/CS358804)| -|PTC|Windchill Workgroup Manager| | |Not vuln| | | |[source](https://www.ptc.com/en/support/article/CS358789)| -|PTV Group|Map&Market|> 2017|Not vuln|Vulnerable|Vulnerable|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|Map&Market|< 2018|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Arrival Board / Trip Creator / EM Portal| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Balance and PTV Epics| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Content Update Service|2 (on prem)|Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Developer| |Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Drive&Arrive| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Drive&Arrive App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Hyperpath| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV MaaS Modeller| |Not vuln|Vulnerable|Vulnerable|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Map&Guide internet| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Map&Guide intranet| |Not vuln|Not vuln|Not vuln|Not vuln|"source"|| -|PTV Group|PTV Navigator App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Navigator Licence Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Optima| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Road Editor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Route Optimiser CL| |Not vuln|Vulnerable|Vulnerable|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Route Optimiser ST|(on prem - xServer2)|Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Route Optimiser ST (TourOpt)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Route Optimizer SaaS / Demonstrator| |Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV TLN planner internet| |Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV TRE and PTV Tre-Addin| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Vissim| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Vistad Euska| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Vistro| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Visum| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Visum Publisher| |Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV Viswalk| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV xServer|1.34 (on prem)|Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV xServer|< 1.34 (on prem)|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV xServer|2 (on prem)|Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|PTV Group|PTV xServer internet 1 / PTV xServer internet 2| |Not vuln|Fix|Fix|Vulnerable| |[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| -|Pulse Secure|Ivanti Connect Secure (ICS)| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Ivanti Neurons for secure Access| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Ivanti Neurons for ZTA| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Pulse Connect Secure| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Pulse Desktop Client| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Pulse Mobile Client| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Pulse One| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Pulse Policy Secure| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Pulse ZTA| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Services Director| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Virtual Traffic Manager| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Pulse Secure|Web Application Firewall| | |Not vuln| | | |[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| -|Puppet|agents| | |Not vuln| | | |[source](https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/)| +|Proofpoint|Social Discover| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|SocialPatrol| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Targeted Attack Protection (TAP)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Threat Response (TRAP)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Web Gateway| |Not vuln|Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|Proofpoint|Web Security| | |Fix| | ||[source](https://www.proofpoint.com/us/blog/corporate-news/proofpoints-response-log4j-vulnerability)| +|ProSeS|All| | | | | ||[ProSeS Link](https://www.proses.de/en/2021/12/16/log4shell-cve-2021-44228/)| +|Prosys|All| | | | | ||[Prosys News Link](https://prosysopc.com/news/important-security-release/)| +|Proxmox|Backup Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880)| +|Proxmox|Mail Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880)| +|Proxmox|VE| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880)| +|PRTG Paessler|All| | | | | ||[PRTG Paessler Link](https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228)| +|PTC|ACA Client| |Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358990)| +|PTC|Adapter Toolkit| |Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|AdaWorld| | |Not vuln| | ||[source](https://www.ptc.com/en/documents/log4j)| +|PTC|ApexAda| | |Not vuln| | ||[source](https://www.ptc.com/en/documents/log4j)| +|PTC|Arbortext Editor, Styler & Publishing Engine|>8.0.0.0|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358998)| +|PTC|Arena| | |Not vuln| | ||[source](https://www.ptc.com/en/documents/log4j)| +|PTC|Axeda| |Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358990)| +|PTC|Axeda Platform|6.9.2| |Vulnerable| | ||[source](https://www.ptc.com/en/support/article/CS358990)| +|PTC|Creo Elements/Direct Model Manager| |Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358965)| +|PTC|Creo Parametric| |Not vuln| | | ||[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Creo%20Parametric.png)| +|PTC|Creo View| | |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Creo%20View.png)| +|PTC|Flexnet License Server| |Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358831)| +|PTC|FlexPLM|<= 11.1 M020, 11.2.1, 12.0.0| |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|FlexPLM|12.0.2.0 (CPS01 and CPS02)|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|FlexPLM|12.0.2.2 (CPS03), 12.0.2.3| |Vulnerable| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|Implementer| | |Investigation| | ||[source](https://www.ptc.com/en/support/article/CS359084)| +|PTC|Intellicus|>=19.1 SP11|Not vuln|Fix| | ||[source](https://www.ptc.com/en/support/article/CS358886)| +|PTC|OnShape| | |Not vuln| | ||[source](https://forum.onshape.com/discussion/comment/77206#Comment_77206)| +|PTC|Servigistics Service Parts Management|12.1, 12.2|Not vuln|Fix| | ||[source](https://www.ptc.com/en/support/article/CS358886)| +|PTC|Servigistics Service Parts Pricing|12.1, 12.2|Not vuln|Fix| | ||[source](https://www.ptc.com/en/support/article/CS358886)| +|PTC|ThingsWorx Analytics|8.5,9.0,9.1,9.2, All supported versions| |Vulnerable| | ||[ThingWorx Apache log4j vulnerability - Incident Response](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingsWorx Platform|8.5,9.0,9.1,9.2, All supported versions| |Vulnerable| | ||[ThingWorx Apache log4j vulnerability - Incident Response](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Advisor Apps| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Agents| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Analytics|8.5, 9.0, 9.1, 9.2|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx DPM| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Extensions| |Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Flow|8.5, 9.0, 9.1, 9.2| |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Kepware|<=1.3|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358996)| +|PTC|ThingWorx Manufacturing Apps| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Navigate|9.1, 9.2|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Ping Federate Integration|>=9.1|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Platform|>=8.5.7|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|ThingWorx Platform High Availability|9.0, 9.1, 9.2| |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358901)| +|PTC|WCTK| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|Windchill PDMLink|<=11.1 M020, 11.2.1| |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|Windchill PDMLink|12.0.2.0 (CPS01 & CPS02)|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|Windchill PDMLink|12.0.2.2 (CPS03)| |Vulnerable| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|Windchill Performance Advisor| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|Windchill Rest Services| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTC|Windchill RV&S (Integrity Lifecycle Manager)|4.6/ 8.6 4.6 SP0 to 12.5|Not vuln|Workaround| | ||[source](https://www.ptc.com/en/support/article/CS358804)| +|PTC|Windchill Workgroup Manager| | |Not vuln| | ||[source](https://www.ptc.com/en/support/article/CS358789)| +|PTV Group|Map&Market|> 2017|Not vuln|Vulnerable|Vulnerable|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|Map&Market|< 2018|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Arrival Board / Trip Creator / EM Portal| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Balance and PTV Epics| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Content Update Service|2 (on prem)|Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Developer| |Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Drive&Arrive| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Drive&Arrive App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Hyperpath| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV MaaS Modeller| |Not vuln|Vulnerable|Vulnerable|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Map&Guide internet| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Map&Guide intranet| |Not vuln|Not vuln|Not vuln|Not vuln|https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information|| +|PTV Group|PTV Navigator App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Navigator Licence Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Optima| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Road Editor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Route Optimiser CL| |Not vuln|Vulnerable|Vulnerable|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Route Optimiser ST|(on prem - xServer2)|Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Route Optimiser ST (TourOpt)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Route Optimizer SaaS / Demonstrator| |Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV TLN planner internet| |Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV TRE and PTV Tre-Addin| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Vissim| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Vistad Euska| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Vistro| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Visum| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Visum Publisher| |Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV Viswalk| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV xServer|1.34 (on prem)|Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV xServer|< 1.34 (on prem)|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV xServer|2 (on prem)|Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|PTV Group|PTV xServer internet 1 / PTV xServer internet 2| |Not vuln|Fix|Fix|Vulnerable||[source](https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information)| +|Pulse Secure|Ivanti Connect Secure (ICS)| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Ivanti Neurons for secure Access| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Ivanti Neurons for ZTA| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Pulse Connect Secure| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Pulse Desktop Client| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Pulse Mobile Client| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Pulse One| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Pulse Policy Secure| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Pulse ZTA| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Services Director| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Virtual Traffic Manager| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Pulse Secure|Web Application Firewall| | |Not vuln| | ||[source](https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/)| +|Puppet|agents| | |Not vuln| | ||[source](https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/)| |Puppet|Continuous Delivery for Puppet Enterprise|3.x, < 4.10.2|Not vuln|Fix| | |Update available for version 4.x, mitigations for 3.x which is EOL|[source](https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/) [workaround](https://puppet.com/docs/continuous-delivery/4.x/cd_release_notes.html#cd_release_notes-version-4-10-3) [mitigations](https://support.puppet.com/hc/en-us/articles/360046708133-Puppet-Response-to-CVE-2021-44228-FAQ/)| -|Puppet|Enterprise| | |Not vuln| | | |[source](https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/)| +|Puppet|Enterprise| | |Not vuln| | ||[source](https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/)| |Pure Storage|Cloud Block Store|All| |Vulnerable| | |See Link for planned Fixes|[source](https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_log4j)| |Pure Storage|Cloud Blockstore|CBS6.1.x, CBS6.2.x| |Vulnerable| | |Patch expected 12/27/2021|[Pure Storage Customer Portal](https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_log4j)| |Pure Storage|Flash Array|5.3.x, 6.0.x, 6.1.x, 6.2.x| |Vulnerable| | |Patch expected 12/20/2021|[Pure Storage Customer Portal](https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_log4j)| |Pure Storage|FlashArray|All| |Vulnerable| | |See Link for planned Fixes|[source](https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_log4j)| |Pure Storage|FlashBlade|All| |Vulnerable| | |See Link for planned Fixes|[source](https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_log4j)| -|Pure Storage|PortWorx|2.8.0+|Not vuln|Fix| | | |[Pure Storage Customer Portal](https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_log4j)| -|Pure Storage|Pure1| |Not vuln|Fix| | | |[Pure Storage Customer Portal](https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_log4j)| -|Pure Storage|VM Analytics OVA Collector|r7insight_java to 3.0.9"|[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Rapid7|InsightVM Kubernetes Monitor|on-prem|Not vuln|Not vuln|Not vuln|Not vuln| |[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Rapid7|InsightVM/Nexpose|on-prem|Not vuln|Not vuln|Not vuln|Not vuln| |[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|R|All|4.1.1|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.r-project.org/)| +|R2ediviewer|All| | | | | ||[R2ediviewer Link](https://r2ediviewer.de/DE/reload.html?Change-log_17858584.html)| +|Radware|All| | | | | ||[Radware Support Link](https://support.radware.com/app/answers/answer_view/a_id/1029752)| +|Rapid7|AlcidekArt, kAdvisor, and kAudit|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|AppSpider Enterprise|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|AppSpider Pro|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|Insight Agent|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightAppSec Scan Engine|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightCloudSec/DivvyCloud|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightConnect Orchestrator|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightIDR Network Sensor|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightIDR/InsightOps Collector & Event Sources|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightOps DataHub|2.0.1| |Fix| | ||[source](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/) [Fix](https://docs.rapid7.com/insightops/setting-up-datahub/)| +|Rapid7|InsightOps non-Java logging libraries|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightOps r77insight_java Logging Libary|3.0.9| |Fix| | ||[source](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/)| +|Rapid7|InsightOps r7insight_java logging library|<=3.0.8|Not vuln|Fix| | |Upgrade r7insight_java to 3.0.9|[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightVM Kubernetes Monitor|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|InsightVM/Nexpose|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| |Rapid7|InsightVM/Nexpose Console|on-prem|Not vuln|Not vuln|Not vuln|Not vuln|Installations of the InsightVM/Nexpose have “log4j-over-slf4j-1.7.7.jar” packaged in them. This is a different library than log4j-core and is not vulnerable to Log4Shell.|[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| |Rapid7|InsightVM/Nexpose Engine|on-prem|Not vuln|Not vuln|Not vuln|Not vuln|Installations of the InsightVM/Nexpose have “log4j-over-slf4j-1.7.7.jar” packaged in them. This is a different library than log4j-core and is not vulnerable to Log4Shell.|[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Rapid7|IntSights virtual appliance|on-prem|Not vuln|Not vuln|Not vuln|Not vuln| |[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Rapid7|Logentries DataHub|1.2.0.822| |Fix| | | |[source](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/) [Windows Fix](https://docs.logentries.com/docs/datahub-windows) [Linux Fix](https://docs.logentries.com/docs/datahub-linux)| +|Rapid7|IntSights virtual appliance|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|Logentries DataHub|1.2.0.822| |Fix| | ||[source](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/) [Windows Fix](https://docs.logentries.com/docs/datahub-windows) [Linux Fix](https://docs.logentries.com/docs/datahub-linux)| |Rapid7|Logentries le_java Logging Libary|All| |Vulnerable| | |Migrate to v3.0.9 of r7insight_java|[source](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/)| -|Rapid7|Logentries le_java logging library|All versions: this is a deprecated component|Not vuln|Fix| | |"Migrate to version 3.0.9 of r7insight_java"|[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Rapid7|Metasploit Framework|on-prem|Not vuln|Not vuln|Not vuln|Not vuln| |[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|Logentries le_java logging library|All versions: this is a deprecated component|Not vuln|Fix| | |Migrate to version 3.0.9 of r7insight_java|[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|Metasploit Framework|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| |Rapid7|Metasploit Pro|on-prem|Not vuln|Not vuln|Not vuln|Not vuln|Metasploit Pro ships with log4j but has specific configurations applied to it that mitigate Log4Shell. A future update will contain a fully patched version of log4j.|[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Rapid7|tCell Java Agent|on-prem|Not vuln|Not vuln|Not vuln|Not vuln| |[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Rapid7|Velociraptor|on-prem|Not vuln|Not vuln|Not vuln|Not vuln| |[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| -|Raritan|All| | | | | | |[Raritan Support Link](https://www.raritan.com/support)| -|Ravelin|All| | | | | | |[Ravelin Link](https://syslog.ravelin.com/log4shell-cve-2021-44228-4338bb8da67b)| -|Real-Time Innovations (RTI)|Distributed Logger| |Not vuln|Not vuln|Not vuln|Not vuln| |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Real-Time Innovations (RTI)|Recording Console| |Not vuln|Not vuln|Not vuln|Not vuln| |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Real-Time Innovations (RTI)|RTI Administration Console| |Not vuln|Not vuln|Not vuln|Not vuln| |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Real-Time Innovations (RTI)|RTI Code Generator| |Not vuln|Not vuln|Not vuln|Not vuln| |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Real-Time Innovations (RTI)|RTI Code Generator Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Real-Time Innovations (RTI)|RTI Micro Application Generator (MAG)|as part of RTI Connext Micro 3.0.0, 3.0.1, 3.0.2, 3.0.3| |Vulnerable| | | |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Real-Time Innovations (RTI)|RTI Micro Application Generator (MAG)|as part of RTI Connext Professional 6.0.0 and 6.0.1| |Vulnerable| | | |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Real-Time Innovations (RTI)|RTI Monitor| |Not vuln|Not vuln|Not vuln|Not vuln| |[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| -|Red Hat|A-MQ Clients 2| | |Not vuln| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|build of Quarkus| | |Not vuln| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|CodeReady Studio|12.21.0|Not vuln|Fix| | |"CRS 12.21.1 Patch"|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|CodeReady Studio 12| | |Vulnerable| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Data Grid|8|Not vuln|Fix| | |"RHSA-2021:5132"|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Data Grid 8|8.2.2|Not vuln|Fix| | |"RHSA-2021:5132"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Decision Manager|7|Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Descision Manager 7| | |Vulnerable| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Enterprise Linux|6|Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Enterprise Linux|7|Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Enterprise Linux|8|Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Integration Camel K| | |Vulnerable| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Integration Camel Quarkus| | |Vulnerable| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|JBoss A-MQ Streaming|1.6.5|Not vuln|Fix| | |"RHSA-2021:5133"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|JBoss Enterprise Application Platform|7|Not vuln|Fix| | |"Maven Patch - Affects only the Mavenized distribution. Container, Zip and RPM distro aren't affected."|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|JBoss Enterprise Application Platform 6| | |Not vuln| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|JBoss Enterprise Application Platform Expansion Pack| | |Not vuln| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|JBoss Fuse 7|7.10.0|Not vuln|Fix| | |"RHSA-2021:5134"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|log4j-core| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Application Runtimes 1.0|n.a. (see notes)|Not vuln|Fix| | |"RHSA-2021:5093 - Red Hat build of Eclipse Vert.x 4.1.5 SP1"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Container Platform 3.11 openshift3/ose-logging-elasticsearch5|3.11.z|Not vuln|Fix| | |"RHSA-2021:5094"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Container Platform 4 openshift4/ose-logging-elasticsearch6|4.6.z|Not vuln|Fix| | |"RHSA-2021:5106"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Container Platform 4 openshift4/ose-metering-hive|4.8.z|Not vuln|Fix| | |"RHSA-2021:5108"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Container Platform 4.6 openshift4/ose-metering-presto|4.6.52|Not vuln|Fix| | |"RHSA-2021:5141"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Container Platform 4.7 openshift4/ose-metering-presto|4.7.40|Not vuln|Fix| | |"RHSA-2021:5107"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Container Platform 4.8 openshift4/ose-metering-presto|4.8.24|Not vuln|Fix| | |"RHSA-2021:5148"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Logging 5.0 openshift-logging/elasticsearch6-rhel8|5.0.10|Not vuln|Fix| | |"RHSA-2021:5137"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Logging 5.0 openshift-logging/elasticsearch6-rhel8|5.3.1|Not vuln|Fix| | |"RHSA-2021:5129"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Logging 5.1 openshift-logging/elasticsearch6-rhel8|5.1.5|Not vuln|Fix| | |"RHSA-2021:5128"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenShift Logging 5.2 openshift-logging/elasticsearch6-rhel8|5.2.4|Not vuln|Fix| | |"RHSA-2021:5127"|[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|OpenStack Platform 13 (Queens) opendaylight| | |Vulnerable| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Process Automation|7|Not vuln|Fix| | |"Maven Patch - Affects only the Mavenized distribution. Container, Zip and RPM distro aren't affected."|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Process Automation 7| | |Vulnerable| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Satellite 5| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Single Sign-On|7|Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Single Sign-On 7| | |Not vuln| | | |[source](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Spacewalk| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Vert.X|4|Not vuln|Fix| | |"RHSA-2021:5093"|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat|Virtualization 4| | |Not vuln| | | |[source](https://access.redhat.com/security/cve/CVE-2021-4104#:~:text=affected%20packages%20and%20issued%20red%20hat%20security%20errata)| -|Red Hat OpenShift Container Platform 3.11|openshift3/ose-logging-elasticsearch5| |Not vuln|Fix| | |"RHSA-2021:5094"|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Rapid7|tCell Java Agent|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Rapid7|Velociraptor|on-prem|Not vuln|Not vuln|Not vuln|Not vuln||[Rapid7 Statement](https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/?mkt_tok=NDExLU5BSy05NzAAAAGBVaccW1DOLSfEsfTNwEJksv_1nK1muJSFze-Lle90mKtAO78nSdjwPdzqXskNIi9qZCAGQODD42mYRK4YPlQkjhn38E27HQxFHdHAkypEOsh8)| +|Raritan|All| | | | | ||[Raritan Support Link](https://www.raritan.com/support)| +|Ravelin|All| | | | | ||[Ravelin Link](https://syslog.ravelin.com/log4shell-cve-2021-44228-4338bb8da67b)| +|Real-Time Innovations (RTI)|Distributed Logger| |Not vuln|Not vuln|Not vuln|Not vuln||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Real-Time Innovations (RTI)|Recording Console| |Not vuln|Not vuln|Not vuln|Not vuln||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Real-Time Innovations (RTI)|RTI Administration Console| |Not vuln|Not vuln|Not vuln|Not vuln||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Real-Time Innovations (RTI)|RTI Code Generator| |Not vuln|Not vuln|Not vuln|Not vuln||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Real-Time Innovations (RTI)|RTI Code Generator Server| |Not vuln|Not vuln|Not vuln|Not vuln||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Real-Time Innovations (RTI)|RTI Micro Application Generator (MAG)|as part of RTI Connext Micro 3.0.0, 3.0.1, 3.0.2, 3.0.3| |Vulnerable| | ||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Real-Time Innovations (RTI)|RTI Micro Application Generator (MAG)|as part of RTI Connext Professional 6.0.0 and 6.0.1| |Vulnerable| | ||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Real-Time Innovations (RTI)|RTI Monitor| |Not vuln|Not vuln|Not vuln|Not vuln||[RTI Statement](https://community.rti.com/kb/apache-log4j-vulnerability-cve-2021-44228cve-2021-45046-impact-rti-connext-products)| +|Red Hat|A-MQ Clients 2| | |Not vuln| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|build of Quarkus| | |Not vuln| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|CodeReady Studio|12.21.0|Not vuln|Fix| | |CRS 12.21.1 Patch|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|CodeReady Studio 12| | |Vulnerable| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Data Grid|8|Not vuln|Fix| | |RHSA-2021:5132|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Data Grid 8|8.2.2|Not vuln|Fix| | |RHSA-2021:5132|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Decision Manager|7|Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Descision Manager 7| | |Vulnerable| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Enterprise Linux|6|Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Enterprise Linux|7|Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Enterprise Linux|8|Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Integration Camel K| | |Vulnerable| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Integration Camel Quarkus| | |Vulnerable| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|JBoss A-MQ Streaming|1.6.5|Not vuln|Fix| | |RHSA-2021:5133|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|JBoss Enterprise Application Platform|7|Not vuln|Fix| | |Maven Patch - Affects only the Mavenized distribution. Container, Zip and RPM distro aren't affected.|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|JBoss Enterprise Application Platform 6| | |Not vuln| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|JBoss Enterprise Application Platform Expansion Pack| | |Not vuln| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|JBoss Fuse 7|7.10.0|Not vuln|Fix| | |RHSA-2021:5134|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|log4j-core| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Application Runtimes 1.0|n.a. (see notes)|Not vuln|Fix| | |RHSA-2021:5093 - Red Hat build of Eclipse Vert.x 4.1.5 SP1|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Container Platform 3.11 openshift3/ose-logging-elasticsearch5|3.11.z|Not vuln|Fix| | |RHSA-2021:5094|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Container Platform 4 openshift4/ose-logging-elasticsearch6|4.6.z|Not vuln|Fix| | |RHSA-2021:5106|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Container Platform 4 openshift4/ose-metering-hive|4.8.z|Not vuln|Fix| | |RHSA-2021:5108|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Container Platform 4.6 openshift4/ose-metering-presto|4.6.52|Not vuln|Fix| | |RHSA-2021:5141|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Container Platform 4.7 openshift4/ose-metering-presto|4.7.40|Not vuln|Fix| | |RHSA-2021:5107|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Container Platform 4.8 openshift4/ose-metering-presto|4.8.24|Not vuln|Fix| | |RHSA-2021:5148|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Logging 5.0 openshift-logging/elasticsearch6-rhel8|5.0.10|Not vuln|Fix| | |RHSA-2021:5137|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Logging 5.0 openshift-logging/elasticsearch6-rhel8|5.3.1|Not vuln|Fix| | |RHSA-2021:5129|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Logging 5.1 openshift-logging/elasticsearch6-rhel8|5.1.5|Not vuln|Fix| | |RHSA-2021:5128|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenShift Logging 5.2 openshift-logging/elasticsearch6-rhel8|5.2.4|Not vuln|Fix| | |RHSA-2021:5127|[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|OpenStack Platform 13 (Queens) opendaylight| | |Vulnerable| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Process Automation|7|Not vuln|Fix| | |Maven Patch - Affects only the Mavenized distribution. Container, Zip and RPM distro aren't affected.|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Process Automation 7| | |Vulnerable| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Satellite 5| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Single Sign-On|7|Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Single Sign-On 7| | |Not vuln| | ||[source](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Spacewalk| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Vert.X|4|Not vuln|Fix| | |RHSA-2021:5093|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat|Virtualization 4| | |Not vuln| | ||[source](https://access.redhat.com/security/cve/CVE-2021-4104#:~:text=affected%20packages%20and%20issued%20red%20hat%20security%20errata)| +|Red Hat OpenShift Container Platform 3.11|openshift3/ose-logging-elasticsearch5| |Not vuln|Fix| | |RHSA-2021:5094|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| |Red Hat OpenShift Container Platform 4|openshift4/ose-logging-elasticsearch6| |Not vuln|Fix| | |Please refer to Red Hat Customer Portal to find the left errata for your version.|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| |Red Hat OpenShift Container Platform 4|openshift4/ose-metering-hive| |Not vuln|Fix| | |Please refer to Red Hat Customer Portal to find the left errata for your version.|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| |Red Hat OpenShift Container Platform 4|openshift4/ose-metering-presto| |Not vuln|Fix| | |Please refer to Red Hat Customer Portal to find the left errata for your version.|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| |Red Hat OpenShift Logging|logging-elasticsearch6-container| |Not vuln|Fix| | |Please refer to Red Hat Customer Portal to find the left errata for your version.|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| |Red Hat OpenStack Platform 13 (Queens)|opendaylight| | |Vulnerable| | |End of Life|[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat Software Collections|rh-java-common-log4j| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat Software Collections|rh-maven35-log4j12| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red Hat Software Collections|rh-maven36-log4j12| |Not vuln|Not vuln|Not vuln|Not vuln| |[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| -|Red5Pro|All| | | | | | |[Red5Pro Link](https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/)| +|Red Hat Software Collections|rh-java-common-log4j| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat Software Collections|rh-maven35-log4j12| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red Hat Software Collections|rh-maven36-log4j12| |Not vuln|Not vuln|Not vuln|Not vuln||[CVE-2021-44228- Red Hat Customer Portal](https://access.redhat.com/security/cve/cve-2021-44228)| +|Red5Pro|All| | | | | ||[Red5Pro Link](https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/)| |Redgate|Flyway|All| |Not vuln| | |Only vulnerable when using non-default config.|[source](https://flywaydb.org/blog/flyway-log4j-vulnerability)| |Redis|Enterprise & Open Source|All| |Not vuln| | |Redis Enterprise and Open Source Redis (self-managed software product) does not use Java and is therefore not impacted by this vulnerability|[source](https://redis.com/security/notice-apache-log4j2-cve-2021-44228/)| |Redis|Jedis|3.7.1, 4.0.0-rc2|Not vuln|Fix| | |Jedis uses the affected library in test suites only.|[source](https://redis.com/security/notice-apache-log4j2-cve-2021-44228/)| -|Reiner SCT|All| | | | | | |"[Reiner SCT Forum](https://forum.reiner-sct.com/index.php?/topic/5973-timecard-und-log4j-schwachstelle/&do=findComment&comment=14933)"| -|ReportURI|All| | | | | | |[ReportURI Link](https://scotthelme.co.uk/responding-to-the-log4j-2-vulnerability/)| -|ResMed|AirView| | |Not vuln| | | |[source](https://www.resmed.com/en-us/security/)| -|ResMed|myAir| | |Not vuln| | | |[source](https://www.resmed.com/en-us/security/)| +|Reiner SCT|All| | | | | ||[Reiner SCT Forum](https://forum.reiner-sct.com/index.php?/topic/5973-timecard-und-log4j-schwachstelle/&do=findComment&comment=14933)| +|ReportURI|All| | | | | ||[ReportURI Link](https://scotthelme.co.uk/responding-to-the-log4j-2-vulnerability/)| +|ResMed|AirView| | |Not vuln| | ||[source](https://www.resmed.com/en-us/security/)| +|ResMed|myAir| | |Not vuln| | ||[source](https://www.resmed.com/en-us/security/)| |Respondus|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[Respondus Support Link](https://support.respondus.com/support/index.php?/News/NewsItem/View/339)| -|Revenera|FlexNet Publisher 64-bit License Server Manager| | |Vulnerable| |Vulnerable| |[source](https://community.flexera.com/t5/FlexNet-Publisher-Knowledge-Base/CVE-2021-44228-amp-CVE-2021-45105-Log4j-vulnerability-impact-on/ta-p/217384)| -|Revenera / Flexera|All| | | | | | |[Revenera / Flexera Community Link](https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905)| -|Ricoh|Commercial & Industrial Printing - Garment Printers| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Commercial & Industrial Printing - Production Printers| | |Investigation| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Digital Duplicators| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - FAX| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Interactive Whiteboards| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Multifunction Printers/Copiers - Black & White MFP| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Multifunction Printers/Copiers - Color MFP| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Multifunction Printers/Copiers - Wide Format MFP| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Printers - Black & White Laser Printers| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Printers - Color Laser Printers| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Printers - Gel Jet Printers| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Printers - Handy Printers| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Printers - Printer based MFP| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Projectors| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Office Products - Video Conferencing| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - @Remote Connector NX| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Card Authentication Package Series| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Certificate Enrolment Service| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Device Manager NX Accounting| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Device Manager NX Enterprise| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Device Manager NX Lite| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Device Manager NX Pro| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Docuware| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Enhanced Locked Print Series| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - GlobalScan NX| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Intelligent Barcode Solution| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - myPrint| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Printer Driver Packager NX| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Ricoh Print Management Cloud| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Ricoh Smart Integration (RSI) applications| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Ricoh Smart Integration (RSI) Platform and its applications| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Ricoh Streamline NX V2| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Ricoh Streamline NX V3| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Scan Workflow Navigator| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|Ricoh|Software & Solutions - Streamline NX Share| | |Not vuln| | | |[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| -|RingCentral|All| | | | | | |[RingCentral Security Bulletin](https://www.ringcentral.com/trust-left/security-bulletin.html)| -|Riverbed|AppResponse11| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| +|Revenera|FlexNet Publisher 64-bit License Server Manager| | |Vulnerable| |Vulnerable||[source](https://community.flexera.com/t5/FlexNet-Publisher-Knowledge-Base/CVE-2021-44228-amp-CVE-2021-45105-Log4j-vulnerability-impact-on/ta-p/217384)| +|Revenera / Flexera|All| | | | | ||[Revenera / Flexera Community Link](https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905)| +|Ricoh|Commercial & Industrial Printing - Garment Printers| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Commercial & Industrial Printing - Production Printers| | |Investigation| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Digital Duplicators| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - FAX| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Interactive Whiteboards| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Multifunction Printers/Copiers - Black & White MFP| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Multifunction Printers/Copiers - Color MFP| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Multifunction Printers/Copiers - Wide Format MFP| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Printers - Black & White Laser Printers| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Printers - Color Laser Printers| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Printers - Gel Jet Printers| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Printers - Handy Printers| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Printers - Printer based MFP| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Projectors| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Office Products - Video Conferencing| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - @Remote Connector NX| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Card Authentication Package Series| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Certificate Enrolment Service| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Device Manager NX Accounting| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Device Manager NX Enterprise| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Device Manager NX Lite| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Device Manager NX Pro| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Docuware| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Enhanced Locked Print Series| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - GlobalScan NX| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Intelligent Barcode Solution| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - myPrint| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Printer Driver Packager NX| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Ricoh Print Management Cloud| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Ricoh Smart Integration (RSI) applications| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Ricoh Smart Integration (RSI) Platform and its applications| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Ricoh Streamline NX V2| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Ricoh Streamline NX V3| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Scan Workflow Navigator| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|Ricoh|Software & Solutions - Streamline NX Share| | |Not vuln| | ||[source](https://www.ricoh-europe.com/news-events/news/notice-potential-impact-of-apache-log4j-vulnerability-towards-ricoh-products-and-services/)| +|RingCentral|All| | | | | ||[RingCentral Security Bulletin](https://www.ringcentral.com/trust-left/security-bulletin.html)| +|Riverbed|AppResponse11| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| |Riverbed|Aternity| | |Investigation| | |See source for latest updates|[source](https://aternity.force.com/customersuccess/s/article/Apache-Log4j-Zero-Day-Exploit)| -|Riverbed|Client Accelerator Controllers and Client Accelerator (aka SteelCentral Controller for SteelHead Mobile and SteelHead Mobile)| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Flow Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|FlowTraq| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Modeler| | |Investigation| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetAuditor Desktop| | |Investigation| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetAuditor Web| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetCollector| | |Investigation| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetExpress| | |Investigation| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetIM 1.x| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetIM 2.x| | |Vulnerable| | |Patches planned|"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetIM Test Engine| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetPlanner| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|NetProfiler| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Packet Analyzer| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Packet Trace Warehouse| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Portal 1.x| | |Vulnerable| | |Includes Log4j 2.2|"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Portal 3.x| | |Vulnerable| | |Includes Log4j 2.13|"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|SaaS Accelerator| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Scon CX| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Scon EX Analytics| | |Vulnerable| | |Patches planned|"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Scon EX Director| | |Vulnerable| | |Patches planned|"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Scon EX FlexVNF| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|SteelCentral Controller for SteelHead| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|SteelFusion Edge| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|SteelFusionCore (appliance, virtual)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|SteelHead CX (appliance, virtual, cloud)| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|SteelHead Interceptor| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Transaction Analyzer| | |Investigation| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|Transaction Analyzer Agents| |Not vuln|Not vuln|Not vuln|Not vuln|Log4j not in use|"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|UCExpert| | |Vulnerable| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|Riverbed|WinSec Controller for SteelHead (WSC)| | |Not vuln| | | |"[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)"| -|RocketChat|All|All| |Not vuln| | | |[source](https://rocket.chat/blog/log4j-software-vulnerability)| -|Rockwell Automation|Data Scheduler||Not vuln|| | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| +|Riverbed|Client Accelerator Controllers and Client Accelerator (aka SteelCentral Controller for SteelHead Mobile and SteelHead Mobile)| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Flow Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|FlowTraq| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Modeler| | |Investigation| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetAuditor Desktop| | |Investigation| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetAuditor Web| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetCollector| | |Investigation| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetExpress| | |Investigation| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetIM 1.x| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetIM 2.x| | |Vulnerable| | |Patches planned|[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetIM Test Engine| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetPlanner| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|NetProfiler| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Packet Analyzer| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Packet Trace Warehouse| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Portal 1.x| | |Vulnerable| | |Includes Log4j 2.2|[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Portal 3.x| | |Vulnerable| | |Includes Log4j 2.13|[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|SaaS Accelerator| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Scon CX| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Scon EX Analytics| | |Vulnerable| | |Patches planned|[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Scon EX Director| | |Vulnerable| | |Patches planned|[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Scon EX FlexVNF| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|SteelCentral Controller for SteelHead| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|SteelFusion Edge| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|SteelFusionCore (appliance, virtual)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|SteelHead CX (appliance, virtual, cloud)| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|SteelHead Interceptor| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Transaction Analyzer| | |Investigation| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|Transaction Analyzer Agents| |Not vuln|Not vuln|Not vuln|Not vuln|Log4j not in use|[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|UCExpert| | |Vulnerable| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|Riverbed|WinSec Controller for SteelHead (WSC)| | |Not vuln| | ||[source](https://supportkb.riverbed.com/support/index?page=content&id=S35645&actp=LIST_RECENT)| +|RocketChat|All|All| |Not vuln| | ||[source](https://rocket.chat/blog/log4j-software-vulnerability)| +|Rockwell Automation|Data Scheduler| |Not vuln| | | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Rockwell Automation|FactoryTalk Analytics DataFlowML|4.00.01| |Fix| | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Rockwell Automation|FactoryTalk Analytics DataView|3.03.01| |Fix| | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| -|Rockwell Automation|FactoryTalk Analytics Information Platform||Not vuln|| | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| -|Rockwell Automation|FactoryTalk Augmented Modeler||Not vuln|| | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| -|Rockwell Automation|Fiix CMMS core V5||Not vuln|Fix|Fix|Fix|product has been updated; no user action required|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| +|Rockwell Automation|FactoryTalk Analytics Information Platform| |Not vuln| | | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| +|Rockwell Automation|FactoryTalk Augmented Modeler| |Not vuln| | | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| +|Rockwell Automation|Fiix CMMS core V5| |Not vuln|Fix|Fix|Fix|product has been updated; no user action required|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Rockwell Automation|Firewall Managed Support - Cisco Firepower Thread Defense|6.2.3 – 7.1.0| |Workaround| | |Follow the mitigation instructions outlined by Cisco in CSCwa46963|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Rockwell Automation|Industrial Data Center|Gen 1, Gen 2, Gen 3, Gen 3.5|Not vuln|Workaround| | |Follow the mitigation instructions outlined by VMware in VMSA-2021-0028|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Rockwell Automation|MES EIG|3.03.00| |Vulnerable| | |Product discontinued. Customers should upgrade to EIG Hub if possible or work with their local representatives about alternative solutions.|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| -|Rockwell Automation|Plex Industrial IoT||Not vuln|Fix|Fix|Fix|product has been updated; no user action required|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| +|Rockwell Automation|Plex Industrial IoT| |Not vuln|Fix|Fix|Fix|product has been updated; no user action required|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Rockwell Automation|VersaVirtual|Series A|Not vuln|Workaround| | |Follow the mitigation instructions outlined by VMware in VMSA-2021-0028|[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| |Rockwell Automation|Warehouse Management|4.02.03|Not vuln|Fix| | ||[source](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605)| -|Rollbar|All| | | | | | |[Rollbar Blog Post](https://rollbar.com/blog/log4j-zero-day-2021-log4shell/)| -|Rosette.com|All| | | | | | |[Rosette.com Support Link](https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability)| +|Rollbar|All| | | | | ||[Rollbar Blog Post](https://rollbar.com/blog/log4j-zero-day-2021-log4shell/)| +|Rosette.com|All| | | | | ||[Rosette.com Support Link](https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability)| |RSA|NetWitness Orchestrator|>= 6.0|Not vuln|Workaround| | |Mitigation for the ThreatConnect Application server is available, no impact described|[source](https://community.rsa.com/t5/netwitness-platform-product/netwitness-apache-vulnerability-log4j2-cve-2021-44228-nbsp/ta-p/660540)| |RSA|NetWitness Platform|11.4|Not vuln|Workaround| | |It is theoretically possible to exploit the vulnerability to gain shell access to the NetWitness Platform|[source](https://community.rsa.com/t5/netwitness-platform-product/netwitness-apache-vulnerability-log4j2-cve-2021-44228-nbsp/ta-p/660540)| |RSA|NetWitness Platform|>= 11.5|Not vuln|Workaround| | |It is possible to leak system configuration data|[source](https://community.rsa.com/t5/netwitness-platform-product/netwitness-apache-vulnerability-log4j2-cve-2021-44228-nbsp/ta-p/660540)| |RSA|SecurID Authentication Manager| | |Not vuln| | |Version 8.6 Patch 1 contains a version of log4j that is vulnerable, but this vulnerability is not exploitable.|[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| -|RSA|SecurID Authentication Manager Prime| | |Not vuln| | | |[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| -|RSA|SecurID Authentication Manager WebTier| | |Not vuln| | | |[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| -|RSA|SecurID Governance and Lifecycle| |Not vuln|Not vuln|Not vuln|Not vuln| || -|RSA|SecurID Governance and Lifecycle (SecurID G&L)| | |Not vuln| | | |[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| -|RSA|SecurID Governance and Lifecycle Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| || -|RSA|SecurID Governance and Lifecycle Cloud (SecurID G&L Cloud)| | |Not vuln| | | |[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| -|RSA|SecurID Identity Router| |Not vuln|Not vuln|Not vuln|Not vuln| || -|RSA|SecurID Identity Router (On-Prem component of Cloud Authentication Service)| | |Not vuln| | | |[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| -|RSA Netwitness|All| | | | | | |[RSA Netwitness Community Link](https://community.rsa.com/t5/netwitness-platform-product/netwitness-apache-vulnerability-log4j2-cve-2021-44228-nbsp/ta-p/660540)| -|Rstudioapi|All|0.13|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/rstudio/rstudioapi)| +|RSA|SecurID Authentication Manager Prime| | |Not vuln| | ||[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| +|RSA|SecurID Authentication Manager WebTier| | |Not vuln| | ||[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| +|RSA|SecurID Governance and Lifecycle| |Not vuln|Not vuln|Not vuln|Not vuln||| +|RSA|SecurID Governance and Lifecycle (SecurID G&L)| | |Not vuln| | ||[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| +|RSA|SecurID Governance and Lifecycle Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||| +|RSA|SecurID Governance and Lifecycle Cloud (SecurID G&L Cloud)| | |Not vuln| | ||[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| +|RSA|SecurID Identity Router| |Not vuln|Not vuln|Not vuln|Not vuln||| +|RSA|SecurID Identity Router (On-Prem component of Cloud Authentication Service)| | |Not vuln| | ||[source](https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501)| +|RSA Netwitness|All| | | | | ||[RSA Netwitness Community Link](https://community.rsa.com/t5/netwitness-platform-product/netwitness-apache-vulnerability-log4j2-cve-2021-44228-nbsp/ta-p/660540)| +|Rstudioapi|All|0.13|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/rstudio/rstudioapi)| |Rubrik|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[Rubrik Support Link](https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK)| -|Ruckus|FlexMaster| | |Vulnerable| | |"Additional details in PDF/Text (Sign-in Required)"|[source](https://support.ruckuswireless.com/security_bulletins/313)| -|Ruckus|SmartZone 100 (SZ-100)|5.1 to 6.0| |Vulnerable| | |"Additional details in PDF/Text (Sign-in Required)"|[source](https://support.ruckuswireless.com/security_bulletins/313)| -|Ruckus|SmartZone 144 (SZ-144)|5.1 to 6.0| |Vulnerable| | |"Additional details in PDF/Text (Sign-in Required)"|[source](https://support.ruckuswireless.com/security_bulletins/313)| -|Ruckus|SmartZone 300 (SZ-300)|5.1 to 6.0| |Vulnerable| | |"Additional details in PDF/Text (Sign-in Required)"|[source](https://support.ruckuswireless.com/security_bulletins/313)| -|Ruckus|Unleashed| | |Vulnerable| | |"Additional details in PDF/Text (Sign-in Required)"|[source](https://support.ruckuswireless.com/security_bulletins/313)| -|Ruckus|Virtual SmartZone (vSZ)|5.1 to 6.0| |Vulnerable| | |"Additional details in PDF/Text (Sign-in Required)"|[source](https://support.ruckuswireless.com/security_bulletins/313)| -|RunDeck by PagerDuty|All| | | | | | |[RunDeck Docs Link](https://docs.rundeck.com/docs/history/CVEs/)| -|RuneCast|Analyzer|6.0.4|Not vuln|Fix|Fix|Fix| |[source](https://www.runecast.com/blog/runecast-6-0-1-0-covers-apache-log4j-java-vulnerability)| +|Ruckus|FlexMaster| | |Vulnerable| | |Additional details in PDF/Text (Sign-in Required)|[source](https://support.ruckuswireless.com/security_bulletins/313)| +|Ruckus|SmartZone 100 (SZ-100)|5.1 to 6.0| |Vulnerable| | |Additional details in PDF/Text (Sign-in Required)|[source](https://support.ruckuswireless.com/security_bulletins/313)| +|Ruckus|SmartZone 144 (SZ-144)|5.1 to 6.0| |Vulnerable| | |Additional details in PDF/Text (Sign-in Required)|[source](https://support.ruckuswireless.com/security_bulletins/313)| +|Ruckus|SmartZone 300 (SZ-300)|5.1 to 6.0| |Vulnerable| | |Additional details in PDF/Text (Sign-in Required)|[source](https://support.ruckuswireless.com/security_bulletins/313)| +|Ruckus|Unleashed| | |Vulnerable| | |Additional details in PDF/Text (Sign-in Required)|[source](https://support.ruckuswireless.com/security_bulletins/313)| +|Ruckus|Virtual SmartZone (vSZ)|5.1 to 6.0| |Vulnerable| | |Additional details in PDF/Text (Sign-in Required)|[source](https://support.ruckuswireless.com/security_bulletins/313)| +|RunDeck by PagerDuty|All| | | | | ||[RunDeck Docs Link](https://docs.rundeck.com/docs/history/CVEs/)| +|RuneCast|Analyzer|6.0.4|Not vuln|Fix|Fix|Fix||[source](https://www.runecast.com/blog/runecast-6-0-1-0-covers-apache-log4j-java-vulnerability)| diff --git a/software/software_list_s.md b/software/software_list_s.md index 44ac0d8a8..9863625d8 100644 --- a/software/software_list_s.md +++ b/software/software_list_s.md @@ -7,26 +7,63 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|SAE-IT|All| | | | | | |[SAE-IT News Link](https://www.sae-it.com/nc/de/news/sicherheitsmeldungen.html)| -|SAE IT-systems|codeIT Runtime|All|Not vuln|Not vuln|Not vuln|Not vuln|labeled product, Manufacturer: CODESYS GmbH |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|codeIT Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln| labeled product, Manufacturer: CODESYS GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|connectIT|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|net-line series5|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|setIT|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|SG-50 / Kombisafe|All| |Not vuln| | | labeled product, Manufacturer: NSE AG |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|Straton Runtime|All| |Not vuln| | |labeled product, Manufacturer STRATON AUTOMATION |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|Straton Workbench|All| |Not vuln| | | labeled product, Manufacturer STRATON AUTOMATION |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|System-4|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|T10/T7 Touch panel|All| |Not vuln| | | labeled product, Manufacturer Garz & Fricke GmbH |[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|visIT Runtime|All|Not vuln|Not vuln|Not vuln|Not vuln| labeled product, Manufacturer Weidmüller GTI Software GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|SAE IT-systems|visIT Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln| labeled product, Manufacturer Weidmüller GTI Software GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| -|Safe Software|FME Desktop|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j)| -|Safe Software|FME Server| | |Investigation| | | |[source](https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j)| -|SAFE FME Server|All| | | | | | |[SAFE FME Server Community Link](https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j)| -|Sage|CRM|2020 R2, 2021 R1, and 2021 R2|Not vuln|Workaround| | |Sage has 3 patches in test|"[source](https://support.na.sage.com/selfservice/viewdocument.do?noCount=true&externalId=113739&sliceId=1&noCount=true&isLoadPublishedVer=&docType=kc&docTypeID=DT_Article&stateId=24595&cmd=displayKC&dialogID=1363294&ViewedDocsListHelper=com.kanisa.apps.common.BaseViewedDocsListHelperImpl&openedFromSearchResults=true)"| -|SailPoint|IdentityIQ|8.0 or later|Not vuln|Workaround| | | |[source](https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/m-p/206681#M342)| -|Salesforce|All| | |Investigation| | | |[source](https://status.salesforce.com/generalmessages/826)| -|Sangoma|All| | | | | | |[Sangoma Community Link](https://help.sangoma.com/community/s/article/Log4Shell)| +|SISCO|All| | | | | ||[link](https://sisconet.com/sisco-news/log4j/)| +|SMA Solar Technology AG|All| | | | | ||[link](https://files.sma.de/downloads/HK_Log4j-en-10.pdf?_ga=2.237963714.352491368.1640298543-2015796445.1640298540)| +|Samsung Electronics America|Knox Admin Portal| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox Asset Intelligence| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox Configure| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox E-FOTA One| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox Guard| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox License Management| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox Manage| | |Fix| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox Managed Services Provider (MSP)| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox Mobile Enrollment| | |Not vuln| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Samsung Electronics America|Knox Reseller Portal| | |Fix| | ||[link](https://www.samsungknox.com/en/blog/an-update-on-the-impact-of-the-apache-log4j-cve-2021-44228-vulnerability-on-samsung-knox-cloud-services)| +|Securonix|Extended Detection and Response (XDR)|All| |Vulnerable| | |Patching ongoing as of 12/10/2021|[link](https://www.securonix.com/wp-content/uploads/2021/12/CVE-2021-44228-Securonix-Cloud-Customer-Update.pdf)| +|Securonix|Next Gen SIEM|All| |Vulnerable| | |Patching ongoing as of 12/10/2021|[link](https://www.securonix.com/wp-content/uploads/2021/12/CVE-2021-44228-Securonix-Cloud-Customer-Update.pdf)| +|Securonix|SNYPR Application| | | | | ||[link](https://www.securonix.com/wp-content/uploads/2021/12/CVE-2021-44228-Securonix-OnPrem-Customer-Update.pdf)| +|Securonix|Security Analytics and Operations Platform (SOAR)|All| |Vulnerable| | |Patching ongoing as of 12/10/2021|[link](https://www.securonix.com/wp-content/uploads/2021/12/CVE-2021-44228-Securonix-Cloud-Customer-Update.pdf)| +|Securonix|User and Entity Behavior Analytics(UEBA)|All| |Vulnerable| | |Patching ongoing as of 12/10/2021|[link](https://www.securonix.com/wp-content/uploads/2021/12/CVE-2021-44228-Securonix-Cloud-Customer-Update.pdf)| +|ServiceTitan|All| | |Fix| | ||[link](https://security.servicetitan.com/)| +|Spacelabs Healthcare|ABP| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|CardioExpress| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|DM3 and DM4 Monitors| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|EVO| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Eclipse Pro| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Intesys Clinical Suite (ICS)| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Intesys Clinical Suite (ICS) Clinical Access Workstations| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Lifescreen Pro| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Pathfinder SL| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Qube| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Qube Mini| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|SafeNSound| | |Fix| | |Version >4.3.1 - Not Affected|[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Sentinel| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Spacelabs Cloud| | | | | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Ultraview SL| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Xhibit Telemetry Receiver (XTR)| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Xhibit, XC4| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|XprezzNet| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|Spacelabs Healthcare|Xprezzon| | |Not vuln| | ||[link](https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/)| +|SAE-IT|All| | | | | ||[SAE-IT News Link](https://www.sae-it.com/nc/de/news/sicherheitsmeldungen.html)| +|SAE IT-systems|codeIT Runtime|All|Not vuln|Not vuln|Not vuln|Not vuln|labeled product, Manufacturer: CODESYS GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|codeIT Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln|labeled product, Manufacturer: CODESYS GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|connectIT|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|net-line series5|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|setIT|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|SG-50 / Kombisafe|All| |Not vuln| | |labeled product, Manufacturer: NSE AG|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|Straton Runtime|All| |Not vuln| | |labeled product, Manufacturer STRATON AUTOMATION|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|Straton Workbench|All| |Not vuln| | |labeled product, Manufacturer STRATON AUTOMATION|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|System-4|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|T10/T7 Touch panel|All| |Not vuln| | |labeled product, Manufacturer Garz & Fricke GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|visIT Runtime|All|Not vuln|Not vuln|Not vuln|Not vuln|labeled product, Manufacturer Weidmüller GTI Software GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|SAE IT-systems|visIT Workbench|All|Not vuln|Not vuln|Not vuln|Not vuln|labeled product, Manufacturer Weidmüller GTI Software GmbH|[source](https://www.sae-it.com/nc/en/news/security-notifications.html?tx_saenews_saenews%5Bnews%5D=484&tx_saenews_saenews%5Baction%5D=show&tx_saenews_saenews%5Bcontroller%5D=News&cHash=ad11bc1ce9c7212cc27d45211b855e97)| +|Safe Software|FME Desktop|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j)| +|Safe Software|FME Server| | |Investigation| | ||[source](https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j)| +|SAFE FME Server|All| | | | | ||[SAFE FME Server Community Link](https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j)| +|Sage|CRM|2020 R2, 2021 R1, and 2021 R2|Not vuln|Workaround| | |Sage has 3 patches in test|[source](https://support.na.sage.com/selfservice/viewdocument.do?noCount=true&externalId=113739&sliceId=1&noCount=true&isLoadPublishedVer=&docType=kc&docTypeID=DT_Article&stateId=24595&cmd=displayKC&dialogID=1363294&ViewedDocsListHelper=com.kanisa.apps.common.BaseViewedDocsListHelperImpl&openedFromSearchResults=true)| +|SailPoint|IdentityIQ|8.0 or later|Not vuln|Workaround| | ||[source](https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/m-p/206681#M342)| +|Salesforce|All| | |Investigation| | ||[source](https://status.salesforce.com/generalmessages/826)| +|Sangoma|All| | | | | ||[Sangoma Community Link](https://help.sangoma.com/community/s/article/Log4Shell)| |SAP|BusinessObjects Business Intelligence| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|BusinessObjects Data Services| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|BusinessObjects Explorer| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| @@ -35,8 +72,8 @@ |SAP|Commerce|1905, 2005, 2105, 2011|Not vuln|Fix|Fix|Fix||[source](https://launchpad.support.sap.com/#/notes/3142773)| |SAP|Customer Checkout PoS / manager|2.0 FP09, 2.0 FP10, 2.0 FP11 PL06 (or lower) and 2.0 FP12 PL04 (or lower)|Not vuln|Fix|Fix| |SAP note 3130499|[source](https://launchpad.support.sap.com/#/notes/0003130499)| |SAP|Data Intelligence|3|Not vuln|Fix|Fix|Fix||[source](https://launchpad.support.sap.com/#/notes/3130920)| -|SAP|Dynamic Authorization Management|9.1.0.0, 2021.3|Not vuln|Fix|Fix|||[source](https://launchpad.support.sap.com/#/notes/3132922)| -|SAP|Hana Cockpit|<1.1.23|Not vuln|Fix|Fix|Fix| |[source](https://blogs.sap.com/2021/12/14/hana-xsa-log4j-cve-2021-44228/)| +|SAP|Dynamic Authorization Management|9.1.0.0, 2021.3|Not vuln|Fix|Fix| ||[source](https://launchpad.support.sap.com/#/notes/3132922)| +|SAP|Hana Cockpit|<1.1.23|Not vuln|Fix|Fix|Fix||[source](https://blogs.sap.com/2021/12/14/hana-xsa-log4j-cve-2021-44228/)| |SAP|HANA Database| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|HANA Smart Data Integration| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|HANA Spatial Service| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| @@ -46,75 +83,75 @@ |SAP|NetWeaver Application Server for ABAP| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|S/4 HANA Cloud Customer systems| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|S/4 HANA Digital Payments Add-On| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| -|SAP|S/4 HANA On-Premise on ABAP| | |Not vuln| | | |[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| +|SAP|S/4 HANA On-Premise on ABAP| | |Not vuln| | ||[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|SuccessFactors Litmos| | |Not vuln| | |(behind login)|[source](https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-left/sap-tc-01-5025.pdf)| |SAP|XS Advanced Runtime|1.0.140 or lower|Not vuln|Fix|Fix|Fix|SAP note 3130698|[source](https://launchpad.support.sap.com/#/notes/3130698)| |SAP Advanced Platform|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[SAP Advanced Platform Support Link](https://launchpad.support.sap.com/#/notes/3130698)| |SAP BusinessObjects|All| | | | | |The support document is available to customers only and has not been reviewed by CISA|[CVE-2021-44228 - Impact of Log4j vulnerability on SAP BusinessObjects](https://blogs.sap.com/2021/12/16/cve-2021-44228-impact-of-log4j-vulnerability-on-sap-businessobjects/) [SAP BusinessObjects Support Link](https://launchpad.support.sap.com/#/notes/3129956)| -|SAS|All| | | | | | |[SAS Support Link](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| -|SAS Institute|JMP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| -|SAS Institute|SAS Cloud Solutions| |Not vuln|Workaround| | | |[source](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| -|SAS Institute|SAS Profile| |Not vuln|Fix| | | |[source](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| -|SASSAFRAS|All| | | | | | |[SASSAFRAS Link](https://www.sassafras.com/log4j-vulnerability-cve-2021-44228/)| -|Savignano software solutions|All| | | | | | |[Savignano Link](https://savignano.atlassian.net/wiki/spaces/SNOTIFY/blog/2021/12/13/2839740417/No+Log4j+Vulnerability+in+S+Notify)| -|SBT|All|<1.5.6|Not vuln|Fix| | | |[Release 1.5.7 · sbt/sbt(github.com)](https://github.com/sbt/sbt/releases/tag/v1.5.7)| +|SAS|All| | | | | ||[SAS Support Link](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| +|SAS Institute|JMP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| +|SAS Institute|SAS Cloud Solutions| |Not vuln|Workaround| | ||[source](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| +|SAS Institute|SAS Profile| |Not vuln|Fix| | ||[source](https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html)| +|SASSAFRAS|All| | | | | ||[SASSAFRAS Link](https://www.sassafras.com/log4j-vulnerability-cve-2021-44228/)| +|Savignano software solutions|All| | | | | ||[Savignano Link](https://savignano.atlassian.net/wiki/spaces/SNOTIFY/blog/2021/12/13/2839740417/No+Log4j+Vulnerability+in+S+Notify)| +|SBT|All|<1.5.6|Not vuln|Fix| | ||[Release 1.5.7 · sbt/sbt(github.com)](https://github.com/sbt/sbt/releases/tag/v1.5.7)| |ScaleComputing|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[ScaleComputing Community Link](https://community.scalecomputing.com/s/article/Apache-Log4j-Vulnerability)| -|ScaleFusion MobileLock Pro|All| | | | | | |[ScaleFusion MobileLock Pro Help](https://help.mobilock.in/article/t9sx43yg44-scalefusion-security-advisory-for-apache-log-4-j-vulnerability-cve-2021-44228)| -|Schneider Electric|All other products| | |Investigation|Investigation| | |[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|APC PowerChute Business Edition|9.5,10.0,10.0.1-10.0.4|Not vuln|Workaround|Workaround| | |[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|APC PowerChute Network Shutdown|4.2-4.4,4.4.1|Not vuln|Workaround|Workaround| | |[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|ScaleFusion MobileLock Pro|All| | | | | ||[ScaleFusion MobileLock Pro Help](https://help.mobilock.in/article/t9sx43yg44-scalefusion-security-advisory-for-apache-log-4-j-vulnerability-cve-2021-44228)| +|Schneider Electric|All other products| | |Investigation|Investigation| ||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|APC PowerChute Business Edition|9.5,10.0,10.0.1-10.0.4|Not vuln|Workaround|Workaround| ||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|APC PowerChute Network Shutdown|4.2-4.4,4.4.1|Not vuln|Workaround|Workaround| ||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|EASYFIT|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|Ecoreal XL|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|EcoStruxure IT Expert| |Not vuln|Fix|Fix|Fix|"cloud-based offer; no customer action required"|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|EcoStruxure IT Gateway|1.13.2.3|Not vuln|Fix|Fix|Fix| |[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|Eurotherm Data Reviewer|V3.0.2 and prior|Not vuln|Workaround| | | |[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|Facility Expert Small Business| |Not vuln|Fix|Fix|Fix|"cloud-based offer; no customer action required"|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|Harmony Configurator| 34 |Not vuln|Fix|Fix|Fix||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|MSE Cloud||Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|NetBotz750/755|5.3.1|Not vuln|Fix|Fix| | |[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|EcoStruxure IT Expert| |Not vuln|Fix|Fix|Fix|cloud-based offer; no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|EcoStruxure IT Gateway|1.13.2.3|Not vuln|Fix|Fix|Fix||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|Eurotherm Data Reviewer|V3.0.2 and prior|Not vuln|Workaround| | ||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|Facility Expert Small Business| |Not vuln|Fix|Fix|Fix|cloud-based offer; no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|Harmony Configurator|34|Not vuln|Fix|Fix|Fix||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|MSE Cloud| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|NetBotz750/755|5.3.1|Not vuln|Fix|Fix| ||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|NEW630|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|SDK BOM|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|SDK-Docgen (Cloud)||Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|SDK-Docgen (Cloud)| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|SDK-TNC|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|SDK-UMS (Cloud)||Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|SDK-UMS (Cloud)| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|SDK3D-2DRenderer|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|SDK3D-360Widget|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|SDK3D2DRenderer|Current software and earlier| |Vulnerable| | | |[SE Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/)| -|Schneider Electric|SDK3D360Widget|Current software and earlier| |Vulnerable| | | |[SE Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/)| -|Schneider Electric|Select and Config DATA (Cloud)||Not vuln |Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|SNC-API (Cloud)||Not vuln |Fix|Fix|Fix |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|SNC-CMM (Cloud)||Not vuln |Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|SNC-SEMTECH (Cloud)||Not vuln |Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|SNCSEMTECH|Current software and earlier| |Vulnerable| | | |[SE Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/)| +|Schneider Electric|SDK3D2DRenderer|Current software and earlier| |Vulnerable| | ||[SE Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/)| +|Schneider Electric|SDK3D360Widget|Current software and earlier| |Vulnerable| | ||[SE Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/)| +|Schneider Electric|Select and Config DATA (Cloud)| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|SNC-API (Cloud)| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|SNC-CMM (Cloud)| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|SNC-SEMTECH (Cloud)| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|SNCSEMTECH|Current software and earlier| |Vulnerable| | ||[SE Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/)| |Schneider Electric|SPIMV3|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|SWBEditor|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| |Schneider Electric|SWBEngine|Current software and earlier| |Vulnerable|Vulnerable| |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|TwinBus IP (formerly Digides 2.0) (Cloud)||Not vuln |Fix|Fix|Fix |no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric|Wiser by SE platform (Cloud) | |Not vuln|Fix|Fix|Fix |"cloud-based offer; no customer action required"|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schneider Electric| Workplace Advisor|all |Not vuln|Vulnerable|Vulnerable|Vulnerable ||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| -|Schweitzer Engineering Laboratories|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[SEL Advisory Link](https://selinc.com/support/security-notifications/)| -|SCM Manager|All| | | | | | |[SCM Manager Link](https://scm-manager.org/blog/posts/2021-12-13-log4shell/)| -|Scootersoftware|Beyond Compare|All| |Not vuln| | | |[source](https://www.scootersoftware.com/index.php)| -|ScreenBeam|All| | | | | | |[ScreenBeam Article](https://customersupport.screenbeam.com/hc/en-us/articles/4416468085389-December-2021-Security-Alert-Log4j-CVE-2021-44228)| -|SDL worldServer|All| | | | | | |[SDL worldServer Link](https://gateway.sdl.com/apex/communityknowledge?articleName=000017707)| -|Seafile|Server| |Not vuln|Fix| | | |[source](https://forum.seafile.com/t/security-advisory-seafile-servers-vulnerability-to-log4shell-log4j-vulnerability-cve-2021-44228/15590)| -|Seagull Scientific|BarTender|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.seagullscientific.com/hc/en-us/articles/4415794235543-Apache-Log4Shell-Vulnerability)| -|SecurePoint|All| | | | | | |[SecurePoint News Link](https://www.securepoint.de/news/details/sicherheitsluecke-log4j-securepoint-loesungen-nicht-betroffen.html)| -|Security Onion|All| | | | | | |[Security Onion Blog Post](https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html)| -|Security Onion Solutions|Security Onion|2.3.90 20211210|Not vuln|Fix| | | |[source](https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html)| -|SecurityHive|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.securityhive.nl/security-info/securityhive-informs-log4j-vulnerable-customers-using-threat-intelligence/)| -|SecurityRoots|Dradis Professional|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/screenshotemail)| -|Seeburger|All| | | | | |This advisory is avaiable to customers only and has not been reviewed by CISA|"[Seeburger Service Desk Link](https://servicedesk.seeburger.de/portal/en-US/Knowledge/Article/?defId=101040&id=25486312&COMMAND=Open)"| -|SentinelOne|All| | | | | | |[SentinelOne Blog Post](https://www.sentinelone.com/blog/cve-2021-44228-staying-secure-apache-log4j-vulnerability/)| -|Sentry|All| | | | | | |[Sentry Blog Post](https://blog.sentry.io/2021/12/15/sentrys-response-to-log4j-vulnerability-cve-2021-44228)| +|Schneider Electric|TwinBus IP (formerly Digides 2.0) (Cloud)| |Not vuln|Fix|Fix|Fix|no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|Wiser by SE platform (Cloud)| |Not vuln|Fix|Fix|Fix|cloud-based offer; no customer action required|[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schneider Electric|Workplace Advisor|All|Not vuln|Vulnerable|Vulnerable|Vulnerable||[source](https://www.se.com/ww/en/download/document/SESB-2021-347-01/)| +|Schweitzer Engineering Laboratories|All| |Not vuln|Not vuln|Not vuln|Not vuln||[SEL Advisory Link](https://selinc.com/support/security-notifications/)| +|SCM Manager|All| | | | | ||[SCM Manager Link](https://scm-manager.org/blog/posts/2021-12-13-log4shell/)| +|Scootersoftware|Beyond Compare|All| |Not vuln| | ||[source](https://www.scootersoftware.com/index.php)| +|ScreenBeam|All| | | | | ||[ScreenBeam Article](https://customersupport.screenbeam.com/hc/en-us/articles/4416468085389-December-2021-Security-Alert-Log4j-CVE-2021-44228)| +|SDL worldServer|All| | | | | ||[SDL worldServer Link](https://gateway.sdl.com/apex/communityknowledge?articleName=000017707)| +|Seafile|Server| |Not vuln|Fix| | ||[source](https://forum.seafile.com/t/security-advisory-seafile-servers-vulnerability-to-log4shell-log4j-vulnerability-cve-2021-44228/15590)| +|Seagull Scientific|BarTender|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.seagullscientific.com/hc/en-us/articles/4415794235543-Apache-Log4Shell-Vulnerability)| +|SecurePoint|All| | | | | ||[SecurePoint News Link](https://www.securepoint.de/news/details/sicherheitsluecke-log4j-securepoint-loesungen-nicht-betroffen.html)| +|Security Onion|All| | | | | ||[Security Onion Blog Post](https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html)| +|Security Onion Solutions|Security Onion|2.3.90 20211210|Not vuln|Fix| | ||[source](https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html)| +|SecurityHive|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.securityhive.nl/security-info/securityhive-informs-log4j-vulnerable-customers-using-threat-intelligence/)| +|SecurityRoots|Dradis Professional|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/screenshotemail)| +|Seeburger|All| | | | | |This advisory is avaiable to customers only and has not been reviewed by CISA|[Seeburger Service Desk Link](https://servicedesk.seeburger.de/portal/en-US/Knowledge/Article/?defId=101040&id=25486312&COMMAND=Open)| +|SentinelOne|All| | | | | ||[SentinelOne Blog Post](https://www.sentinelone.com/blog/cve-2021-44228-staying-secure-apache-log4j-vulnerability/)| +|Sentry|All| | | | | ||[Sentry Blog Post](https://blog.sentry.io/2021/12/15/sentrys-response-to-log4j-vulnerability-cve-2021-44228)| |Sentry.io|Self Hosted and SaaS|All| |Not vuln| | |Not affected as it is written in Python and Rust. Makes use of unaffected versions of log4j 1.x in Kafka and Zookeeper subsystems|[source](https://blog.sentry.io/2021/12/15/sentrys-response-to-log4j-vulnerability-cve-2021-44228)| -|SEP|All| | | | | | |"[SEP Support Link](https://support.sep.de/otrs/public.pl?Action=PublicFAQZoom;ItemID=132)"| -|Server Eye|All| | | | | | |[Server Eye Blog Post](https://www.server-eye.de/blog/sicherheitsluecke-log4j-server-eye-systeme-sind-nicht-betroffen/)| -|ServiceNow|All| | | | | | |"[ServiceNow Support Link](https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959)"| -|Shibboleth|All|Identity Provider>=3.0, All other software versions|Not vuln|Not vuln|Not vuln|Not vuln| |[Log4j CVE (non)-impact](https://shibboleth.net/pipermail/announce/2021-December/000253.html)| -|Shibboleth|IdP/SP| | |Not vuln| | | |[source](https://shibboleth.net/pipermail/announce/2021-December/000253.html)| -|Shopify|All| | | | | | |[Shopify Community Link](https://community.shopify.com/c/technical-q-a/is-shopify-affected-by-the-log4j-vulnerability/td-p/1417625)| -|Siebel|All| | | | | | |[Siebel Link](https://www.siebelhub.com/main/2021/12/log4j-vulnerability-cve-2021-44228-and-siebel-crm.html)| +|SEP|All| | | | | ||[SEP Support Link](https://support.sep.de/otrs/public.pl?Action=PublicFAQZoom;ItemID=132)| +|Server Eye|All| | | | | ||[Server Eye Blog Post](https://www.server-eye.de/blog/sicherheitsluecke-log4j-server-eye-systeme-sind-nicht-betroffen/)| +|ServiceNow|All| | | | | ||[ServiceNow Support Link](https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959)| +|Shibboleth|All|Identity Provider>=3.0, All other software versions|Not vuln|Not vuln|Not vuln|Not vuln||[Log4j CVE (non)-impact](https://shibboleth.net/pipermail/announce/2021-December/000253.html)| +|Shibboleth|IdP/SP| | |Not vuln| | ||[source](https://shibboleth.net/pipermail/announce/2021-December/000253.html)| +|Shopify|All| | | | | ||[Shopify Community Link](https://community.shopify.com/c/technical-q-a/is-shopify-affected-by-the-log4j-vulnerability/td-p/1417625)| +|Siebel|All| | | | | ||[Siebel Link](https://www.siebelhub.com/main/2021/12/log4j-vulnerability-cve-2021-44228-and-siebel-crm.html)| |Siemens|Affected Products| | | | |x|Siemens requested to directly refer to their website: See pdf for the complete list of affected products, CSAF for automated parsing of data|[pdf](https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf) [CSAF](https://cert-portal.siemens.com/productcert/csaf/ssa-501673.json)| |Siemens|Affected Products| | |x|x| |Siemens requested to directly refer to their website: See pdf for the complete list of affected products, CSAF for automated parsing of data|[pdf](https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf) [CSAF](https://cert-portal.siemens.com/productcert/csaf/ssa-661247.json)| |Siemens Energy|Affected Products| | |x|x| |Siemens requested to directly refer to their website: See pdf for the complete list of affected products, CSAF for automated parsing of data|[pdf](https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf) [CSAF](https://cert-portal.siemens.com/productcert/csaf/ssa-714170.json)| @@ -130,17 +167,17 @@ |Siemens Healthineers|go.Sim, Som10 VA30 / VA40| | |Vulnerable| | |Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| |Siemens Healthineers|go.Top, Som10 VA20 / VA20A_SP5 / VA30 / VA40| | |Vulnerable| | |Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| |Siemens Healthineers|go.Up, Som10 VA10 / VA20 / VA30 / VA40| | |Vulnerable| | |Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM AERA 1,5T, MAGNETOM PRISMA, MAGNETOM PRISMA FIT, MAGNETOM SKYRA 3T NUMARIS/X VA30A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Altea NUMARIS/X VA20A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM ALTEA, MAGNETOM LUMINA, MAGNETOM SOLA, MAGNETOM VIDA NUMARIS/X VA31A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Amira NUMARIS/X VA12M| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Free.Max NUMARIS/X VA40| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Lumina NUMARIS/X VA20A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Sempra NUMARIS/X VA12M| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Sola fit NUMARIS/X VA20A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Sola NUMARIS/X VA20A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Vida fit NUMARIS/X VA20A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Siemens Healthineers|MAGNETOM Vida NUMARIS/X VA10A* / VA20A| | |Vulnerable| | |"LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected."|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM AERA 1,5T, MAGNETOM PRISMA, MAGNETOM PRISMA FIT, MAGNETOM SKYRA 3T NUMARIS/X VA30A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Altea NUMARIS/X VA20A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM ALTEA, MAGNETOM LUMINA, MAGNETOM SOLA, MAGNETOM VIDA NUMARIS/X VA31A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Amira NUMARIS/X VA12M| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Free.Max NUMARIS/X VA40| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Lumina NUMARIS/X VA20A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Sempra NUMARIS/X VA12M| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Sola fit NUMARIS/X VA20A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Sola NUMARIS/X VA20A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Vida fit NUMARIS/X VA20A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| +|Siemens Healthineers|MAGNETOM Vida NUMARIS/X VA10A* / VA20A| | |Vulnerable| | |LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| |Siemens Healthineers|SENSIS DMCC / DMCM / TS / VM / PPWS / DS VD12A| | |Vulnerable| | |evaluation ongoing|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| |Siemens Healthineers|Somatom Emotion Som5 VC50| | |Vulnerable| | |evaluation ongoing|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| |Siemens Healthineers|Somatom Scope Som5 VC50| | |Vulnerable| | |evaluation ongoing|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| @@ -152,306 +189,306 @@ |Siemens Healthineers|syngo.via WebViewer VA13B / VA20A / VA20B| | |Vulnerable| | |Workaround: remove the vulnerable class from the .jar file|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| |Siemens Healthineers|X.Ceed Somaris 10 VA40*| | |Vulnerable| | |Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| |Siemens Healthineers|X.Cite Somaris 10 VA30*/VA40*| | |Vulnerable| | |Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network.|[Siemens Healthineers](https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/cve-2021-44228)| -|Sierra Wireless|All| | | | | | |[Sierra Wireless Security Bulletin](https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2021-007/)| -|Signald|All| | | | | | |[Signald Gitlab](https://gitlab.com/signald/signald/-/issues/259)| +|Sierra Wireless|All| | | | | ||[Sierra Wireless Security Bulletin](https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2021-007/)| +|Signald|All| | | | | ||[Signald Gitlab](https://gitlab.com/signald/signald/-/issues/259)| |Silver Peak|Orchestrator, Silver Peak GMS| | |Vulnerable| | |Customer managed Orchestrator and legacy GMS products are affected by this vulnerability. This includes on-premise and customer managed instances running in public cloud services such as AWS, Azure, Google, or Oracle Cloud. See Corrective Action Required for details about how to mitigate this exploit.|[Security Advisory Notice Apache](https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf)| |SingleWire|All| | | | | |This advisory is available to customers only and has not been reviewed by CISA|[SingleWire Support Link](https://support.singlewire.com/s/article/Apache-Log4j2-vulnerability-CVE-2021-44228)| -|Sitecore|Boxever| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|CDP| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Content Hub| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Discover| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Managed Cloud|customers who bring their own Solr|Not vuln|Workaround| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Managed Cloud|customers who do not use Solr| |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Managed Cloud|customers who host Solr using SearchStax| |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Moosend| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|OrderCloud| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Personalize| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|Send| | |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|XP|<= 9.1 (with SOLR as Content Search provider)| |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|XP|>= 9.2 (with SOLR as Content Search provider)|Not vuln|Workaround| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Sitecore|XP|all (with Azure Search as Content Search provider)| |Not vuln| | | |"[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)"| -|Skillable|All| | | | | | |[Skillable Link](https://skillable.com/log4shell/)| -|SLF4J|All| | | | | | |[SLF4J Link](http://slf4j.org/log4shell.html)| -|Slurm|All|20.11.8|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://slurm.schedmd.com/documentation.html)| -|Smartbear|SoapUI|<= 5.6.0| |Vulnerable| | | |[source](https://community.smartbear.com/t5/SoapUI-Open-Source-Questions/Log4j-CVE-2021-44228-Zero-Day-Vulnerability-SOAP-UI-V5-6-0-or/m-p/227418)| -|SmileCDR|All| | | | | | |[SmileCDR Blog Post](https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228)| -| Smiths Medical| CADD®-Solis Download Software| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| CADD-Solis Ambulatory Infusion Pump Model 2110| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| CADD-Solis Communication Module Model 2130| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| CADD-Solis Communication Module Model 2131| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| CADD-Solis Network Configuration Utility Software| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| Medfusion 3500 Pump Download Utility (DL3500)| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| Medfusion 3500 Syringe Infusion Pump| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| Medfusion 4000 Syringe Infusion Pump| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| Medfusion® 4000 Pump Download Utility (DL4000)| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| PharmGuard Administrator Medication Safety Software| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| PharmGuard Device Reports Software| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| PharmGuard Interoperability Software| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| PharmGuard Toolbox 2 Software| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -| Smiths Medical| PharmGuard® Server Infusion Management Software| | Not vuln| Not vuln| Not vuln| Not vuln| | [source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| -|Sn0m|All| | | | | | |[Sn0m Link](https://www.snom.com/en/press/log4j-poses-no-threat-snom-phones/)| -|Snakemake|All|6.12.1|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://snakemake.readthedocs.io/en/stable/)| -|Snow Software | Snow Commander | 8.10.3 | Not vuln | Fix | Fix | Fix | | [source](https://community.snowsoftware.com/s/article/LOG4J-Vulnerability) | -|Snow Software | VM Access Proxy | 3.7 | Not vuln | Fix | Fix | Fix | | [source](https://community.snowsoftware.com/s/article/LOG4J-Vulnerability) | -|Snowflake|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Snowflake Community Link](https://community.snowflake.com/s/article/No-Snowflake-exposure-to-Apache-Log4j-vulnerability-CVE-2021-44228)| -|Snyk|Cloud Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[Snyk Updates](https://updates.snyk.io/snyk%27s-cloud-platform-all-clear-from-log4j-exploits-216499)| -|Software AG|All| | | | | | |[Software AG](https://tech.forums.softwareag.com/t/log4j-zero-day-vulnerability/253849)| +|Sitecore|Boxever| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|CDP| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Content Hub| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Discover| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Managed Cloud|customers who bring their own Solr|Not vuln|Workaround| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Managed Cloud|customers who do not use Solr| |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Managed Cloud|customers who host Solr using SearchStax| |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Moosend| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|OrderCloud| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Personalize| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|Send| | |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|XP|<= 9.1 (with SOLR as Content Search provider)| |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|XP|>= 9.2 (with SOLR as Content Search provider)|Not vuln|Workaround| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Sitecore|XP|all (with Azure Search as Content Search provider)| |Not vuln| | ||[source](https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391)| +|Skillable|All| | | | | ||[Skillable Link](https://skillable.com/log4shell/)| +|SLF4J|All| | | | | ||[SLF4J Link](http://slf4j.org/log4shell.html)| +|Slurm|All|20.11.8|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://slurm.schedmd.com/documentation.html)| +|Smartbear|SoapUI|<= 5.6.0| |Vulnerable| | ||[source](https://community.smartbear.com/t5/SoapUI-Open-Source-Questions/Log4j-CVE-2021-44228-Zero-Day-Vulnerability-SOAP-UI-V5-6-0-or/m-p/227418)| +|SmileCDR|All| | | | | ||[SmileCDR Blog Post](https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228)| +|Smiths Medical|CADD®-Solis Download Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|CADD-Solis Ambulatory Infusion Pump Model 2110| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|CADD-Solis Communication Module Model 2130| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|CADD-Solis Communication Module Model 2131| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|CADD-Solis Network Configuration Utility Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|Medfusion 3500 Pump Download Utility (DL3500)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|Medfusion 3500 Syringe Infusion Pump| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|Medfusion 4000 Syringe Infusion Pump| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|Medfusion® 4000 Pump Download Utility (DL4000)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|PharmGuard Administrator Medication Safety Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|PharmGuard Device Reports Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|PharmGuard Interoperability Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|PharmGuard Toolbox 2 Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Smiths Medical|PharmGuard® Server Infusion Management Software| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.smiths-medical.com/company-information/smiths-medical-cyber-security-updates)| +|Sn0m|All| | | | | ||[Sn0m Link](https://www.snom.com/en/press/log4j-poses-no-threat-snom-phones/)| +|Snakemake|All|6.12.1|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://snakemake.readthedocs.io/en/stable/)| +|Snow Software|Snow Commander|8.10.3|Not vuln|Fix|Fix|Fix||[source](https://community.snowsoftware.com/s/article/LOG4J-Vulnerability)| +|Snow Software|VM Access Proxy|3.7|Not vuln|Fix|Fix|Fix||[source](https://community.snowsoftware.com/s/article/LOG4J-Vulnerability)| +|Snowflake|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Snowflake Community Link](https://community.snowflake.com/s/article/No-Snowflake-exposure-to-Apache-Log4j-vulnerability-CVE-2021-44228)| +|Snyk|Cloud Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[Snyk Updates](https://updates.snyk.io/snyk%27s-cloud-platform-all-clear-from-log4j-exploits-216499)| +|Software AG|All| | | | | ||[Software AG](https://tech.forums.softwareag.com/t/log4j-zero-day-vulnerability/253849)| |SolarWinds|Database Performance Analyzer (DPA)|2021.1.x, 2021.3.x, 2022.1.x| |Vulnerable| | |Workarounds available, hotfix under development|[Apache Log4j Critical Vulnerability (CVE-2021-44228)](https://www.solarwinds.com/trust-left/security-advisories/cve-2021-44228) [Database Performance Analyzer (DPA) and the Apache Log4j Vulnerability (CVE-2021-44228)](https://support.solarwinds.com/SuccessCenter/s/article/Database-Performance-Analyzer-DPA-and-the-Apache-Log4j-Vulnerability-CVE-2021-44228)| -|SolarWinds|Orion Platform core| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.solarwinds.com/trust-left/security-advisories/cve-2021-44228)| -|SolarWinds|Server & Application Monitor (SAM)|SAM 2020.2.6 and later| |Vulnerable| | |Workarounds available, hotfix under development|"[Apache Log4j Critical Vulnerability (CVE-2021-44228)](https://www.solarwinds.com/trust-left/security-advisories/cve-2021-44228) [Server & Application Monitor (SAM) and the Apache Log4j Vulnerability (CVE-2021-44228)](https://support.solarwinds.com/SuccessCenter/s/article/Server-Application-Monitor-SAM-and-the-Apache-Log4j-Vulnerability-CVE-2021-44228?language=en_US)"| -|Soliton Systems|MailZen Management - Cloud Service|All|Not vuln|Fix| | | |[source](https://status.solitonsystems.com/)| -|Soliton Systems|MailZen Management Portal - On-Premise|2.36.2, 2.37.3, 2.38.2|Not vuln|Fix| | | |[source](https://blog.solitonsystems.com/news/update-on-log4j-vulnerability#:~:text=mailzen%20management%20portal%20%E2%80%93%20on-premise)| -|Soliton Systems|MailZen Push Server|All|Not vuln|Fix| | | |[source](https://status.solitonsystems.com/)| -|Soliton Systems|Other products|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.solitonsystems.com/news/update-on-log4j-vulnerability)| -|SonarSource|SonarCloud| |Not vuln|Fix| | | |[source](https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721)| -|SonarSource|SonarQube| |Not vuln|Workaround| | | |[source](https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721)| -|Sonatype|All| | | | | | |[Sonatype Vulnerability Statement](https://blog.sonatype.com/a-new-0-day-log4j-vulnerability-discovered-in-the-wild)| -|SonicWall|Access Points| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Analytics| | |Not vuln|Not vuln|Not vuln|update based on v2.3 of advisory |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Capture Client & Capture Client Portal| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Capture Security Appliance| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|CAS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SolarWinds|Orion Platform core| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.solarwinds.com/trust-left/security-advisories/cve-2021-44228)| +|SolarWinds|Server & Application Monitor (SAM)|SAM 2020.2.6 and later| |Vulnerable| | |Workarounds available, hotfix under development|[Apache Log4j Critical Vulnerability (CVE-2021-44228)](https://www.solarwinds.com/trust-left/security-advisories/cve-2021-44228) [Server & Application Monitor (SAM) and the Apache Log4j Vulnerability (CVE-2021-44228)](https://support.solarwinds.com/SuccessCenter/s/article/Server-Application-Monitor-SAM-and-the-Apache-Log4j-Vulnerability-CVE-2021-44228?language=en_US)| +|Soliton Systems|MailZen Management - Cloud Service|All|Not vuln|Fix| | ||[source](https://status.solitonsystems.com/)| +|Soliton Systems|MailZen Management Portal - On-Premise|2.36.2, 2.37.3, 2.38.2|Not vuln|Fix| | ||[source](https://blog.solitonsystems.com/news/update-on-log4j-vulnerability#:~:text=mailzen%20management%20portal%20%E2%80%93%20on-premise)| +|Soliton Systems|MailZen Push Server|All|Not vuln|Fix| | ||[source](https://status.solitonsystems.com/)| +|Soliton Systems|Other products|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.solitonsystems.com/news/update-on-log4j-vulnerability)| +|SonarSource|SonarCloud| |Not vuln|Fix| | ||[source](https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721)| +|SonarSource|SonarQube| |Not vuln|Workaround| | ||[source](https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721)| +|Sonatype|All| | | | | ||[Sonatype Vulnerability Statement](https://blog.sonatype.com/a-new-0-day-log4j-vulnerability-discovered-in-the-wild)| +|SonicWall|Access Points| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Analytics| | |Not vuln|Not vuln|Not vuln|update based on v2.3 of advisory|[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Capture Client & Capture Client Portal| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Capture Security Appliance| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|CAS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| |SonicWall|Cloud Edge| | |Not vuln|Not vuln|Not vuln|based on v2.3 of advisory|[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| |SonicWall|CSCMA| | |Not vuln|Not vuln|Not vuln|based on v2.3 of advisory|[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| |SonicWall|Email Security|10.0.13| |Fix|Fix|Fix|based on version 2.3 of advisory|[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| |SonicWall|EPRS| | |Not vuln|Not vuln|Not vuln|based on version 2.3 of advisory|[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Gen5 Firewalls (EOS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Gen6 Firewalls| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Gen7 Firewalls| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|GMS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|MSW| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Gen5 Firewalls (EOS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Gen6 Firewalls| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Gen7 Firewalls| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|GMS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|MSW| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| |SonicWall|NSM On-Premise|2.3.2-R12-H2| |Fix|Fix|Fix|based on version 2.3 of advisory|[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|SMA 100| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|SMA 1000| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|SonicCore| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|Switch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|WAF| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|WNM| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|SonicWall|WXA| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| -|Sophos|Central| | |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|Cloud Optix| |Not vuln|Fix| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|Firewall|All| |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|SonicWall|SMA 100| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|SMA 1000| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|SonicCore| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|Switch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|WAF| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|WNM| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|SonicWall|WXA| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032)| +|Sophos|Central| | |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|Cloud Optix| |Not vuln|Fix| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|Firewall|All| |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| |Sophos|Firewall (all versions)| |Not vuln|Not vuln|Not vuln|Not vuln|Sophos Firewall does not use Log4j.|[Advisory: Log4J zero-day vulnerability AKA Log4Shell (CVE-2021-44228) Sophos](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|Home| | |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|Mobile| | |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|Mobile EAS Proxy|9.7.2|Not vuln|Fix| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|Reflexion| | |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|SG UTM|All| |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|Home| | |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|Mobile| | |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|Mobile EAS Proxy|9.7.2|Not vuln|Fix| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|Reflexion| | |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|SG UTM|All| |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| |Sophos|SG UTM (all versions)| |Not vuln|Not vuln|Not vuln|Not vuln|Sophos SG UTM does not use Log4j.|[Advisory: Log4J zero-day vulnerability AKA Log4Shell (CVE-2021-44228) Sophos](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|SG UTM Manager (SUM)|All| |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|Sophos|SG UTM Manager (SUM)|All| |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| |Sophos|SG UTM Manager (SUM) (all versions)|All|Not vuln|Not vuln|Not vuln|Not vuln|SUM does not use Log4j.|[Advisory: Log4J zero-day vulnerability AKA Log4Shell (CVE-2021-44228) Sophos](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|Sophos|ZTNA| | |Not vuln| | | |[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| -|SOS (Berlin)|Jobscheduler|1.12.15, 1.13.10, 2.2.0, 2.1.3|Not vuln|Fix| | | |[source](https://www.sos-berlin.com/en/news-maintenance-releases-and-patches-mitigation-log4j-vulnerabilities)| -|SOS Berlin|All| | | | | | |[SOS Berlin Link](https://www.sos-berlin.com/en/news-mitigation-log4j-vulnerability)| -|Spambrella|All| | | | | | |[Spambrella FAQ Link](https://www.spambrella.com/faq/status-of-spambrella-products-with-cve-2021-44228/)| -|Specops Software|All| | |Not vuln| | | |[source](https://specopssoft.com/blog/apache-log4j-vulnerability/)| -|Spectralink|All| | |Not vuln|Not vuln|Not vuln|using version 1.2.17|"[source](https://support.spectralink.com/system/tdf/resource_files/CS-21-04%20Security%20Vulnerability%20Log4j2.pdf?file=1&type=node&id=3242867)"| -|Spigot|All| | | | | | |[Spigot Security Release](https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/)| -|Splunk|Add-On for Java Management Extensions App ID 2647|5.2.0 and older| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Add-On for JBoss App ID 2954|3.0.0 and older| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Add-On for Tomcat App ID 2911|3.0.0 and older| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Add-On: Java Management Extensions|5.2.1|Not vuln|Fix| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Add-On: JBoss|3.0.1|Not vuln|Fix| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Add-On: Tomcat|3.0.1|Not vuln|Fix| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Admin Config Service|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Analytics Workspace|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Application Performance Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Augmented Reality|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Behavior Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Cloud Data Manager (SCDM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Connect for Kafka|<2.0.4|Not vuln|Fix| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Connect for Kubernetes|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Connect for SNMP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Connect for Syslog|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Dashboard Studio|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Data Stream Processor|DSP 1.0.x, DSP 1.1.x, DSP 1.2.x| |Vulnerable| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|DB Connect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Developer Tools: AppInspect|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Enterprise|All supported non-Windows versions of 8.1.x and 8.2.x only if Hadoop (Hunk) and/or DFS are used.|Not vuln|Workaround| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Enterprise (including instance types like Heavy Forwarders)|All supported non-Windows versions of 8.1.x and 8.2.x only if DFS is used. See Removing Log4j from Splunk Enterprise below for guidance on unsupported versions.| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Enterprise Amazon Machine Image (AMI)|see Splunk Enterprise|Not vuln|Workaround| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Enterprise Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Enterprise Docker Container|see Splunk Enterprise|Not vuln|Workaround| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Enterprise Security|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Heavyweight Forwarder (HWF)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Infrastructure Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Intelligence Management (TruSTAR)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|IT Essentials Work App ID 5403|4.11, 4.10.x (Cloud only), 4.9.x| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|IT Service Intelligence (ITSI)|4.11.2, 4.10.4, 4.9.6, 4.7.4|Not vuln|Fix| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|IT Service Intelligence (ITSI) App ID 1841|4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|KV Service|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Log Observer|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Logging Library for Java|<1.11.1|Not vuln|Fix| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Mint|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Mission Control|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|MLTK|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Mobile|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Network Performance Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|On-call / VictorOps|Current| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|On-Call/Victor Ops|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Open Telemetry Distributions|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Operator for Kubernetes|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|OVA for VMWare App ID 3216|4.0.3 and older| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|OVA for VMWare Metrics App ID 5096|4.2.1 and older| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Profiling|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Real User Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Secure Gateway (Spacebridge)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Security Analytics for AWS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|SignalFx Smart Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|SOAR (On-Premises)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|SOAR Cloud (Phantom)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Stream Processor Service|Current| |Vulnerable| | | |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Synthetics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|TV|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|UBA OVA Software|5.0.3a, 5.0.0| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|Universal Forwarder (UF)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|User Behavior Analytics (UBA)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Splunk|VMWare OVA for ITSI App ID 4760|1.1.1 and older| |Vulnerable| | | |[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| -|Sprecher Automation|SPRECON-E|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| -|Sprecher Automation|SPRECON-EDIR|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| -|Sprecher Automation|SPRECON-SG|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| -|Sprecher Automation|SPRECON-V|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| +|Sophos|ZTNA| | |Not vuln| | ||[source](https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce)| +|SOS (Berlin)|Jobscheduler|1.12.15, 1.13.10, 2.2.0, 2.1.3|Not vuln|Fix| | ||[source](https://www.sos-berlin.com/en/news-maintenance-releases-and-patches-mitigation-log4j-vulnerabilities)| +|SOS Berlin|All| | | | | ||[SOS Berlin Link](https://www.sos-berlin.com/en/news-mitigation-log4j-vulnerability)| +|Spambrella|All| | | | | ||[Spambrella FAQ Link](https://www.spambrella.com/faq/status-of-spambrella-products-with-cve-2021-44228/)| +|Specops Software|All| | |Not vuln| | ||[source](https://specopssoft.com/blog/apache-log4j-vulnerability/)| +|Spectralink|All| | |Not vuln|Not vuln|Not vuln|using version 1.2.17|[source](https://support.spectralink.com/system/tdf/resource_files/CS-21-04%20Security%20Vulnerability%20Log4j2.pdf?file=1&type=node&id=3242867)| +|Spigot|All| | | | | ||[Spigot Security Release](https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/)| +|Splunk|Add-On for Java Management Extensions App ID 2647|5.2.0 and older| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Add-On for JBoss App ID 2954|3.0.0 and older| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Add-On for Tomcat App ID 2911|3.0.0 and older| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Add-On: Java Management Extensions|5.2.1|Not vuln|Fix| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Add-On: JBoss|3.0.1|Not vuln|Fix| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Add-On: Tomcat|3.0.1|Not vuln|Fix| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Admin Config Service|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Analytics Workspace|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Application Performance Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Augmented Reality|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Behavior Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Cloud Data Manager (SCDM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Connect for Kafka|<2.0.4|Not vuln|Fix| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Connect for Kubernetes|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Connect for SNMP|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Connect for Syslog|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Dashboard Studio|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Data Stream Processor|DSP 1.0.x, DSP 1.1.x, DSP 1.2.x| |Vulnerable| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|DB Connect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Developer Tools: AppInspect|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Enterprise|All supported non-Windows versions of 8.1.x and 8.2.x only if Hadoop (Hunk) and/or DFS are used.|Not vuln|Workaround| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Enterprise (including instance types like Heavy Forwarders)|All supported non-Windows versions of 8.1.x and 8.2.x only if DFS is used. See Removing Log4j from Splunk Enterprise below for guidance on unsupported versions.| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Enterprise Amazon Machine Image (AMI)|see Splunk Enterprise|Not vuln|Workaround| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Enterprise Cloud|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Enterprise Docker Container|see Splunk Enterprise|Not vuln|Workaround| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Enterprise Security|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Heavyweight Forwarder (HWF)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Infrastructure Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Intelligence Management (TruSTAR)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|IT Essentials Work App ID 5403|4.11, 4.10.x (Cloud only), 4.9.x| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|IT Service Intelligence (ITSI)|4.11.2, 4.10.4, 4.9.6, 4.7.4|Not vuln|Fix| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|IT Service Intelligence (ITSI) App ID 1841|4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|KV Service|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Log Observer|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Logging Library for Java|<1.11.1|Not vuln|Fix| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Mint|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Mission Control|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|MLTK|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Mobile|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Network Performance Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|On-call / VictorOps|Current| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|On-Call/Victor Ops|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Open Telemetry Distributions|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Operator for Kubernetes|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|OVA for VMWare App ID 3216|4.0.3 and older| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|OVA for VMWare Metrics App ID 5096|4.2.1 and older| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Profiling|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Real User Monitoring|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Secure Gateway (Spacebridge)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Security Analytics for AWS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|SignalFx Smart Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|SOAR (On-Premises)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|SOAR Cloud (Phantom)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Stream Processor Service|Current| |Vulnerable| | ||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Synthetics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|TV|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|UBA OVA Software|5.0.3a, 5.0.0| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|Universal Forwarder (UF)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|User Behavior Analytics (UBA)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Splunk|VMWare OVA for ITSI App ID 4760|1.1.1 and older| |Vulnerable| | ||[Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046)](https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html)| +|Sprecher Automation|SPRECON-E|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| +|Sprecher Automation|SPRECON-EDIR|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| +|Sprecher Automation|SPRECON-SG|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| +|Sprecher Automation|SPRECON-V|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.sprecher-automation.com/en/it-security/security-alerts)| |Spring|Boot| | | | | |Spring Boot users are only affected by this vulnerability if they have switched the default logging system to Log4J2|[source](https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot)| -|Spring Boot|All| | | | | | |[Spring Boot Vulnerability Statement](https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot)| +|Spring Boot|All| | | | | ||[Spring Boot Vulnerability Statement](https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot)| |Stackstate|Agent| |Not vuln|Workaround| | |StackState Agent distributed as an RPM, DEB or MSI package contains a vulnerable Log4j library.|[source](https://support.stackstate.com/hc/en-us/articles/4412242847506-Apache-Log4j2-Remote-Code-Execution-RCE-Vulnerability-CVE-2021-44228)| |Stackstate|All|4.3.x, 4.4.x, 4.5.x and SaaS|Not vuln|Workaround| | |StackState ships with a version of Elasticsearch that contains a vulnerable Log4j library.|[source](https://support.stackstate.com/hc/en-us/articles/4412242847506-Apache-Log4j2-Remote-Code-Execution-RCE-Vulnerability-CVE-2021-44228)| -|Stardog|All|<7.8.1|Not vuln|Fix| | | |[source](https://community.stardog.com/t/stardog-7-8-1-available/3411)| -|STERIS|Advantage| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Advantage Plus| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO 2000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO 3000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO 400 MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO 400 SMALL STEAM STERILIZERS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO 5000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO 600 MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO 7000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO CENTURY MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO CENTURY SMALL STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO EAGLE 3000 SERIES STAGE 3 STEAM STERILIZERS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO EVOLUTION FLOOR LOADER STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|AMSCO EVOLUTION MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Canexis 1.0| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|CELERITY HP INCUBATOR| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|CELERITY STEAM INCUBATOR| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|CER Optima| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Clarity Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Connect Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|ConnectAssure Technology| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|ConnectoHIS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|CS-iQ Sterile Processing Workflow| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|DSD Edge| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|DSD-201,| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|EndoDry| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Endora| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Harmony iQ Integration Systems| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Harmony iQ Perspectives Image Management System| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|HexaVue| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|HexaVue Integration System| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|IDSS Integration System| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|RapidAER| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|ReadyTracker| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|RealView Visual Workflow Management System| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|RELIANCE 444 WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|RELIANCE SYNERGY WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|RELIANCE VISION 1300 SERIES CART AND UTENSIL WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|RELIANCE VISION MULTI- CHAMBER WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|RELIANCE VISION SINGLE CHAMBER WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Renatron| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|ScopeBuddy+| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|SecureCare ProConnect Technical Support Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|Situational Awareness for Everyone Display (S.A.F.E.)| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|SPM Surgical Asset Tracking Software| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|SYSTEM 1 endo LIQUID CHEMICAL STERILANT PROCESSING SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|V-PRO 1 LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|V-PRO 1 PLUS LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|V-PRO MAX 2 LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|V-PRO MAX LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|V-PRO S2 LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|STERIS|VERIFY INCUBATOR FOR ASSERT SELF-CONTAINED BIOLOGICAL INDICATORS| |Not vuln|Not vuln|Not vuln|Not vuln| |[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| -|Sterling Order IBM|All| | | | | | |[IBM Statement](https://www.ibm.com/support/pages/node/6525544)| -|Storagement|All| | | | | | |"[Storagement](https://www.storagement.de/index.php?action=topicofthemonth&site=log4j)"| -|StormShield|All other products| | | | Not vuln | Not vuln | Advisory only mentions CVE-2021-44228, CVE-2021-45046 |[StormShield Security Alert](https://www.stormshield.com/news/log4shell-security-alert-stormshield-product-response/)| -|StormShield|Visibility Center| v1.6.1 | Not vuln | Fix | Fix | Not vuln | |[source](https://advisories.stormshield.eu/2021-073/)| -|StrangeBee TheHive & Cortex|All| | | | | | |[StrangeBee Statement](https://blog.strangebee.com/apache-log4j-cve-2021-44228/)| -|Stratodesk|NoTouch|4.5.231|Not vuln|Fix| | | |[source](http://cdn.stratodesk.com/repository/notouch-left/10/4.5.231/0/ReleaseNotes-Stratodesk-NoTouch_Center-4.5.231.html)| -|Strimzi|All| | | | | | |[Strimzi Statement](https://strimzi.io/blog/2021/12/14/strimzi-and-log4shell/)| -|Stripe|All| | | | | | |[Stripe Support](https://support.stripe.com/questions/update-for-apache-log4j-vulnerability-(cve-2021-44228))| -|Styra|All| | | | | | |[Styra Security Notice](https://blog.styra.com/blog/newest-log4j-security-vulnerability-cve-2021-44228-log4shell)| -|Sumo logic|Sumu logic|19.361-12|Not vuln|Fix| | | |[source](https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12)| -|SumoLogic|All| | | | | | |[Sumologic Release Notes](https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12)| -|Sumologic|All| | | | | | |[Sumologic Statement](https://docs.google.com/document/d/e/2PACX-1vSdeODZ2E5k0aZgHm06OJWhDQWgtxxB0ZIrTsuQjg5xaoxlogmTVGdOWoSFtDlZBdHzY6ET6k6Sk-g1/pub)| -|SuperMicro|BIOS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|BMC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|SCC Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|SCC PODM|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|SMCIPMITool|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|SUM Service (SUM_SERVER)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|Super Diagnostics Offline|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|SuperCloud Composer (SCC)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|Stardog|All|<7.8.1|Not vuln|Fix| | ||[source](https://community.stardog.com/t/stardog-7-8-1-available/3411)| +|STERIS|Advantage| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Advantage Plus| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO 2000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO 3000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO 400 MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO 400 SMALL STEAM STERILIZERS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO 5000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO 600 MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO 7000 SERIES WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO CENTURY MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO CENTURY SMALL STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO EAGLE 3000 SERIES STAGE 3 STEAM STERILIZERS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO EVOLUTION FLOOR LOADER STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|AMSCO EVOLUTION MEDIUM STEAM STERILIZER| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Canexis 1.0| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|CELERITY HP INCUBATOR| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|CELERITY STEAM INCUBATOR| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|CER Optima| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Clarity Software| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Connect Software| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|ConnectAssure Technology| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|ConnectoHIS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|CS-iQ Sterile Processing Workflow| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|DSD Edge| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|DSD-201,| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|EndoDry| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Endora| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Harmony iQ Integration Systems| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Harmony iQ Perspectives Image Management System| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|HexaVue| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|HexaVue Integration System| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|IDSS Integration System| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|RapidAER| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|ReadyTracker| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|RealView Visual Workflow Management System| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|RELIANCE 444 WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|RELIANCE SYNERGY WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|RELIANCE VISION 1300 SERIES CART AND UTENSIL WASHER DISINFECTORS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|RELIANCE VISION MULTI- CHAMBER WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|RELIANCE VISION SINGLE CHAMBER WASHER DISINFECTOR| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Renatron| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|ScopeBuddy+| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|SecureCare ProConnect Technical Support Services| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|Situational Awareness for Everyone Display (S.A.F.E.)| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|SPM Surgical Asset Tracking Software| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|SYSTEM 1 endo LIQUID CHEMICAL STERILANT PROCESSING SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|V-PRO 1 LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|V-PRO 1 PLUS LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|V-PRO MAX 2 LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|V-PRO MAX LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|V-PRO S2 LOW TEMPERATURE STERILIZATION SYSTEM| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|STERIS|VERIFY INCUBATOR FOR ASSERT SELF-CONTAINED BIOLOGICAL INDICATORS| |Not vuln|Not vuln|Not vuln|Not vuln||[STERIS Advisory Link](https://h-isac.org/wp-content/uploads/2021/12/Steris_Revised-Security-Advisory-For-Apaches-Log4j-12.16.21.pdf)| +|Sterling Order IBM|All| | | | | ||[IBM Statement](https://www.ibm.com/support/pages/node/6525544)| +|Storagement|All| | | | | ||[Storagement](https://www.storagement.de/index.php?action=topicofthemonth&site=log4j)| +|StormShield|All other products| | | |Not vuln|Not vuln|Advisory only mentions CVE-2021-44228, CVE-2021-45046|[StormShield Security Alert](https://www.stormshield.com/news/log4shell-security-alert-stormshield-product-response/)| +|StormShield|Visibility Center|v1.6.1|Not vuln|Fix|Fix|Not vuln||[source](https://advisories.stormshield.eu/2021-073/)| +|StrangeBee TheHive & Cortex|All| | | | | ||[StrangeBee Statement](https://blog.strangebee.com/apache-log4j-cve-2021-44228/)| +|Stratodesk|NoTouch|4.5.231|Not vuln|Fix| | ||[source](http://cdn.stratodesk.com/repository/notouch-left/10/4.5.231/0/ReleaseNotes-Stratodesk-NoTouch_Center-4.5.231.html)| +|Strimzi|All| | | | | ||[Strimzi Statement](https://strimzi.io/blog/2021/12/14/strimzi-and-log4shell/)| +|Stripe|All| | | | | ||[Stripe Support](https://support.stripe.com/questions/update-for-apache-log4j-vulnerability-(cve-2021-44228))| +|Styra|All| | | | | ||[Styra Security Notice](https://blog.styra.com/blog/newest-log4j-security-vulnerability-cve-2021-44228-log4shell)| +|Sumo logic|Sumu logic|19.361-12|Not vuln|Fix| | ||[source](https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12)| +|SumoLogic|All| | | | | ||[Sumologic Release Notes](https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12)| +|Sumologic|All| | | | | ||[Sumologic Statement](https://docs.google.com/document/d/e/2PACX-1vSdeODZ2E5k0aZgHm06OJWhDQWgtxxB0ZIrTsuQjg5xaoxlogmTVGdOWoSFtDlZBdHzY6ET6k6Sk-g1/pub)| +|SuperMicro|BIOS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|BMC|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|SCC Analytics|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|SCC PODM|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|SMCIPMITool|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|SUM Service (SUM_SERVER)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|Super Diagnostics Offline|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|SuperCloud Composer (SCC)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| |SuperMicro|Supermicro Power Manager (SPM)|All| |Vulnerable| | |Upgrade to Log4j 2.15.0. Release pending ASAP|[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|Supermicro Server Manager (SSM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|Supermicro SuperDoctor (SD5)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|Supermicro Update Manager (SUM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|SuperMicro|vCenter Plug-in|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| -|Superna EYEGLASS|All| | | | | | |[Superna EYEGLASS Technical Advisory](https://manuals.supernaeyeglass.com/project-technical-advisories-all-products/HTML/technical-advisories.html#h2__1912345025)| -|Suprema Inc|All| | | | | | |[Suprema Inc](https://www.supremainc.com/en/)| -|SUSE|Linux Enterprise server|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/)| -|SUSE|Manager|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/)| +|SuperMicro|Supermicro Server Manager (SSM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|Supermicro SuperDoctor (SD5)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|Supermicro Update Manager (SUM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|SuperMicro|vCenter Plug-in|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.supermicro.com/en/support/security/Apache_log4j2)| +|Superna EYEGLASS|All| | | | | ||[Superna EYEGLASS Technical Advisory](https://manuals.supernaeyeglass.com/project-technical-advisories-all-products/HTML/technical-advisories.html#h2__1912345025)| +|Suprema Inc|All| | | | | ||[Suprema Inc](https://www.supremainc.com/en/)| +|SUSE|Linux Enterprise server|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/)| +|SUSE|Manager|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/)| |SUSE|Openstack Cloud|All| |Vulnerable| | |will get update|[source](https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/)| -|SUSE|Rancher|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/)| -|Sweepwidget|All| | | | | | |[Sweepwidget Statement](https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032)| -|Swyx|All| | | | | | |[Swyx Advisory](https://service.swyx.net/hc/de/articles/4412323539474)| -|Synacor|Zimbra|8.8.15 and 9.x|Not vuln|Not vuln|Not vuln|Not vuln|Zimbra stated (in their private support portal) they're not vulnerable. Currently supported Zimbra versions ship 1.2.6|"[source](https://forums.zimbra.org/viewtopic.php?f=15&t=70240&start=10#p303354)"| -|Synchro MSP|All| | | | | | |[Synchro MSP Advisory](https://community.syncromsp.com/t/log4j-rce-cve-2021-4428/1350)| -|Syncplify|All| | | | | | |[Syncplify Advisory](https://blog.syncplify.com/no-we-are-not-affected-by-log4j-vulnerability/)| -|SyncRO Soft SRL|Batch Document Converter|3.2.1|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Git Client|3.0.1|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen Feedback Enterprise|2.0.1 build 2021122021|Not vuln|Fix|Fix|Fix| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen License Server|24.0 build 2021122016|Not vuln|Fix|Fix|Fix| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen PDF Chemistry|22.1 build 2021121712|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen PDF Chemistry|23.1 build 2021121413|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen PDF Chemistry|24.0 build 2021121611|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen SDK|22.1.0.6|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen SDK|23.1.0.4|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen SDK|24.0.0.2|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen Web Author Test Server Add-on|22.1.1|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen Web Author Test Server Add-on|23.1.2|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen Web Author Test Server Add-on|24.0.1|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Author|16.1-22.0|Not vuln|Workaround|Workaround|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Author|22.1 build 2021121715|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Author|23.1 build 2021121415|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Author|24.0 build 2021121518|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Content Fusion|2.0.3 build 2021121417|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Content Fusion|3.0.1 build 2021121414|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Content Fusion|4.1.4 build 2021121611|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Developer|16.1-22.0|Not vuln|Workaround|Workaround|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Developer|22.1 build 2021121715|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Developer|23.1 build 2021121415|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Developer|24.0 build 2021121518|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Editor|16.1-22.0|Not vuln|Workaround|Workaround|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Editor|22.1 build 2021121715|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Editor|23.1 build 2021121415|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Editor|24.0 build 2021121518|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Publishing Engine|22.1 build 2021121712|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Publishing Engine|23.1 build 2021121413|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Publishing Engine|24.0 build 2021121611|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Web Author|22.1.0.5 build 2021122014|Not vuln|Fix|Fix|Fix| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Web Author|23.1.1.3 build 2021122014|Not vuln|Fix|Fix|Fix| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML Web Author|24.0.0.3 build 2021122015|Not vuln|Fix|Fix|Fix| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML WebHelp|22.1 build 2021121712|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML WebHelp|23.1 build 2021121412|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Oxygen XML WebHelp|24.0 build 2021121511|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Web Author PDF Plugin|23.1.1.2|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|Web Author PDF Plugin|24.0.0.2|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|XSD to JSON Schema Converter|22.1.1|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|XSD to JSON Schema Converter|23.1.1|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| -|SyncRO Soft SRL|XSD to JSON Schema Converter|24.0.1|Not vuln|Fix|Fix|Vulnerable| |[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SUSE|Rancher|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/)| +|Sweepwidget|All| | | | | ||[Sweepwidget Statement](https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032)| +|Swyx|All| | | | | ||[Swyx Advisory](https://service.swyx.net/hc/de/articles/4412323539474)| +|Synacor|Zimbra|8.8.15 and 9.x|Not vuln|Not vuln|Not vuln|Not vuln|Zimbra stated (in their private support portal) they're not vulnerable. Currently supported Zimbra versions ship 1.2.6|[source](https://forums.zimbra.org/viewtopic.php?f=15&t=70240&start=10#p303354)| +|Synchro MSP|All| | | | | ||[Synchro MSP Advisory](https://community.syncromsp.com/t/log4j-rce-cve-2021-4428/1350)| +|Syncplify|All| | | | | ||[Syncplify Advisory](https://blog.syncplify.com/no-we-are-not-affected-by-log4j-vulnerability/)| +|SyncRO Soft SRL|Batch Document Converter|3.2.1|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Git Client|3.0.1|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen Feedback Enterprise|2.0.1 build 2021122021|Not vuln|Fix|Fix|Fix||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen License Server|24.0 build 2021122016|Not vuln|Fix|Fix|Fix||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen PDF Chemistry|22.1 build 2021121712|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen PDF Chemistry|23.1 build 2021121413|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen PDF Chemistry|24.0 build 2021121611|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen SDK|22.1.0.6|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen SDK|23.1.0.4|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen SDK|24.0.0.2|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen Web Author Test Server Add-on|22.1.1|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen Web Author Test Server Add-on|23.1.2|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen Web Author Test Server Add-on|24.0.1|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Author|16.1-22.0|Not vuln|Workaround|Workaround|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Author|22.1 build 2021121715|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Author|23.1 build 2021121415|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Author|24.0 build 2021121518|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Content Fusion|2.0.3 build 2021121417|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Content Fusion|3.0.1 build 2021121414|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Content Fusion|4.1.4 build 2021121611|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Developer|16.1-22.0|Not vuln|Workaround|Workaround|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Developer|22.1 build 2021121715|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Developer|23.1 build 2021121415|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Developer|24.0 build 2021121518|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Editor|16.1-22.0|Not vuln|Workaround|Workaround|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Editor|22.1 build 2021121715|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Editor|23.1 build 2021121415|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Editor|24.0 build 2021121518|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Publishing Engine|22.1 build 2021121712|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Publishing Engine|23.1 build 2021121413|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Publishing Engine|24.0 build 2021121611|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Web Author|22.1.0.5 build 2021122014|Not vuln|Fix|Fix|Fix||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Web Author|23.1.1.3 build 2021122014|Not vuln|Fix|Fix|Fix||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML Web Author|24.0.0.3 build 2021122015|Not vuln|Fix|Fix|Fix||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML WebHelp|22.1 build 2021121712|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML WebHelp|23.1 build 2021121412|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Oxygen XML WebHelp|24.0 build 2021121511|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Web Author PDF Plugin|23.1.1.2|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|Web Author PDF Plugin|24.0.0.2|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|XSD to JSON Schema Converter|22.1.1|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|XSD to JSON Schema Converter|23.1.1|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| +|SyncRO Soft SRL|XSD to JSON Schema Converter|24.0.1|Not vuln|Fix|Fix|Vulnerable||[CVE-2021-44228](https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html) [CVE-2021-45046](https://www.oxygenxml.com/security/advisory/CVE-2021-45046.html) [CVE-2021-450105](https://www.oxygenxml.com/security/advisory/CVE-2021-45105.html)| |Synology|DSM| |Not vuln|Not vuln|Not vuln|Not vuln|The base DSM is not affected. Software installed via the package manager may be vulnerable.|[source](https://www.synology.com/en-global/security/advisory/Synology_SA_21_30)| -|Synopsys|All| | | | | | |[Synopsys Advisory](https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228)| +|Synopsys|All| | | | | ||[Synopsys Advisory](https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228)| |syntevo|DeepGit|>= 4.0|Not vuln|Fix| | |3.0.x and older are vulnerable|[source](https://www.syntevo.com/blog/?p=5240)| |syntevo|SmartGit|>= 18.1|Not vuln|Fix| | |17.1.x and older are vulnerable|[source](https://www.syntevo.com/blog/?p=5240)| |syntevo|SmartSVN|>= 9.3|Not vuln|Fix| | |9.2.x and older are vulnerable|[source](https://www.syntevo.com/blog/?p=5240)| |syntevo|SmartSynchronize|>= 3.5|Not vuln|Fix| | |3.4.x and older are vulnerable|[source](https://www.syntevo.com/blog/?p=5240)| -|SysAid|All| |Not vuln|Fix| | | |[source](https://www.sysaid.com/lp/important-update-regarding-apache-log4j)| -|Sysdig|All| | | | | | |[source](https://sysdig.com/blog/cve-critical-vulnerability-log4j/)| +|SysAid|All| |Not vuln|Fix| | ||[source](https://www.sysaid.com/lp/important-update-regarding-apache-log4j)| +|Sysdig|All| | | | | ||[source](https://sysdig.com/blog/cve-critical-vulnerability-log4j/)| diff --git a/software/software_list_t.md b/software/software_list_t.md index 8cb1edd9f..d043c16e4 100644 --- a/software/software_list_t.md +++ b/software/software_list_t.md @@ -7,261 +7,269 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|Tableau|Bridge|20214.21.1214.2057|Not vuln|Fix| | | |[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| -|Tableau|Desktop|2021.4| |Vulnerable| | | |[source](https://www.tableau.com/support/releases/desktop/2021.4)| -|Tableau|Desktop|2021.4.1|Not vuln|Fix| | | |[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| -|Tableau|Prep|2021.4.2|Not vuln|Fix| | | |[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| -|Tableau|Prep Builder|The following versions and lower: 22021.4.1, 2021.3.2, 2021.2.2, 2021.1.4, 2020.4.1, 2020.3.3, 2020.2.3, 2020.1.5, 2019.4.2, 2019.3.2, 2019.2.3, 2019.1.4, 2018.3.3|Not vuln|Fix| | | |[Apache Log4j2 vulnerability (Log4shell)](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell)| -|Tableau|Public Desktop Client|The following versions and lower: 2021.4|Not vuln|Fix| | | |[Apache Log4j2 vulnerability (Log4shell)](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell)| -|Tableau|Reader|unkown|Not vuln|Fix| | | |[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| -|Tableau|Server|2021.2.5| |Vulnerable| | | |[source](https://www.tableau.com/support/releases/server/2021.2.5)| -|Tableau|Server|2021.4.1|Not vuln|Fix| | | |[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| -|Tailscale|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/tailscale/tailscale/issues/3550)| -|Talend|Component Kit| |Not vuln|Fix| | | |[source](https://jira.talendforge.org/browse/TCOMP-2054)| -|Tanium|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.tanium.com/s/article/How-Tanium-Can-Help-with-CVE-2021-44228-Log4Shell#_Toc90296319)| -|TARGIT|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Targit.png)| -|Tealium|All| |Not vuln|Fix| | | |[source](https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824)| -|TealiumIQ|All| | | | | | |[TealiumIQ Security Update](https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824)| -|TeamPasswordManager|All| | | | | | |[TeamPasswordManager Blog](https://teampasswordmanager.com/blog/log4j-vulnerability/)| +|Tridium|All| | | | | |Document access requires authentication. CISA is not able to validate vulnerability status.|[link](https://docs.niagara-community.com/bundle/TechBulletin2021/resource/Dec_13_2021_NiagaraNotExposed_Apache_log4j.pdf)| +|Tripp Lite|LX Platform devices (includes WEBCARDLX, WEBCARDLXMINI, SRCOOLNETLX, SRCOOLNET2LX and devices with pre-installed or embedded WEBCARDLX interfaces)| | | | | ||[link](https://assets.tripplite.com/software-support/log4j2-vulnerability.pdf)| +|Tripp Lite|PowerAlert Local (PAL)| | | | | |Some versions of PAL use log4j v1 which is NOT AFFECTED by the CVE-2021-44228 vulnerability.|[link](https://assets.tripplite.com/software-support/log4j2-vulnerability.pdf)| +|Tripp Lite|PowerAlert Network Management System (PANMS)| | | | | |Some versions of PAL use log4j v1 which is NOT AFFECTED by the CVE-2021-44228 vulnerability.|[link](https://assets.tripplite.com/software-support/log4j2-vulnerability.pdf)| +|Tripp Lite|PowerAlert Network Shutdown Agent (PANSA)| | | | | |Some versions of PANSA use log4j v1 which is NOT AFFECTED by the CVE-2021-44228 vulnerability.|[link](https://assets.tripplite.com/software-support/log4j2-vulnerability.pdf)| +|Tripp Lite|PowerAlertElement Manager (PAEM)|1.0.0| |Vulnerable| | |Tripp Lite will soon be issuing a patch in the form of PAEM 1.0.1 which will contain a patched version of Log4j2|[link](https://assets.tripplite.com/software-support/log4j2-vulnerability.pdf)| +|Tripp Lite|SNMPWEBCARD, SRCOOLNET, SRCOOLNET2 and devices with pre-installed or embedded SNMPWEBCARD| | | | | ||[link](https://assets.tripplite.com/software-support/log4j2-vulnerability.pdf)| +|Tripp Lite|TLNETCARD and associated software| | | | | ||[link](https://assets.tripplite.com/software-support/log4j2-vulnerability.pdf)| +|Tableau|Bridge|20214.21.1214.2057|Not vuln|Fix| | ||[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| +|Tableau|Desktop|2021.4| |Vulnerable| | ||[source](https://www.tableau.com/support/releases/desktop/2021.4)| +|Tableau|Desktop|2021.4.1|Not vuln|Fix| | ||[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| +|Tableau|Prep|2021.4.2|Not vuln|Fix| | ||[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| +|Tableau|Prep Builder|The following versions and lower: 22021.4.1, 2021.3.2, 2021.2.2, 2021.1.4, 2020.4.1, 2020.3.3, 2020.2.3, 2020.1.5, 2019.4.2, 2019.3.2, 2019.2.3, 2019.1.4, 2018.3.3|Not vuln|Fix| | ||[Apache Log4j2 vulnerability (Log4shell)](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell)| +|Tableau|Public Desktop Client|The following versions and lower: 2021.4|Not vuln|Fix| | ||[Apache Log4j2 vulnerability (Log4shell)](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell)| +|Tableau|Reader|unkown|Not vuln|Fix| | ||[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| +|Tableau|Server|2021.2.5| |Vulnerable| | ||[source](https://www.tableau.com/support/releases/server/2021.2.5)| +|Tableau|Server|2021.4.1|Not vuln|Fix| | ||[source](https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell) [fix](https://www.tableau.com/products/reader)| +|Tailscale|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/tailscale/tailscale/issues/3550)| +|Talend|Component Kit| |Not vuln|Fix| | ||[source](https://jira.talendforge.org/browse/TCOMP-2054)| +|Tanium|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.tanium.com/s/article/How-Tanium-Can-Help-with-CVE-2021-44228-Log4Shell#_Toc90296319)| +|TARGIT|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Targit.png)| +|Tealium|All| |Not vuln|Fix| | ||[source](https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824)| +|TealiumIQ|All| | | | | ||[TealiumIQ Security Update](https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824)| +|TeamPasswordManager|All| | | | | ||[TeamPasswordManager Blog](https://teampasswordmanager.com/blog/log4j-vulnerability/)| |Teamviewer|All| |Not vuln|Fix| | |Server-side hotfix deployed. No user interaction required|[source](https://www.teamviewer.com/en-us/trust-left/security-bulletins/hotfix-log4j2-issue/)| |Tech Software|OneAegis (f/k/a IRBManager)|All|Not vuln|Not vuln|Not vuln|Not vuln|OneAegis does not use Log4j.|[Log4j CVE-2021-44228 Vulnerability Impact Statement](https://support.techsoftware.com/hc/en-us/articles/4412825948179)| |Tech Software|SMART|All|Not vuln|Not vuln|Not vuln|Not vuln|SMART does not use Log4j.|[Log4j CVE-2021-44228 Vulnerability Impact Statement](https://support.techsoftware.com/hc/en-us/articles/4412825948179)| |Tech Software|Study Binders|All|Not vuln|Not vuln|Not vuln|Not vuln|Study Binders does not use Log4j.|[Log4j CVE-2021-44228 Vulnerability Impact Statement](https://support.techsoftware.com/hc/en-us/articles/4412825948179)| -|TechSmith|All| | | | | | |[TechSmith Article](https://support.techsmith.com/hc/en-us/articles/4416620527885?input_string=log4j)| -|TECLIB|GLPI|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://glpi-project.org/glpi-is-not-affected-by-the-log4j-vulnerability-cve-2021-44228/)| -|TECLIB|GLPI Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://glpi-project.org/glpi-is-not-affected-by-the-log4j-vulnerability-cve-2021-44228/)| -|TECLIB|GLPI Android Agent|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://glpi-project.org/glpi-is-not-affected-by-the-log4j-vulnerability-cve-2021-44228/)| -|Telestream|All| | | | | | |[Telestream Bulletin](http://www.telestream.net/telestream-support/Apache-Log4j2-Bulletin.htm)| -|Tenable|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.tenable.com/s/article/Log4Shell-FAQs)| -|Tesorion|Immunity-appliances and software|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tesorion.nl/en/posts/tesorion-products-not-vulnerable-to-log4j/)| +|TechSmith|All| | | | | ||[TechSmith Article](https://support.techsmith.com/hc/en-us/articles/4416620527885?input_string=log4j)| +|TECLIB|GLPI|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://glpi-project.org/glpi-is-not-affected-by-the-log4j-vulnerability-cve-2021-44228/)| +|TECLIB|GLPI Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://glpi-project.org/glpi-is-not-affected-by-the-log4j-vulnerability-cve-2021-44228/)| +|TECLIB|GLPI Android Agent|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://glpi-project.org/glpi-is-not-affected-by-the-log4j-vulnerability-cve-2021-44228/)| +|Telestream|All| | | | | ||[Telestream Bulletin](http://www.telestream.net/telestream-support/Apache-Log4j2-Bulletin.htm)| +|Tenable|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.tenable.com/s/article/Log4Shell-FAQs)| +|Tesorion|Immunity-appliances and software|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tesorion.nl/en/posts/tesorion-products-not-vulnerable-to-log4j/)| |Tesorion|SOC-appliances and software|All|Not vuln|Fix| | |Potential Log4j impact mitigated|[source](https://www.tesorion.nl/en/posts/tesorion-products-not-vulnerable-to-log4j/)| -|Thales|CADP/SafeNet Protect App (PA) - JCE| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Application Data Protection (CADP) – CAPI.net & Net Core| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Batch Data Transformation (BDT) 2.3| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Cloud Key Manager (CCKM) Appliance| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Cloud Key Manager (CCKM) Embedded| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Database Protection| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Transparent Encryption (CTE/VTE/CTE-U)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Vaulted Tokenization (CT-V) / SafeNet Tokenization Manager| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust Vaultless Tokenization (CTS, CT-VL)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|CipherTrust/SafeNet PDBCTL| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Crypto Command Center (CCC)| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Data Platform (TDP)(DDC)| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Data Protection on Demand| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Data Security Manager (DSM)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|KeySecure| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Luna EFT| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Luna Network, PCIe, Luna USB HSM and backup devices| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Luna SP| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|payShield 10k| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|payShield 9000| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|payShield Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|payShield Monitor| | |Investigation| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|ProtectServer HSMs| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet Authentication Client| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet eToken (all products)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet IDPrime Virtual| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet IDPrime(all products)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet LUKS| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet PKCS#11 and TDE| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet ProtectApp (PA) CAPI, .Net & Net Core| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet ProtectDB (PDB)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Safenet ProtectFile and ProtectFile- Fuse| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet ProtectV| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet SQL EKM| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet Transform Utility (TU)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet Trusted Access (STA)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SafeNet Vaultless Tokenization| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|SAS on Prem (SPE/PCE)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel Connect| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel EMS Enterprise aaS| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel EMS Enterprise OnPremise| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel Envelope| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel ESDaaS| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel HASP, Legacy dog, Maze, Hardlock| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel LDK EMS (LDK-EMS)| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel LDKaas (LDK-EMS)| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel Professional Services components (both Thales hosted & hosted on-premises by customers)| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel RMS| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel SCL| | |Vulnerable| | | |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel Superdog, SuperPro, UltraPro, SHK| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Sentinel Up| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Vormetirc Key Manager (VKM)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Vormetric Application Encryption (VAE)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Vormetric Protection for Terradata Database (VPTD)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|Thales|Vormetric Tokenization Server (VTS)| |Not vuln|Not vuln|Not vuln|Not vuln| |"[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)"| -|The Linux Foundation|StackStorm (ST2)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://github.com/StackStorm/st2/discussions/5503)| -|The Linux Foundation|XCP-ng|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact)| -|TheGreenBow|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.thegreenbow.com/en/societe/actualites/log4shell-security-notice-thegreenbow-vpns-not-affected/)| +|Thales|CADP/SafeNet Protect App (PA) - JCE| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Application Data Protection (CADP) – CAPI.net & Net Core| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Batch Data Transformation (BDT) 2.3| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Cloud Key Manager (CCKM) Appliance| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Cloud Key Manager (CCKM) Embedded| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Database Protection| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Transparent Encryption (CTE/VTE/CTE-U)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Vaulted Tokenization (CT-V) / SafeNet Tokenization Manager| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust Vaultless Tokenization (CTS, CT-VL)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|CipherTrust/SafeNet PDBCTL| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Crypto Command Center (CCC)| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Data Platform (TDP)(DDC)| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Data Protection on Demand| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Data Security Manager (DSM)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|KeySecure| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Luna EFT| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Luna Network, PCIe, Luna USB HSM and backup devices| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Luna SP| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|payShield 10k| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|payShield 9000| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|payShield Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|payShield Monitor| | |Investigation| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|ProtectServer HSMs| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet Authentication Client| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet eToken (all products)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet IDPrime Virtual| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet IDPrime(all products)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet LUKS| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet PKCS#11 and TDE| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet ProtectApp (PA) CAPI, .Net & Net Core| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet ProtectDB (PDB)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Safenet ProtectFile and ProtectFile- Fuse| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet ProtectV| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet SQL EKM| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet Transform Utility (TU)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet Trusted Access (STA)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SafeNet Vaultless Tokenization| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|SAS on Prem (SPE/PCE)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel Connect| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel EMS Enterprise aaS| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel EMS Enterprise OnPremise| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel Envelope| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel ESDaaS| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel HASP, Legacy dog, Maze, Hardlock| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel LDK EMS (LDK-EMS)| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel LDKaas (LDK-EMS)| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel Professional Services components (both Thales hosted & hosted on-premises by customers)| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel RMS| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel SCL| | |Vulnerable| | ||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel Superdog, SuperPro, UltraPro, SHK| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Sentinel Up| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Vormetirc Key Manager (VKM)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Vormetric Application Encryption (VAE)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Vormetric Protection for Terradata Database (VPTD)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|Thales|Vormetric Tokenization Server (VTS)| |Not vuln|Not vuln|Not vuln|Not vuln||[Thales Support](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=12acaed3dbd841105d310573f3961953&sysparm_article=KB0025297)| +|The Linux Foundation|StackStorm (ST2)|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://github.com/StackStorm/st2/discussions/5503)| +|The Linux Foundation|XCP-ng|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact)| +|TheGreenBow|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.thegreenbow.com/en/societe/actualites/log4shell-security-notice-thegreenbow-vpns-not-affected/)| |TheHive|All|All|Not vuln|Not vuln|Not vuln|Not vuln|Safety release done removing log4j, despite not being vulnerable|[source](https://twitter.com/StrangeBee/status/1472854290943381504)| -|TheHive|Cortex|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.strangebee.com/apache-log4j-cve-2021-44228/)| -|Thermo Fisher Scientific|All| | | | | | |[Thermo Fisher Scientific Advisory Link](https://corporate.thermofisher.com/us/en/index/about/information-security/Protecting-Our-Products.html)| +|TheHive|Cortex|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.strangebee.com/apache-log4j-cve-2021-44228/)| +|Thermo Fisher Scientific|All| | | | | ||[Thermo Fisher Scientific Advisory Link](https://corporate.thermofisher.com/us/en/index/about/information-security/Protecting-Our-Products.html)| |Thermo-Calc|All|2018a and earlier|Not vuln|Not vuln|Not vuln|Not vuln|Use the program as normal|[Thermo-Calc Advisory Link](https://thermocalc.com/blog/thermo-calc-response-to-apache-log4j-2-vulnerability/)| |Thermo-Calc|All|2018b to 2021a|Not vuln|Not vuln|Not vuln|Not vuln|Use the program as normal, delete the Log4j 2 files in the program installation if required, see advisory for instructions.|[Thermo-Calc Advisory Link](https://thermocalc.com/blog/thermo-calc-response-to-apache-log4j-2-vulnerability/)| |Thermo-Calc|All|2021b|Not vuln|Not vuln|Not vuln|Not vuln|Use the program as normal|[Thermo-Calc Advisory Link](https://thermocalc.com/blog/thermo-calc-response-to-apache-log4j-2-vulnerability/)| |Thermo-Calc|All|2022a|Not vuln|Not vuln|Not vuln|Not vuln|Use the program as normal, Install the 2022a patch when available|[Thermo-Calc Advisory Link](https://thermocalc.com/blog/thermo-calc-response-to-apache-log4j-2-vulnerability/)| -|THK Group|FlinQ|All| |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| -|THK Group|FlinQ Foresight|All| |Vulnerable| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| -|THK Group|Fore!|All| |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| -|THK Group|iProtect|All| |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| -|THK Group|VDG Sense|All| |Not vuln| | | |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| +|THK Group|FlinQ|All| |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| +|THK Group|FlinQ Foresight|All| |Vulnerable| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| +|THK Group|Fore!|All| |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| +|THK Group|iProtect|All| |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| +|THK Group|VDG Sense|All| |Not vuln| | ||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/thkgroup.png)| |Thomson Reuters|HighQ Appliance|<3.5|Not vuln|Fix| | |Reported by vendor - Documentation is in vendor's client portal (login required). This advisory is available to customer only and has not been reviewed by CISA.|[source](https://highqsolutions.zendesk.com)| -|ThreatLocker|All| | | | | | |[ThreatLocker Log4j Statement](https://threatlocker.kb.help/log4j-vulnerability/)| -|ThycoticCentrify|Account Lifecycle Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|ThycoticCentrify|Cloud Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|ThycoticCentrify|Connection Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|ThycoticCentrify|DevOps Secrets Vault| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|ThycoticCentrify|Password Reset Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|ThycoticCentrify|Privilege Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|ThycoticCentrify|Privileged Behavior Analytics| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|ThycoticCentrify|Secret Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| -|Tibco|All| | | | | | |[Tibco Support Link](https://www.tibco.com/support/notices/2021/12/apache-log4j-vulnerability-update)| -|Tools4ever|HelloID|All| |Not vuln| | | |[source](https://forum.helloid.com/forum/main-forum/642-log4j-vulnerability)| -|Top Gun Technology (TGT)|All| | | | | | |[TGT Bulletin](https://www.topgun-tech.com/technical-bulletin-apache-software-log4j-security-vulnerability-cve-2021-44228/)| -|TOPdesk|On-Premises Classic|All| |Not vuln| | |Although the standard product is not vulnerable, we advise our customers to scan for vulnerabilies if they modified the product, installed add-ons or bespoke work|[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/TOPdesk.png)| -|TOPdesk|On-Premises Virtual Appliance|All| |Not vuln| | |Although the standard product is not vulnerable, we advise our customers to scan for vulnerabilies if they modified the product, installed add-ons or bespoke work|[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/TOPdesk.png)| -|TOPdesk|SaaS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/TOPdesk.png)| -|Topicus Security|Topicus KeyHub|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://blog.topicus-keyhub.com/topicus-keyhub-is-not-vulnerable-to-cve-2021-44228/)| -|Topix|All| | | | | | |[Topix Statement](https://www.topix.de/de/technik/systemfreigaben.html)| -|Tosibox|All| |Not vuln|Fix| | | |[source](https://helpdesk.tosibox.com/support/solutions/articles/2100050946-security-advisory-on-vulnerability-in-apache-log4j-library-cve-2021-44228)| -|TP-Link|Omada SDN Controller (Linux)|4.4.8|Not vuln|Fix| | | |[source](https://community.tp-link.com/en/business/forum/topic/514452)| -|TP-Link|Omada SDN Controller (Windows)|5.0.29|Not vuln|Fix| | | |[source](https://community.tp-link.com/en/business/forum/topic/514452)| +|ThreatLocker|All| | | | | ||[ThreatLocker Log4j Statement](https://threatlocker.kb.help/log4j-vulnerability/)| +|ThycoticCentrify|Account Lifecycle Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|ThycoticCentrify|Cloud Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|ThycoticCentrify|Connection Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|ThycoticCentrify|DevOps Secrets Vault| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|ThycoticCentrify|Password Reset Server| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|ThycoticCentrify|Privilege Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|ThycoticCentrify|Privileged Behavior Analytics| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|ThycoticCentrify|Secret Server| |Not vuln|Not vuln|Not vuln|Not vuln||[ThycoticCentrify Products NOT Affected by CVE-2021-44228 Exploit](https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md)| +|Tibco|All| | | | | ||[Tibco Support Link](https://www.tibco.com/support/notices/2021/12/apache-log4j-vulnerability-update)| +|Tools4ever|HelloID|All| |Not vuln| | ||[source](https://forum.helloid.com/forum/main-forum/642-log4j-vulnerability)| +|Top Gun Technology (TGT)|All| | | | | ||[TGT Bulletin](https://www.topgun-tech.com/technical-bulletin-apache-software-log4j-security-vulnerability-cve-2021-44228/)| +|TOPdesk|On-Premises Classic|All| |Not vuln| | |Although the standard product is not vulnerable, we advise our customers to scan for vulnerabilies if they modified the product, installed add-ons or bespoke work|[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/TOPdesk.png)| +|TOPdesk|On-Premises Virtual Appliance|All| |Not vuln| | |Although the standard product is not vulnerable, we advise our customers to scan for vulnerabilies if they modified the product, installed add-ons or bespoke work|[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/TOPdesk.png)| +|TOPdesk|SaaS|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/TOPdesk.png)| +|Topicus Security|Topicus KeyHub|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://blog.topicus-keyhub.com/topicus-keyhub-is-not-vulnerable-to-cve-2021-44228/)| +|Topix|All| | | | | ||[Topix Statement](https://www.topix.de/de/technik/systemfreigaben.html)| +|Tosibox|All| |Not vuln|Fix| | ||[source](https://helpdesk.tosibox.com/support/solutions/articles/2100050946-security-advisory-on-vulnerability-in-apache-log4j-library-cve-2021-44228)| +|TP-Link|Omada SDN Controller (Linux)|4.4.8|Not vuln|Fix| | ||[source](https://community.tp-link.com/en/business/forum/topic/514452)| +|TP-Link|Omada SDN Controller (Windows)|5.0.29|Not vuln|Fix| | ||[source](https://community.tp-link.com/en/business/forum/topic/514452)| |TPLink|Omega Controller|Linux/Windows(all)|Not vuln|Fix| | |Update is Beta. Reddit: overwritten vulnerable log4j with 2.15 files as potential workaround. Though that should now be done with 2.16|[Statement on Apache Log4j Vulnerability](https://www.tp-link.com/us/support/faq/3255)| -|Trend Micro|5G Mobile Network Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|ActiveUpdate| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Apex Central (including as a Service)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Apex One (all versions including SaaS, Mac, and Edge Relay)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud App Security| | |Fix| | | |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud Edge| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud One - Application Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud One - Common Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud One - Conformity| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud One - Container Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud One - File Storage Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud One - Network Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud One - Workload Secuity| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Cloud Sandbox| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Deep Discovery Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Deep Discovery Director|5.3 CP B1228, 5.2 CP B1400|Not vuln|Fix|Fix|Fix|5.3 CP1228 replaces the previous B1225. Customers may upgrade from any 5.3 build 1225 or below to the latest CP1228. Please note that all versions of Trend Micro Deep Discovery Director 5.1 SP1 and below have officially reached End-of-Life (EOL) and no patch will be made available. |[source](https://success.trendmicro.com/solution/000290055)| -|Trend Micro|Deep Discovery Email Inspector| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Deep Discovery Inspector| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Deep Discovery Web Inspector| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Deep Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Email Security & HES| |Not vuln|Fix| | | |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Endpoint Encryption| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Endpoint Sensor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Fraudbuster| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Home Network Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Housecall| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|ID Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Instant Messaging Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Internet Security for Mac (Consumer)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Interscan Messaging Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Interscan Messaging Security Virtual Appliance (IMSVA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Interscan Web Security Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Interscan Web Security Virtual Appliance (IWSVA)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Mobile Security for Android| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Mobile Security for Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Mobile Security for iOS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|MyAccount (Consumer Sign-on)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Network Viruswall| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|OfficeScan| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Password Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Phish Insight| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Policy Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Portable Security| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|PortalProtect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Public Wifi Protection / VPN Proxy One Pro| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Remote Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Rescue Disk| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Rootkit Buster| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Safe Lock (TXOne Edition)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Safe Lock 2.0| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Sandbox as a Service| |Not vuln|Fix| | | |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|ScanMail for Domino| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|ScanMail for Exchange| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Security (Consumer)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Security for NAS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|ServerProtect (all versions)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Smart Home Network| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Smart Protection Complete| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Smart Protection for Endpoints| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Smart Protection Server (SPS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint Accessories| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint IPS (N-, NX- and S-series)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint Network Protection (AWS & Azure)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint SMS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint Threat Management Center (TMC)| |Not vuln|Fix| | | |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint ThreatDV| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint TPS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint TX-Series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint Virtual SMS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TippingPoint Virtual TPS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TMUSB| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TXOne (Edge Series)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|TXOne (Stekkar Series)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Virtual Patch for Endpoint| | |Investigation| | | |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Vision One| |Not vuln|Fix| | | |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Web Security| |Not vuln|Fix| | | |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Worry-Free Business Security (on-prem)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|Trend Micro|Worry-Free Business Security Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://success.trendmicro.com/solution/000289940)| -|TrendMicro|All| | |Investigation| | | |[source](https://success.trendmicro.com/solution/000289940)| -|tribe29|Check_MK| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643)| -|Tricentis Tosca|All| | | | | | |"[Tricentis Tosca Statement](https://support-hub.tricentis.com/open?number=NEW0001148&id=post)"| +|Trend Micro|5G Mobile Network Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|ActiveUpdate| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Apex Central (including as a Service)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Apex One (all versions including SaaS, Mac, and Edge Relay)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud App Security| | |Fix| | ||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud Edge| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud One - Application Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud One - Common Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud One - Conformity| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud One - Container Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud One - File Storage Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud One - Network Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud One - Workload Secuity| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Cloud Sandbox| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Deep Discovery Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Deep Discovery Director|5.3 CP B1228, 5.2 CP B1400|Not vuln|Fix|Fix|Fix|5.3 CP1228 replaces the previous B1225. Customers may upgrade from any 5.3 build 1225 or below to the latest CP1228. Please note that all versions of Trend Micro Deep Discovery Director 5.1 SP1 and below have officially reached End-of-Life (EOL) and no patch will be made available.|[source](https://success.trendmicro.com/solution/000290055)| +|Trend Micro|Deep Discovery Email Inspector| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Deep Discovery Inspector| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Deep Discovery Web Inspector| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Deep Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Email Security & HES| |Not vuln|Fix| | ||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Endpoint Encryption| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Endpoint Sensor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Fraudbuster| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Home Network Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Housecall| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|ID Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Instant Messaging Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Internet Security for Mac (Consumer)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Interscan Messaging Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Interscan Messaging Security Virtual Appliance (IMSVA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Interscan Web Security Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Interscan Web Security Virtual Appliance (IWSVA)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Mobile Security for Android| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Mobile Security for Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Mobile Security for iOS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|MyAccount (Consumer Sign-on)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Network Viruswall| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|OfficeScan| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Password Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Phish Insight| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Policy Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Portable Security| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|PortalProtect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Public Wifi Protection / VPN Proxy One Pro| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Remote Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Rescue Disk| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Rootkit Buster| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Safe Lock (TXOne Edition)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Safe Lock 2.0| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Sandbox as a Service| |Not vuln|Fix| | ||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|ScanMail for Domino| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|ScanMail for Exchange| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Security (Consumer)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Security for NAS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|ServerProtect (all versions)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Smart Home Network| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Smart Protection Complete| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Smart Protection for Endpoints| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Smart Protection Server (SPS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint Accessories| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint IPS (N-, NX- and S-series)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint Network Protection (AWS & Azure)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint SMS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint Threat Management Center (TMC)| |Not vuln|Fix| | ||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint ThreatDV| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint TPS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint TX-Series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint Virtual SMS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TippingPoint Virtual TPS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TMUSB| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TXOne (Edge Series)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|TXOne (Stekkar Series)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Virtual Patch for Endpoint| | |Investigation| | ||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Vision One| |Not vuln|Fix| | ||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Web Security| |Not vuln|Fix| | ||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Worry-Free Business Security (on-prem)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|Trend Micro|Worry-Free Business Security Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://success.trendmicro.com/solution/000289940)| +|TrendMicro|All| | |Investigation| | ||[source](https://success.trendmicro.com/solution/000289940)| +|tribe29|Check_MK| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643)| +|Tricentis Tosca|All| | | | | ||[Tricentis Tosca Statement](https://support-hub.tricentis.com/open?number=NEW0001148&id=post)| |Trimble|eCognition|10.2.0 Build 4618| |Vulnerable| | |Remediation steps provided by Trimble|| -|Tripwire|® Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tripwire.com/log4j)| -|Tripwire|Anyware SCM| | |Vulnerable| | | |[source](https://www.tripwire.com/log4j)| -|Tripwire|Apps| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tripwire.com/log4j)| -|Tripwire|Configuration Compliance Manager (CCM)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tripwire.com/log4j)| -|Tripwire|Configuration Manager SaaS| | |Vulnerable| | | |[source](https://www.tripwire.com/log4j)| -|Tripwire|Connect (on-prem)| | |Vulnerable| | | |[source](https://www.tripwire.com/log)| -|Tripwire|Connect SaaS (cloud)| | |Vulnerable| | | |[source](https://www.tripwire.com/log4j)| -|Tripwire|for Servers (TFS)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tripwire.com/log4j)| -|Tripwire|Industrial Sentinel| |Not vuln|Workaround| | | |[source](https://www.tripwire.com/log4j)| -|Tripwire|Industrial Visibility| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tripwire.com/log4j)| -|Tripwire|IP360™| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tripwire.com/log4j)| -|Tripwire|LogCenter®| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.tripwire.com/log4j)| -|Tripwire|State Analyzer| | |Vulnerable| | | |[source](https://www.tripwire.com/log4j)| -|TrueNAS|All| | | | | | |[TrueNAS Statement](https://www.truenas.com/community/threads/log4j-vulnerability.97359/post-672559)| -|TRUMPF|all other TRUMPF machines and systems| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|PFO Smart Teach App| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|QDS 2.0| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|redpowerDirect| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|Seamline Remote| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|Smart Power Tube| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|Smart View Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruBend Cell 5000 / 7000| | |Investigation| | | |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruBend Center| | |Investigation| | | |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruConvert| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruDiode| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruDisk| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruFiber| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruHeat| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruLaser 5000 series| | |Investigation| | | |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruLaser all other series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruLaser Center 7030| | |Investigation| | | |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruMark| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruMatic 1000 fiber| | |Investigation| | | |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruMatic 3000| | |Investigation| | | |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruMatic all other series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruMicro series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruPlasma| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruPrint Monitoring Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruPulse| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruPunch 1000 / 3000| | |Investigation| | | |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruPunch all other series| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Boost| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Calculate| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Cell| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Classic| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops FAB| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops I-PFO| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Mark 3D| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Monitor| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops PFO| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Print| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|TruTops Print Multilaser Assistant| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|TRUMPF|Visionline| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| -|Tufin|All| | | | | | |[Tufin Statement](https://portal.tufin.com/articles/SecurityAdvisories/Apache-Log4Shell-Vulnerability-12-12-2021)| -|TYPO3|All| | | | | | |[TYPO3 Statement](https://typo3.org/article/typo3-psa-2021-004)| +|Tripwire|® Enterprise| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tripwire.com/log4j)| +|Tripwire|Anyware SCM| | |Vulnerable| | ||[source](https://www.tripwire.com/log4j)| +|Tripwire|Apps| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tripwire.com/log4j)| +|Tripwire|Configuration Compliance Manager (CCM)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tripwire.com/log4j)| +|Tripwire|Configuration Manager SaaS| | |Vulnerable| | ||[source](https://www.tripwire.com/log4j)| +|Tripwire|Connect (on-prem)| | |Vulnerable| | ||[source](https://www.tripwire.com/log)| +|Tripwire|Connect SaaS (cloud)| | |Vulnerable| | ||[source](https://www.tripwire.com/log4j)| +|Tripwire|for Servers (TFS)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tripwire.com/log4j)| +|Tripwire|Industrial Sentinel| |Not vuln|Workaround| | ||[source](https://www.tripwire.com/log4j)| +|Tripwire|Industrial Visibility| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tripwire.com/log4j)| +|Tripwire|IP360™| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tripwire.com/log4j)| +|Tripwire|LogCenter®| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.tripwire.com/log4j)| +|Tripwire|State Analyzer| | |Vulnerable| | ||[source](https://www.tripwire.com/log4j)| +|TrueNAS|All| | | | | ||[TrueNAS Statement](https://www.truenas.com/community/threads/log4j-vulnerability.97359/post-672559)| +|TRUMPF|all other TRUMPF machines and systems| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|PFO Smart Teach App| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|QDS 2.0| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|redpowerDirect| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|Seamline Remote| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|Smart Power Tube| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|Smart View Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruBend Cell 5000 / 7000| | |Investigation| | ||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruBend Center| | |Investigation| | ||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruConvert| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruDiode| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruDisk| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruFiber| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruHeat| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruLaser 5000 series| | |Investigation| | ||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruLaser all other series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruLaser Center 7030| | |Investigation| | ||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruMark| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruMatic 1000 fiber| | |Investigation| | ||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruMatic 3000| | |Investigation| | ||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruMatic all other series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruMicro series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruPlasma| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruPrint Monitoring Analyzer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruPulse| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruPunch 1000 / 3000| | |Investigation| | ||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruPunch all other series| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Boost| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Calculate| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Cell| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Classic| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops FAB| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops I-PFO| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Mark 3D| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Monitor| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops PFO| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Print| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|TruTops Print Multilaser Assistant| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|TRUMPF|Visionline| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.trumpf.com/filestorage/TRUMPF_Master/Corporate/Security/TRUMPF-Security-Information-TSI-2021-1.pdf)| +|Tufin|All| | | | | ||[Tufin Statement](https://portal.tufin.com/articles/SecurityAdvisories/Apache-Log4Shell-Vulnerability-12-12-2021)| +|TYPO3|All| | | | | ||[TYPO3 Statement](https://typo3.org/article/typo3-psa-2021-004)| diff --git a/software/software_list_u.md b/software/software_list_u.md index 8f2d1eff3..855e28b46 100644 --- a/software/software_list_u.md +++ b/software/software_list_u.md @@ -7,61 +7,62 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| +|UiPath|Insights|20.10| |Vulnerable| | ||[link](https://www.uipath.com/legal/trust-and-security/cve-2021-44228)| |Ubiquiti|UniFi Network Application|6.5.x|Not vuln|Fix|Not vuln|Not vuln|Fixed in 6.5.55 - also not vuln to CVE-2021-44832|[Unifi Security Advisory Bulletin](https://community.ui.com/releases/Security-Advisory-Bulletin-023-023/808a1db0-5f8e-4b91-9097-9822f3f90207#comment/f689e3fb-6ad8-46b0-8054-2ea3656a8778)| -|Ubuntu|All| | | | | | |[Ubuntu Security Advisory](https://ubuntu.com/security/CVE-2021-44228)| -|Umbraco|All| | | | | | |[Umbraco Security Advisory](https://umbraco.com/blog/security-advisory-december-15-2021-umbraco-cms-and-cloud-not-affected-by-cve-2021-44228-log4j-rce-0-day-mitigation/)| -|UniFlow|All| | | | | | |[UniFlow Security Advisory](https://www.uniflow.global/en/security/security-and-maintenance/)| -|Unify|AC-Win SL|V3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify First Response Emergency Services Applicaction| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify First Response Gemma|V2 & V3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify First Response MSBF| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Ubuntu|All| | | | | ||[Ubuntu Security Advisory](https://ubuntu.com/security/CVE-2021-44228)| +|Umbraco|All| | | | | ||[Umbraco Security Advisory](https://umbraco.com/blog/security-advisory-december-15-2021-umbraco-cms-and-cloud-not-affected-by-cve-2021-44228-log4j-rce-0-day-mitigation/)| +|UniFlow|All| | | | | ||[UniFlow Security Advisory](https://www.uniflow.global/en/security/security-and-maintenance/)| +|Unify|AC-Win SL|V3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify First Response Emergency Services Applicaction| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify First Response Gemma|V2 & V3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify First Response MSBF| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| |Unify|Atos Unify First Response OpenScape Policy Store| | |Vulnerable| | |Fix planned for 01/2022|[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify Office| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape 4000 and Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Accounting Management| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Alarm Response| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Backup & Recovery| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape BCF| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Branch| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Business| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Common Management Portal| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Composer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Concierge| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Contact Center|>= V9| |Vulnerable| | | |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Contact Center Extensions|V3R1|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Contact Media Service|>= V9| |Vulnerable| | | |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Cordless IP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape DECT Phones S6/SL6| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Deployment Service| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Desk Phones / OpenStage Phones| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify Office| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape 4000 and Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Accounting Management| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Alarm Response| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Backup & Recovery| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape BCF| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Branch| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Business| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Common Management Portal| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Composer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Concierge| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Contact Center|>= V9| |Vulnerable| | ||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Contact Center Extensions|V3R1|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Contact Media Service|>= V9| |Vulnerable| | ||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Cordless IP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape DECT Phones S6/SL6| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Deployment Service| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Desk Phones / OpenStage Phones| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| |Unify|Atos Unify OpenScape Enterprise Express|V9 & V10| |Vulnerable| | |Follow instructions for OpenScape UC and OpenScape Contact Center|[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape ESRP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Fault Management| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape License Management CLA/CLM| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Media Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Personal Edition|V7|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape SBC| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Sesap| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape UC|>= 10.2.9.0| |Vulnerable| | | |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape UC Clients| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape ESRP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Fault Management| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape License Management CLA/CLM| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Media Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Personal Edition|V7|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape SBC| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Sesap| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape UC|>= 10.2.9.0| |Vulnerable| | ||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape UC Clients| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| |Unify|Atos Unify OpenScape Voice| | |Vulnerable| | |Fix for embedded OS UC planned for V10 R2|[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Voice (except simplex deployments)| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Voice Trace Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Web Collaboration|V7|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape WLAN Phone Wireless Service Gateway| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape WLAN Phone WL4| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Xpert Clients| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Xpert MLC| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Xpert System Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Atos Unify OpenScape Xpressions| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Circuit| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Circuit Meeting Room| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Hipath Cap|V3|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify|Hipath DS-Win|>= V4 R6.29.0|Not vuln|Fix| | | |[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unify ATOS|All| | | | | | |[Unify ATOS Advisory](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| -|Unimus|All| | | | | | |[Unimus Statement](https://forum.unimus.net/viewtopic.php?f=7&t=1390#top)| -|US Signal|Remote Management and Monitoring platform| |Not vuln|Workaround| | | |[source](https://ussignal.com/blog/apache-log4j-vulnerability)| -|USoft|All|< 9.1|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.usoft.com/news-announcements-2/apache-log4j-security-vulnerability-issue-1301)| +|Unify|Atos Unify OpenScape Voice (except simplex deployments)| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Voice Trace Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Web Collaboration|V7|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape WLAN Phone Wireless Service Gateway| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape WLAN Phone WL4| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Xpert Clients| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Xpert MLC| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Xpert System Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Atos Unify OpenScape Xpressions| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Circuit| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Circuit Meeting Room| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Hipath Cap|V3|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify|Hipath DS-Win|>= V4 R6.29.0|Not vuln|Fix| | ||[source](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unify ATOS|All| | | | | ||[Unify ATOS Advisory](https://networks.unify.com/security/advisories/OBSO-2112-01.pdf)| +|Unimus|All| | | | | ||[Unimus Statement](https://forum.unimus.net/viewtopic.php?f=7&t=1390#top)| +|US Signal|Remote Management and Monitoring platform| |Not vuln|Workaround| | ||[source](https://ussignal.com/blog/apache-log4j-vulnerability)| +|USoft|All|< 9.1|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.usoft.com/news-announcements-2/apache-log4j-security-vulnerability-issue-1301)| |USoft|All|10.0|Not vuln|Fix| | |Fixed in 10.0.1C+|[source](https://community.usoft.com/product-updates/release-notes-10-0-1c-log4j-security-vulnerability-fix-1300)| |USoft|All|9.1|Not vuln|Fix| | |Fixed in 9.1.1S|[source](https://community.usoft.com/product-updates/release-notes-9-1-1s-log4j-security-vulnerability-fix-1302)| -|USSIGNAL MSP|All| | | | | | |[USSIGNAL MSP Statement](https://ussignal.com/blog/apache-log4j-vulnerability)| +|USSIGNAL MSP|All| | | | | ||[USSIGNAL MSP Statement](https://ussignal.com/blog/apache-log4j-vulnerability)| diff --git a/software/software_list_v.md b/software/software_list_v.md index 56f526af8..104cefdf5 100644 --- a/software/software_list_v.md +++ b/software/software_list_v.md @@ -7,144 +7,146 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|Varian|Acuity|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ARIA Connect (Cloverleaf)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ARIA eDOC|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ARIA oncology information system for Medical Oncology|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ARIA oncology information system for Radiation Oncology|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ARIA Radiation Therapy Management System (RTM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Authentication and Identity Server (VAIS)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Bravos Console|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Clinac|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Cloud Planner|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|DITC|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|DoseLab|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Eclipse treatment planning software|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ePeerReview|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Ethos|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|FullScale oncology IT solutions|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Halcyon system|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ICAP|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Identify|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Information Exchange Manager (IEM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|InSightive Analytics|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Large Integrated Oncology Network (LION)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Managed Services Cloud|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Mobile App|2.0, 2.5|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Mobius3D platform|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|PaaS|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|ProBeam|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Qumulate|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Real-time Position Management (RPM)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Respiratory Gating for Scanners (RGSC)|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|VTScada|All| | |Not vuln| | |Java is not utilized within VTScada software, and thus our users are unaffected.|[link](https://www.vtscada.com/vtscada-unaffected-by-log4j/)| +|Video Insight Inc.|Video Insight| | |Not vuln| | |Video Insight is a part of Panasonic I-Pro.|[link](https://i-pro.com/eu/en/surveillance/news/i-pro-products-and-log4j-2x-vulnerability)| +|Varian|Acuity|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ARIA Connect (Cloverleaf)|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ARIA eDOC|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ARIA oncology information system for Medical Oncology|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ARIA oncology information system for Radiation Oncology|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ARIA Radiation Therapy Management System (RTM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Authentication and Identity Server (VAIS)|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Bravos Console|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Clinac|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Cloud Planner|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|DITC|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|DoseLab|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Eclipse treatment planning software|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ePeerReview|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Ethos|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|FullScale oncology IT solutions|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Halcyon system|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ICAP|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Identify|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Information Exchange Manager (IEM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|InSightive Analytics|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Large Integrated Oncology Network (LION)|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Managed Services Cloud|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Mobile App|2.0, 2.5|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Mobius3D platform|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|PaaS|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|ProBeam|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Qumulate|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Real-time Position Management (RPM)|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Respiratory Gating for Scanners (RGSC)|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| |Varian|SmartConnect solution|All| |Vulnerable| | |See Knowledge Article: 000038850 on MyVarian|[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| |Varian|SmartConnect solution Policy Server|All| |Vulnerable| | |See Knowledge Articles: 000038831 and 000038832 on MyVarian|[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|TrueBeam radiotherapy system|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|UNIQUE system|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|VariSeed|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Velocity|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|VitalBeam radiotherapy system|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|Vitesse|All|Not vuln|Not vuln|Not vuln|Not vuln| |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|XMediusFax for ARIA oncology information system for Medical Oncology|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Varian|XMediusFax for ARIA oncology information system for Radiation Oncology|All| |Investigation| | | |[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| -|Variphy|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://kb.variphy.com/knowledge-base/cve-2021-44228-critical-vulnerability-in-log4j2/)| -|VArmour|All| | | | | | |[VArmour Statement](https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility)| -|Varnish Software|All| | | | | | |[Varnish Software Security Notice](https://docs.varnish-software.com/security/CVE-2021-44228-45046/)| -|Varonis|All| | | | | | |[Varonis Notice](https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228)| -|Vectra|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://support.vectra.ai/s/article/KB-VS-1568)| -|Veeam|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.veeam.com/kb4254)| -|Venafi|All| | | | | | |[Venafi Statement](https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice)| +|Varian|TrueBeam radiotherapy system|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|UNIQUE system|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|VariSeed|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Velocity|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|VitalBeam radiotherapy system|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|Vitesse|All|Not vuln|Not vuln|Not vuln|Not vuln||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|XMediusFax for ARIA oncology information system for Medical Oncology|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Varian|XMediusFax for ARIA oncology information system for Radiation Oncology|All| |Investigation| | ||[Varian Advisory Link](https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities)| +|Variphy|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.variphy.com/knowledge-base/cve-2021-44228-critical-vulnerability-in-log4j2/)| +|VArmour|All| | | | | ||[VArmour Statement](https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility)| +|Varnish Software|All| | | | | ||[Varnish Software Security Notice](https://docs.varnish-software.com/security/CVE-2021-44228-45046/)| +|Varonis|All| | | | | ||[Varonis Notice](https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228)| +|Vectra|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://support.vectra.ai/s/article/KB-VS-1568)| +|Veeam|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.veeam.com/kb4254)| +|Venafi|All| | | | | ||[Venafi Statement](https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice)| |Veritas|Aptare IT Analytics|10.5 and 10.6|Not vuln|Workaround| | |Version 10.4 and earlier are not affected.|[source](https://www.veritas.com/support/en_US/article.100052081)| -|Veritas|Media Server Deduplication Pool (MSDP) (on NB Appliance)|3.1.2 and 3.2|Not vuln|Workaround| | | |[source](https://www.veritas.com/content/support/en_US/article.100052062)| -|Veritas|NetBackup Appliance|3.1.2 through 4.1.0.1 MR1|Not vuln|Workaround| | | |[source](https://www.veritas.com/content/support/en_US/article.100052058)| -|Veritas|NetBackup Client|7.7.3 through 9.1.0.1|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.veritas.com/content/support/en_US/article.100052058)| -|Veritas|NetBackup CloudPoint|2.2.2, 8.3 through 9.1.0.1|Not vuln|Workaround| | | |[source](https://www.veritas.com/content/support/en_US/article.100052058)| +|Veritas|Media Server Deduplication Pool (MSDP) (on NB Appliance)|3.1.2 and 3.2|Not vuln|Workaround| | ||[source](https://www.veritas.com/content/support/en_US/article.100052062)| +|Veritas|NetBackup Appliance|3.1.2 through 4.1.0.1 MR1|Not vuln|Workaround| | ||[source](https://www.veritas.com/content/support/en_US/article.100052058)| +|Veritas|NetBackup Client|7.7.3 through 9.1.0.1|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.veritas.com/content/support/en_US/article.100052058)| +|Veritas|NetBackup CloudPoint|2.2.2, 8.3 through 9.1.0.1|Not vuln|Workaround| | ||[source](https://www.veritas.com/content/support/en_US/article.100052058)| |Veritas|NetBackup Flex Scale|2.1|Not vuln|Workaround| | |Veritas strongly recommends customers using version 1.3 or 1.3.1 to upgrade to NetBackup FlexScale 2.1 in order to be able to perform the mitigation steps.|[source](https://www.veritas.com/content/support/en_US/article.100052101.html)| -|Veritas|NetBackup Media Server|8.1 through 9.1.0.1|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.veritas.com/content/support/en_US/article.100052058)| -|Veritas|NetBackup Media Server container on Flex Appliance|8.1 through 9.1.0.1|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.veritas.com/content/support/en_US/article.100052058)| -|Veritas|NetBackup OpsCenter|7.7 through 7.7.3 and 8.0|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.veritas.com/content/support/en_US/article.100052058)| +|Veritas|NetBackup Media Server|8.1 through 9.1.0.1|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.veritas.com/content/support/en_US/article.100052058)| +|Veritas|NetBackup Media Server container on Flex Appliance|8.1 through 9.1.0.1|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.veritas.com/content/support/en_US/article.100052058)| +|Veritas|NetBackup OpsCenter|7.7 through 7.7.3 and 8.0|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.veritas.com/content/support/en_US/article.100052058)| |Veritas|NetBackup OpsCenter|8.1.2 through 9.1.0.1|Not vuln|Workaround| | |Veritas has published updated versions of Log4j that replace the vulnerable libraries used by NetBackup OpsCenter 8.1.2 through 9.1.0.1.|[source](https://www.veritas.com/support/en_US/article.100052100)| -|Veritas|NetBackup Primary Server|7.7 through 7.7.3 and 8.0|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.veritas.com/content/support/en_US/article.100052058)| +|Veritas|NetBackup Primary Server|7.7 through 7.7.3 and 8.0|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.veritas.com/content/support/en_US/article.100052058)| |Veritas|NetBackup Primary Server|8.1.2 through 9.1.0.1|Not vuln|Workaround| | |Veritas has published updated versions of Log4j that replace the vulnerable libraries used by NetBackup Primary Server 8.1.2 through 9.1.0.1.|[source](https://www.veritas.com/content/support/en_US/article.100052058)| |Veritas|NetBackup Primary Server BYO (also known as Master Server)|8.1 through 8.1.1|Not vuln|Workaround| | |Veritas strongly recommends customers upgrade to NetBackup 8.1.2 or the latest release in order to be able to perform the mitigation steps.|[source](https://www.veritas.com/content/support/en_US/article.100052058)| -|Veritas|NetBackup Primary Server container on Flex Appliance|8.1.2 through 9.1.0.1|Not vuln|Workaround| | | |[source](https://www.veritas.com/content/support/en_US/article.100052084)| -|Veritas|NetBackup Resiliency Platform|3.4 through 4.0|Not vuln|Workaround| | | |[source](https://www.veritas.com/content/support/en_US/article.100052109)| -|Veritas NetBackup|All| | | | | | |[Verita Statement](https://www.veritas.com/content/support/en_US/article.100052070)| -|Vertica|All| | | | | | |[Vertica Statement](https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used)| -|Viso Trust|All| | | | | | |[Viso Trust Statement](https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492)| -|VMware|API Portal for VMware Tanzu|1.0.8| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|App Metrics|2.1.2| Not vuln | Fix | Fix | Not vuln | |[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/apm)| -|VMware|AppDefense Appliance|2.x| Not vuln |Workaround|Workaround| Not vuln |Advisory requires a login|[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [KB](https://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Mitigation-Steps-for-AppDefense/ta-p/109180)| -|VMware|Carbon Black Cloud Workload Appliance|1.1.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Carbon Black EDR server|7.6.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Cloud Director Object Storage Extension|2.1.0.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Cloud Director Object Storage Extension|2.0.0.3| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-Cloud-Director-Object-Storage-Extension/2.0.0.3/rn/vmware-cloud-director-object-storage-extension-2003-release-notes/index.html)| -|VMware|Cloud Foundation|4.x, 3.x| Not vuln | Workaround | Workaround | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87095)| -|VMware|Cloud Provider Lifecycle Manager|1.2.0.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Greenplum Text|3.8.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Harbor Container Registry for TKGI|2.4.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|HCX|4.2.4, 4.1.0.3| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|HCX|4.3| Not vuln | Not vuln | Not vuln | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Healthwatch for Tanzu Application Service|2.1.8, 1.8.7| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/p-healthwatch)| -|VMware|Horizon|2111, 7.13.1, 7.10.3| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Horizon Agents Installer|patch for 20.3.0, 20.3.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Horizon Cloud Connector|1.x| Not vuln | Vulnerable | Vulnerable | Not vuln | Upgrade to 2.1.2 required |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Horizon Cloud Connector|2.1.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://customerconnect.vmware.com/downloads/details?downloadGroup=HCS-CC-210&productId=716&rPId=79131#product_downloads)| -|VMware|Horizon DaaS|9.1.x,9.0.x| Not vuln | Workaround | Workaround | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87101)| -|VMware|Identity Manager|3.3.6| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [KB] (https://kb.vmware.com/s/article/87185)| -|VMware|Integrated OpenStack|7.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [Fix](https://docs.vmware.com/en/VMware-Integrated-OpenStack/7.2/rn/VMware-Integrated-OpenStack-72-Release-Notes.html)| -|VMware|NSX Data Center for vSphere|6.4.12| Not vuln |Fix|Fix| Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|NSX-T Data Center|3.1.3.5, 3.0.3.1, 2.5.3.4| Not vuln |Fix|Fix| Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|NSX Intelligence |1.2.1.1| Not vuln |Fix|Fix| Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|SD-WAN VCO|Multiple Versions| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://kb.vmware.com/s/article/87158)| -|VMware|Single Sign-On for VMware Tanzu Application Service|1.14.6| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.tanzu.vmware.com/products/pivotal_single_sign-on_service#/releases/1012467)| -|VMware|Site Recovery Manager, vSphere Replication|8.5.0.2, 8.4.0.4, 8.3.1.5| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Skyline Collector virtual appliance| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://kb.vmware.com/s/article/87068)| -|VMware|Smart Assurance M&R|6.8u5, 7.0u8, 7.2.0.1| Not vuln | Workaround | Workaround | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Smart Assurance NCM|10.1.6| Not vuln | Workaround | Workaround | | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Smart Assurance SAM [Service Assurance Manager]|10.1.5.5| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Spring Cloud Gateway for Kubernetes|1.0.7| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Spring Cloud Gateway for VMware Tanzu|1.1.4, 1.0.19| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Spring Cloud Services for VMware Tanzu|3.1.27,2.1.10| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.tanzu.vmware.com/products/p-spring-cloud-services#/releases/1014061)| -|VMware|Tanzu Application Services for VMs|2.6.23, 2.7.44, 2.8.30, 2.9.30, 2.10.24, 2.11.12 and 2.12.5| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://community.pivotal.io/s/article/Workaround-instructions-to-address-CVE-2021-44228-in-Tanzu-Application-Service-2-7-through-2-12?language=en_US) [fix](https://network.pivotal.io/products/elastic-runtime)| -|VMware|Tanzu GemFire|9.10.13, 9.9.7| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/tanzu-gemfire-for-vms#/releases/)| -|VMware|Tanzu GemFire for VMs|1.14.2, 1.13.5, 1.12.4, 1.10.9| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Tanzu Greenplum Platform Extension Framework|6.2.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://community.pivotal.io/s/article/Workaround-to-address-CVE-2021-44228-Apache-Log4j-Remote-Code-Execution-for-All-Greenplum-Versions?language=en_US)| -|VMware|Tanzu Kubernetes Grid Integrated Edition |1.13.1, 1.10.8| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Tanzu Observability by Wavefront Nozzle |3.0.4| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/wavefront-nozzle)| -|VMware|Tanzu Observability Proxy|10.12| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Tanzu Operations Manager|2.8.19, 2.9.26, 2.10.25| Not vuln | Fix | Fix | Fix | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://community.pivotal.io/s/article/5004y00001mPn2N1639255611105?language=en_US) [fix](https://network.pivotal.io/products/ops-manager/)| -|VMware|Tanzu Scheduler|1.6.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Tanzu SQL with MySQL for VMs|All| Not vuln |Not vuln|Not vuln | Not vuln | |[source](https://kb.vmware.com/s/article/87068)| -|VMware|Telco Cloud Automation|All| Not vuln |Not vuln| Not vuln | Not vuln | |[source](https://kb.vmware.com/s/article/87068)| -|VMware|Telco Cloud Operations|1.4.0.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Unified Access Gateway (UAG)|20.x| Not vuln |Workaround|Workaround| Not vuln |Upgrade to 2111.1 required |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Unified Access Gateway (UAG)|2111.1| Not vuln |Fix|Fix| Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|Unified Access Gateway (UAG)|3.x| Not vuln |Workaround|Workaround| Not vuln |Upgrade to 2111.1 required |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|vCenter Cloud Gateway|1.x|Not vuln|Workaround|Workaround| Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87081)| -|VMware|vCenter Server - OVA|6.5 U3s| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vcenter-server-65u3s-release-notes.html)| -|VMware|vCenter Server - OVA|6.7 U3q| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vcenter-server-67u3q-release-notes.html)| -|VMware|vCenter Server - OVA|7.0U3c| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3c-release-notes.html)| -|VMware|vCenter Server - Windows|6.5 U3s| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vcenter-server-65u3s-release-notes.html)| -|VMware|vCenter Server - Windows|6.7 U3q| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vcenter-server-67u3q-release-notes.html)| -|VMware|vCloud Director|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://kb.vmware.com/s/article/87068?lang=en_US)| -|VMware|vCloud Workstation|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://kb.vmware.com/s/article/87068?lang=en_US)| -|VMware|VMware Workspace ONE Access |patches for 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0| |Fix|Fix| ||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [KB](https://kb.vmware.com/s/article/87183)| -|VMware|vRealize Automation|7.6| Not vuln | Vulnerable | Vulnerable | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|vRealize Automation|8.6.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/vRealize-Automation/8.6.2/rn/vmware-vrealize-automation-862-release-notes/index.html)| -|VMware|vRealize Business for Cloud|7.x| Not vuln | Vulnerable | Vulnerable | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|vRealize Lifecycle Manager|8.6.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87097) [fix](https://docs.vmware.com/en/VMware-vRealize-Suite-Lifecycle-Manager/8.6/rn/VMware-vRealize-Suite-Lifecycle-Manager-862-Release-Notes.html)| -|VMware|vRealize Log Insight|8.2, 8.3, 8.4| Not vuln | Vulnerable | Vulnerable | Not vuln | Upgrade to 8.6.2 required |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|vRealize Log Insight|8.6.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|vRealize Network Insight|6.5| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|vRealize Operations|8.6.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| -|VMware|vRealize Operations Cloud Proxy|8.6.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vRealize-Operations-Cloud/index.html)| -|VMware|vRealize Operations Tenant App for VMware Cloud Director|2.5.1| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/Management-Packs-for-vRealize-Operations/2.5.1/rn/Tenant-App-251-Release-Notes.html)| -|VMware|vRealize Orchestrator|8.6.2| Not vuln | Fix | Fix | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/vRealize-Orchestrator/8.6.2/rn/vmware-vrealize-orchestrator-862-release-notes/index.html)| -|VMware|vRealize Orchestrator|7.6| Not vuln | Workaround | Workaround | Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [Workaround](https://kb.vmware.com/s/article/87122)| -|VMware|vSphere ESXi| | Not vuln |Not vuln| Not vuln | Not vuln | |[source](https://kb.vmware.com/s/article/87068)| -|VMware|Workspace ONE Access Connector ( Identity Manager Connector)|patches for 21.08.0.1, 21.08.0.0, 20.10.0.0, 19.03.0.1| Not vuln |Fix|Fix| Not vuln | |[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [KB](https://kb.vmware.com/s/article/87184)| +|Veritas|NetBackup Primary Server container on Flex Appliance|8.1.2 through 9.1.0.1|Not vuln|Workaround| | ||[source](https://www.veritas.com/content/support/en_US/article.100052084)| +|Veritas|NetBackup Resiliency Platform|3.4 through 4.0|Not vuln|Workaround| | ||[source](https://www.veritas.com/content/support/en_US/article.100052109)| +|Veritas NetBackup|All| | | | | ||[Verita Statement](https://www.veritas.com/content/support/en_US/article.100052070)| +|Vertica|All| | | | | ||[Vertica Statement](https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used)| +|Viso Trust|All| | | | | ||[Viso Trust Statement](https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492)| +|VMware|API Portal for VMware Tanzu|1.0.8|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|App Metrics|2.1.2|Not vuln|Fix|Fix|Not vuln||[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/apm)| +|VMware|AppDefense Appliance|2.x|Not vuln|Workaround|Workaround|Not vuln|Advisory requires a login|[source](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [KB](https://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Mitigation-Steps-for-AppDefense/ta-p/109180)| +|VMware|Carbon Black Cloud Workload Appliance|1.1.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Carbon Black EDR server|7.6.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Cloud Director Object Storage Extension|2.1.0.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Cloud Director Object Storage Extension|2.0.0.3|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-Cloud-Director-Object-Storage-Extension/2.0.0.3/rn/vmware-cloud-director-object-storage-extension-2003-release-notes/index.html)| +|VMware|Cloud Foundation|4.x, 3.x|Not vuln|Workaround|Workaround|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87095)| +|VMware|Cloud Provider Lifecycle Manager|1.2.0.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Greenplum Text|3.8.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Harbor Container Registry for TKGI|2.4.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|HCX|4.2.4, 4.1.0.3|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|HCX|4.3|Not vuln|Not vuln|Not vuln|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Healthwatch for Tanzu Application Service|2.1.8, 1.8.7|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/p-healthwatch)| +|VMware|Horizon|2111, 7.13.1, 7.10.3|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Horizon Agents Installer|patch for 20.3.0, 20.3.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Horizon Cloud Connector|1.x|Not vuln|Vulnerable|Vulnerable|Not vuln|Upgrade to 2.1.2 required|[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Horizon Cloud Connector|2.1.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://customerconnect.vmware.com/downloads/details?downloadGroup=HCS-CC-210&productId=716&rPId=79131#product_downloads)| +|VMware|Horizon DaaS|9.1.x,9.0.x|Not vuln|Workaround|Workaround|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87101)| +|VMware|Identity Manager|3.3.6|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [source](https://kb.vmware.com/s/article/87185)| +|VMware|Integrated OpenStack|7.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [Fix](https://docs.vmware.com/en/VMware-Integrated-OpenStack/7.2/rn/VMware-Integrated-OpenStack-72-Release-Notes.html)| +|VMware|NSX Data Center for vSphere|6.4.12|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|NSX-T Data Center|3.1.3.5, 3.0.3.1, 2.5.3.4|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|NSX Intelligence|1.2.1.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|SD-WAN VCO|Multiple Versions|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://kb.vmware.com/s/article/87158)| +|VMware|Single Sign-On for VMware Tanzu Application Service|1.14.6|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.tanzu.vmware.com/products/pivotal_single_sign-on_service#/releases/1012467)| +|VMware|Site Recovery Manager, vSphere Replication|8.5.0.2, 8.4.0.4, 8.3.1.5|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Skyline Collector virtual appliance| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.vmware.com/s/article/87068)| +|VMware|Smart Assurance M&R|6.8u5, 7.0u8, 7.2.0.1|Not vuln|Workaround|Workaround|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Smart Assurance NCM|10.1.6|Not vuln|Workaround|Workaround| ||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Smart Assurance SAM [Service Assurance Manager]|10.1.5.5|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Spring Cloud Gateway for Kubernetes|1.0.7|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Spring Cloud Gateway for VMware Tanzu|1.1.4, 1.0.19|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Spring Cloud Services for VMware Tanzu|3.1.27,2.1.10|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.tanzu.vmware.com/products/p-spring-cloud-services#/releases/1014061)| +|VMware|Tanzu Application Services for VMs|2.6.23, 2.7.44, 2.8.30, 2.9.30, 2.10.24, 2.11.12 and 2.12.5|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://community.pivotal.io/s/article/Workaround-instructions-to-address-CVE-2021-44228-in-Tanzu-Application-Service-2-7-through-2-12?language=en_US) [fix](https://network.pivotal.io/products/elastic-runtime)| +|VMware|Tanzu GemFire|9.10.13, 9.9.7|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/tanzu-gemfire-for-vms#/releases/)| +|VMware|Tanzu GemFire for VMs|1.14.2, 1.13.5, 1.12.4, 1.10.9|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Tanzu Greenplum Platform Extension Framework|6.2.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://community.pivotal.io/s/article/Workaround-to-address-CVE-2021-44228-Apache-Log4j-Remote-Code-Execution-for-All-Greenplum-Versions?language=en_US)| +|VMware|Tanzu Kubernetes Grid Integrated Edition|1.13.1, 1.10.8|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Tanzu Observability by Wavefront Nozzle|3.0.4|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://network.pivotal.io/products/wavefront-nozzle)| +|VMware|Tanzu Observability Proxy|10.12|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Tanzu Operations Manager|2.8.19, 2.9.26, 2.10.25|Not vuln|Fix|Fix|Fix||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://community.pivotal.io/s/article/5004y00001mPn2N1639255611105?language=en_US) [fix](https://network.pivotal.io/products/ops-manager/)| +|VMware|Tanzu Scheduler|1.6.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Tanzu SQL with MySQL for VMs|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.vmware.com/s/article/87068)| +|VMware|Telco Cloud Automation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.vmware.com/s/article/87068)| +|VMware|Telco Cloud Operations|1.4.0.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Unified Access Gateway (UAG)|20.x|Not vuln|Workaround|Workaround|Not vuln|Upgrade to 2111.1 required|[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Unified Access Gateway (UAG)|2111.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|Unified Access Gateway (UAG)|3.x|Not vuln|Workaround|Workaround|Not vuln|Upgrade to 2111.1 required|[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|vCenter Cloud Gateway|1.x|Not vuln|Workaround|Workaround|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87081)| +|VMware|vCenter Server - OVA|6.5 U3s|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vleft-server-65u3s-release-notes.html)| +|VMware|vCenter Server - OVA|6.7 U3q|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vleft-server-67u3q-release-notes.html)| +|VMware|vCenter Server - OVA|7.0U3c|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vleft-server-70u3c-release-notes.html)| +|VMware|vCenter Server - Windows|6.5 U3s|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vleft-server-65u3s-release-notes.html)| +|VMware|vCenter Server - Windows|6.7 U3q|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.4 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vleft-server-67u3q-release-notes.html)| +|VMware|vCloud Director|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.vmware.com/s/article/87068?lang=en_US)| +|VMware|vCloud Workstation|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.vmware.com/s/article/87068?lang=en_US)| +|VMware|Workspace ONE Access|patches for 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0| |Fix|Fix| ||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [KB](https://kb.vmware.com/s/article/87183)| +|VMware|vRealize Automation|7.6|Not vuln|Vulnerable|Vulnerable|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|vRealize Automation|8.6.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/vRealize-Automation/8.6.2/rn/vmware-vrealize-automation-862-release-notes/index.html)| +|VMware|vRealize Business for Cloud|7.x|Not vuln|Vulnerable|Vulnerable|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|vRealize Lifecycle Manager|8.6.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [workaround](https://kb.vmware.com/s/article/87097) [fix](https://docs.vmware.com/en/VMware-vRealize-Suite-Lifecycle-Manager/8.6/rn/VMware-vRealize-Suite-Lifecycle-Manager-862-Release-Notes.html)| +|VMware|vRealize Log Insight|8.2, 8.3, 8.4|Not vuln|Vulnerable|Vulnerable|Not vuln|Upgrade to 8.6.2 required|[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|vRealize Log Insight|8.6.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|vRealize Network Insight|6.5|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|vRealize Operations|8.6.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html)| +|VMware|vRealize Operations Cloud Proxy|8.6.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/VMware-vRealize-Operations-Cloud/index.html)| +|VMware|vRealize Operations Tenant App for VMware Cloud Director|2.5.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/Management-Packs-for-vRealize-Operations/2.5.1/rn/Tenant-App-251-Release-Notes.html)| +|VMware|vRealize Orchestrator|8.6.2|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [fix](https://docs.vmware.com/en/vRealize-Orchestrator/8.6.2/rn/vmware-vrealize-orchestrator-862-release-notes/index.html)| +|VMware|vRealize Orchestrator|7.6|Not vuln|Workaround|Workaround|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [Workaround](https://kb.vmware.com/s/article/87122)| +|VMware|vSphere ESXi| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://kb.vmware.com/s/article/87068)| +|VMware|Workspace ONE Access Connector ( Identity Manager Connector)|patches for 21.08.0.1, 21.08.0.0, 20.10.0.0, 19.03.0.1|Not vuln|Fix|Fix|Not vuln||[VMSA-2021-0028.1 (vmware.com)](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) [KB](https://kb.vmware.com/s/article/87184)| |Vuze|Torrent (desktop/server/mobile)|Revision 44261| |Investigation| | |Also know as Azureus|[source](http://svn.vuze.com/public/client/trunk/uis/lib/) [vendor](https://www.vuze.com/)| -|Vyaire|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[Vyaire Advisory Link](https://www.vyaire.com/sites/us/files/2021-12/2021-12-15-product-security-bulletin-for-log4shell-vulnerability.pdf)| -|Vyaire medical|All| | |Not vuln| | | |[source](https://www.vyaire.com/product-security)| +|Vyaire|All| |Not vuln|Not vuln|Not vuln|Not vuln||[Vyaire Advisory Link](https://www.vyaire.com/sites/us/files/2021-12/2021-12-15-product-security-bulletin-for-log4shell-vulnerability.pdf)| +|Vyaire medical|All| | |Not vuln| | ||[source](https://www.vyaire.com/product-security)| |Vyaire medical|Mirth Connect| |Vulnerable|Not vuln|Not vuln|Not vuln|Mirth Connect does not make use of the vulnerable JMSAppender in its Log4j configuration by default.|[source](https://www.vyaire.com/product-security)| diff --git a/software/software_list_w.md b/software/software_list_w.md index 110720516..398f34636 100644 --- a/software/software_list_w.md +++ b/software/software_list_w.md @@ -7,49 +7,49 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|WAGO|Smart Script|4.2.x < 4.8.1.3|Not vuln|Fix| | | |[WAGO Website](https://www.wago.com/de/automatisierungstechnik/psirt#log4j)| -|Wallarm|All | | | | | | |[Lab Mitigation Update](https://lab.wallarm.com/cve-2021-44228-mitigation-update/)| -|Wallix |Access Manager|All| |Vulnerable| | | Patch planned by end of december 2021 |[source](https://www.wallix.com/fr/support/alerts/)| -|Wasp Barcode technologies|All| | | | | | |[Waspbarcode Assetcloud Inventorycloud](https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no)| -|Watcher|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://twitter.com/felix_hrn/status/1470387338001977344)| -|WatchGuard|AuthPoint|Cloud|Not vuln|Fix| | |See link|[source](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US)| -|WatchGuard|Dimension|-|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| -|WatchGuard|EPDR and Panda AD360|-|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| -|WatchGuard|Firebox|-|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| -|WatchGuard|Secplicity| | | | | | |[Secplicity Critical RCE](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| -|WatchGuard|System Manager, Dimension, EPDR and Panda AD360|-|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| -|WatchGuard|Threat Detection and Response|Cloud|Not vuln|Fix| | |See link|[source](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US)| -|WatchGuard|Wi-Fi Cloud|Cloud|Not vuln|Fix| | |See link|[source](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US)| -|Weblib|Ucopia| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Ucopia.png)| -|Western Digital|All| | | | | | |[Westerndigital Product Security](https://www.westerndigital.com/support/product-security/wdc-21016-apache-log4j-2-remote-code-execution-vulnerability-analysis)| -|Wibu Systems|CodeMeter Cloud Lite|> 2.2|Not vuln|Fix| | | |[source](https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211213-01.pdf)| +|WAGO|Smart Script|4.2.x < 4.8.1.3|Not vuln|Fix| | ||[WAGO Website](https://www.wago.com/de/automatisierungstechnik/psirt#log4j)| +|Wallarm|All| | | | | ||[Lab Mitigation Update](https://lab.wallarm.com/cve-2021-44228-mitigation-update/)| +|Wallix|Access Manager|All| |Vulnerable| | |Patch planned by end of december 2021|[source](https://www.wallix.com/fr/support/alerts/)| +|Wasp Barcode technologies|All| | | | | ||[Waspbarcode Assetcloud Inventorycloud](https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no)| +|Watcher|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://twitter.com/felix_hrn/status/1470387338001977344)| +|WatchGuard|AuthPoint|Cloud|Not vuln|Fix| | |See link|[source](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US)| +|WatchGuard|Dimension|-|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| +|WatchGuard|EPDR and Panda AD360|-|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| +|WatchGuard|Firebox|-|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| +|WatchGuard|Secplicity| | | | | ||[Secplicity Critical RCE](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| +|WatchGuard|System Manager, Dimension, EPDR and Panda AD360|-|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/)| +|WatchGuard|Threat Detection and Response|Cloud|Not vuln|Fix| | |See link|[source](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US)| +|WatchGuard|Wi-Fi Cloud|Cloud|Not vuln|Fix| | |See link|[source](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US)| +|Weblib|Ucopia| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Ucopia.png)| +|Western Digital|All| | | | | ||[Westerndigital Product Security](https://www.westerndigital.com/support/product-security/wdc-21016-apache-log4j-2-remote-code-execution-vulnerability-analysis)| +|Wibu Systems|CodeMeter Cloud Lite|> 2.2|Not vuln|Fix| | ||[source](https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211213-01.pdf)| |Wibu Systems|CodeMeter Keyring for TIA Portal|> 1.30|Not vuln|Fix| | |Only the Password Manager is affected|[source](https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211213-01.pdf)| |WildFly|All|< 22|Not vuln|Not vuln|Not vuln|Not vuln|No log4j artifact shipped|[source](https://www.wildfly.org/news/2021/12/13/Log4j-CVEs/)| |WildFly|All|> 26.0.0.Final|Not vuln|Not vuln|Not vuln|Not vuln|ships log4j-api where version matches patched version|[source](https://www.wildfly.org/news/2021/12/13/Log4j-CVEs/)| |WildFly|All|>= 22; <= 26.0.0.Beta1|Not vuln|Not vuln|Not vuln|Not vuln|ships log4j-api but not vulnerable code from log4j-core; version of log4j-api might seem to be vulnerable but is not|[source](https://www.wildfly.org/news/2021/12/13/Log4j-CVEs/)| -|Wind River|Linux|<= 8|Not vuln|Not vuln|Not vuln|Not vuln|contain package log4j, but their version is 1.2.x, too old to be affected|[source](https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191)| -|Wind River|Linux|> 8|Not vuln|Not vuln|Not vuln|Not vuln|no support for log4j|[source](https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191)| -|WindRiver|All| | | | | | |[Windriver Security Notice](https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191)| -|Wireshark|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.wireshark.org/news/20211215.html)| -|Wistia|All| | | | | | |[Wistia Incidents](https://status.wistia.com/incidents/jtg0dfl5l224)| -|WitFoo|Precinct|6.x|Not vuln|Fix| | |WitFoo Streamer & Apache Kafka Docker containers are/were vulnerable|[source](https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/)| -|WordPress|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://wordpress.org/support/topic/is-the-log4j-vulnerability-an-issue/)| -|Worksphere|All| | | | | | |[Workspace Security Update](https://www.worksphere.com/product/security-update-on-log4j-cve-2021-44228)| -|Wowza|Streaming Engine|4.7.8, 4.8.x|Not vuln|Workaround| | | |[source](https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve)| -|WSO2|API Manager|>= 3.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|API Manager Analytics|>= 2.6.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Enterprise Integrator|>= 6.1.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Enterprise Integrator Analytics|>= 6.6.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Identity Server|>= 5.9.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Identity Server Analytics|>= 5.7.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Identity Server as Key Manager|>= 5.9.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Micro Gateway|>= 3.2.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Micro Integrator|>= 1.1.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Micro Integrator Dashboard|>= 4.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Micro Integrator Monitoring Dashboard|>= 1.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Open Banking AM|>= 2.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Open Banking BI|>= 1.3.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Open Banking KM|>= 2.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Stream Integrator|>= 1.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Stream Integrator Tooling|>= 1.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| -|WSO2|Stream Processor|>= 4.0.0|Not vuln|Workaround| | | |[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|Wind River|Linux|<= 8|Not vuln|Not vuln|Not vuln|Not vuln|contain package log4j, but their version is 1.2.x, too old to be affected|[source](https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191)| +|Wind River|Linux|> 8|Not vuln|Not vuln|Not vuln|Not vuln|no support for log4j|[source](https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191)| +|WindRiver|All| | | | | ||[Windriver Security Notice](https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191)| +|Wireshark|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.wireshark.org/news/20211215.html)| +|Wistia|All| | | | | ||[Wistia Incidents](https://status.wistia.com/incidents/jtg0dfl5l224)| +|WitFoo|Precinct|6.x|Not vuln|Fix| | |WitFoo Streamer & Apache Kafka Docker containers are/were vulnerable|[source](https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/)| +|WordPress|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://wordpress.org/support/topic/is-the-log4j-vulnerability-an-issue/)| +|Worksphere|All| | | | | ||[Workspace Security Update](https://www.worksphere.com/product/security-update-on-log4j-cve-2021-44228)| +|Wowza|Streaming Engine|4.7.8, 4.8.x|Not vuln|Workaround| | ||[source](https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve)| +|WSO2|API Manager|>= 3.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|API Manager Analytics|>= 2.6.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Enterprise Integrator|>= 6.1.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Enterprise Integrator Analytics|>= 6.6.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Identity Server|>= 5.9.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Identity Server Analytics|>= 5.7.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Identity Server as Key Manager|>= 5.9.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Micro Gateway|>= 3.2.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Micro Integrator|>= 1.1.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Micro Integrator Dashboard|>= 4.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Micro Integrator Monitoring Dashboard|>= 1.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Open Banking AM|>= 2.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Open Banking BI|>= 1.3.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Open Banking KM|>= 2.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Stream Integrator|>= 1.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Stream Integrator Tooling|>= 1.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| +|WSO2|Stream Processor|>= 4.0.0|Not vuln|Workaround| | ||[source](https://docs.wso2.com/pages/viewpage.action?pageId=180948677)| diff --git a/software/software_list_x.md b/software/software_list_x.md index 2370b668d..9ce0d6514 100644 --- a/software/software_list_x.md +++ b/software/software_list_x.md @@ -7,86 +7,86 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|XCP-ng|All| | | | | | |[XCP lOG4j Vulnerability](https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact)| -|XenForo|All| | | | | | |[Xenforo PSA Elasticsearch](https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/)| -|Xerox|Account Payable Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|AltaLink Products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|App Gallery| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|B1022/25| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|B225, B235| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|B230| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|B310| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Baltoro HF Injet Press| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Branded ConnectKey Applications| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|C230| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|C235| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|C310| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Campaigns on Demand| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|CareAR| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Color EC70 Printer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Color EC70 Printer| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|D95A/D110/D125| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Digital Mailroom Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|DocuCentre SC2020| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|XCP-ng|All| | | | | ||[XCP lOG4j Vulnerability](https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact)| +|XenForo|All| | | | | ||[Xenforo PSA Elasticsearch](https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/)| +|Xerox|Account Payable Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|AltaLink Products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|App Gallery| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|B1022/25| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|B225, B235| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|B230| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|B310| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Baltoro HF Injet Press| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Branded ConnectKey Applications| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|C230| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|C235| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|C310| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Campaigns on Demand| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|CareAR| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Color EC70 Printer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Color EC70 Printer| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|D95A/D110/D125| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Digital Mailroom Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|DocuCentre SC2020| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| |Xerox|DocuShare| |Not vuln|Not vuln|Not vuln|Not vuln|DocuShare using Solr search is vulnerable, see below.|[source](https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/DocuShare-Security-Bulletin-XRX21-022-for-CVE-2021-44228-and-CVE-2021-45046-v1.1.pdf?_ga=2.259355715.815728437.1639915896-1216287067.1639915896)| -|Xerox|DocuShare Flex| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/DocuShare-Security-Bulletin-XRX21-022-for-CVE-2021-44228-and-CVE-2021-45046-v1.1.pdf?_ga=2.259355715.815728437.1639915896-1216287067.1639915896)| -|Xerox|DocuShare Go| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/DocuShare-Security-Bulletin-XRX21-022-for-CVE-2021-44228-and-CVE-2021-45046-v1.1.pdf?_ga=2.259355715.815728437.1639915896-1216287067.1639915896)| -|Xerox|DocuShare using Solr search|7.5 hotfix 11|Not vuln|Fix| | | |[source](https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/DocuShare-Security-Bulletin-XRX21-022-for-CVE-2021-44228-and-CVE-2021-45046-v1.1.pdf?_ga=2.259355715.815728437.1639915896-1216287067.1639915896)| -|Xerox|ECxx and WorkCentre Ecxx| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|ED95A/ED125| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|ElemX| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|FreeFlow Core| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|FreeFlow Express to Print| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|FreeFlow Makeready| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|FreeFlow Output Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|FreeFlow Print Manager - APP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|FreeFlow Variable Information Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|iGen 5| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Instant Print Kiosk| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Intelligent Workplace Services| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Iridesse Production Press| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Nuvera EA Perfecting Production Systems| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Nuvera EA Production Systems| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Phaser 3330| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Phaser 3435| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Phaser 6000| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Phaser 6020| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Phaser 6510| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|PrimeLink Products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Print and Scan Experience| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Team Availability Application| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|VersaLink Products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Versant 180/280| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Versant 3100/4100| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|WorkCentre 33xx| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|WorkCentre 53xx| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|WorkCentre 58xx| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|WorkCentre 6025| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|WorkCentre 6515| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|WorkCentre 7970i| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Workflow Central Platform| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Workplace Kiosk| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Workplace Suite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|Workspace Cloud| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|XMPie Data-Driven Print and VDP| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|XMPie Omnichannel Communications| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|Xerox|XMPie Web to Print| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| -|XPertDoc|All| | | | | | |[Xpertdoc](https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727)| -|XPLG|All| | | | | | |[XPLG Secure Log4j](https://www.xplg.com/log4j-vulnerability-exploit-log4shell-xplg-secure/)| -|XWIKI|All| | | | | | |[Xwiki CVE-2021-44228](https://forum.xwiki.org/t/log4j-cve-2021-44228-log4shell-zero-day-vulnerability/9557)| -|Xylem|Aquatalk| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Avensor| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Cloud| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Configuration change complete| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Edge Gateway (xGW)| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus Analytics| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus Automation Control Configuration change complete| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus Cathodic Protection Mitigation in process Mitigation in process| | |Vulnerable| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus FieldLogic LogServer| | |Vulnerable| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus Lighting Control| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus NetMetrics Configuration change complete| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus RNI On Prem|4.7 through 4.10, 4.4 through 4.6, 4.2| |Vulnerable| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus RNI Saas|4.7 through 4.10, 4.4 through 4.6, 4.2|Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Sensus SCS| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Smart Irrigation| | |Vulnerable| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| -|Xylem|Water Loss Management (Visenti)| |Not vuln|Fix| | | |[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xerox|DocuShare Flex| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/DocuShare-Security-Bulletin-XRX21-022-for-CVE-2021-44228-and-CVE-2021-45046-v1.1.pdf?_ga=2.259355715.815728437.1639915896-1216287067.1639915896)| +|Xerox|DocuShare Go| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/DocuShare-Security-Bulletin-XRX21-022-for-CVE-2021-44228-and-CVE-2021-45046-v1.1.pdf?_ga=2.259355715.815728437.1639915896-1216287067.1639915896)| +|Xerox|DocuShare using Solr search|7.5 hotfix 11|Not vuln|Fix| | ||[source](https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/DocuShare-Security-Bulletin-XRX21-022-for-CVE-2021-44228-and-CVE-2021-45046-v1.1.pdf?_ga=2.259355715.815728437.1639915896-1216287067.1639915896)| +|Xerox|ECxx and WorkCentre Ecxx| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|ED95A/ED125| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|ElemX| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|FreeFlow Core| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|FreeFlow Express to Print| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|FreeFlow Makeready| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|FreeFlow Output Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|FreeFlow Print Manager - APP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|FreeFlow Variable Information Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|iGen 5| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Instant Print Kiosk| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Intelligent Workplace Services| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Iridesse Production Press| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Nuvera EA Perfecting Production Systems| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Nuvera EA Production Systems| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Phaser 3330| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Phaser 3435| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Phaser 6000| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Phaser 6020| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Phaser 6510| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|PrimeLink Products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Print and Scan Experience| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Team Availability Application| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|VersaLink Products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Versant 180/280| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Versant 3100/4100| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|WorkCentre 33xx| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|WorkCentre 53xx| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|WorkCentre 58xx| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|WorkCentre 6025| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|WorkCentre 6515| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|WorkCentre 7970i| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Workflow Central Platform| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Workplace Kiosk| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Workplace Suite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|Workspace Cloud| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|XMPie Data-Driven Print and VDP| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|XMPie Omnichannel Communications| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|Xerox|XMPie Web to Print| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-and-CVE-2021-45046-v1.5.pdf)| +|XPertDoc|All| | | | | ||[Xpertdoc](https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727)| +|XPLG|All| | | | | ||[XPLG Secure Log4j](https://www.xplg.com/log4j-vulnerability-exploit-log4shell-xplg-secure/)| +|XWIKI|All| | | | | ||[Xwiki CVE-2021-44228](https://forum.xwiki.org/t/log4j-cve-2021-44228-log4shell-zero-day-vulnerability/9557)| +|Xylem|Aquatalk| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Avensor| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Cloud| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Configuration change complete| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Edge Gateway (xGW)| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus Analytics| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus Automation Control Configuration change complete| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus Cathodic Protection Mitigation in process Mitigation in process| | |Vulnerable| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus FieldLogic LogServer| | |Vulnerable| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus Lighting Control| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus NetMetrics Configuration change complete| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus RNI On Prem|4.7 through 4.10, 4.4 through 4.6, 4.2| |Vulnerable| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus RNI Saas|4.7 through 4.10, 4.4 through 4.6, 4.2|Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Sensus SCS| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Smart Irrigation| | |Vulnerable| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| +|Xylem|Water Loss Management (Visenti)| |Not vuln|Fix| | ||[Xylem Advisory Link](https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf)| diff --git a/software/software_list_y.md b/software/software_list_y.md index b7b7dc17f..7dffc7a27 100644 --- a/software/software_list_y.md +++ b/software/software_list_y.md @@ -7,21 +7,24 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| -|Y Soft|SAFEQ 6|<= 6.0.63|Not vuln|Workaround| | | |[source](https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf)| +|YSoft|SAFEQ 4| | |Not vuln| | ||[link](https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf)| +|YSoft|SAFEQ 5| | |Not vuln| | ||[link](https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf)| +|YSoft|SAFEQ 6| | |Fix| | ||[link](https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf)| +|Y Soft|SAFEQ 6|<= 6.0.63|Not vuln|Workaround| | ||[source](https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf)| |Yahoo|Vespa| |Not vuln|Not vuln|Not vuln|Not vuln|Your Vespa application may still be affected if log4j is included in your application package|[source](https://blog.vespa.ai/log4j-vulnerability/)| -|Yellowbrick|All| | | | | | |[YellowBrick Security Advisory Yellowbrick](https://support.yellowbrick.com/hc/en-us/articles/4412586575379-Security-Advisory-Yellowbrick-is-NOT-Affected-by-the-Log4Shell-Vulnerability)| +|Yellowbrick|All| | | | | ||[YellowBrick Security Advisory Yellowbrick](https://support.yellowbrick.com/hc/en-us/articles/4412586575379-Security-Advisory-Yellowbrick-is-NOT-Affected-by-the-Log4Shell-Vulnerability)| |Yellowfin|All|8.0.10.3, 9.7.0.2|Not vuln|Fix| | |v7 and v6 releases are not affected unless you have manually upgraded to Log4j2|[source](https://community.yellowfinbi.com/announcement/notice-critical-vulnerability-in-log4j2)| |Yenlo|Connext|2.x|Not vuln|Not vuln|Not vuln|Not vuln|Connext Platform (Managed WSO2 Cloud) and all underlying middleware components are not vulnerable|[source](https://www.yenlo.com/news/vulnerability-code-log4shell-log4j2)| -|Yokogawa|CENTUM VP|Unified Gateway Station (UGS2) Standard Function R6.06.00 or earlier|Investigation|Investigation|Investigation|Investigation| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|CENTUM VP|Unified Gateway Station (UGS2) Standard Function R6.06.00 or earlier|Investigation|Investigation|Investigation|Investigation||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| |Yokogawa|CENTUM VP (other components)| |Not vuln|Not vuln|Not vuln|Not vuln|Unified Gateway Station (UGS2) Standard Function R6.06.00 or earlier is still under investigation|[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|CI Server| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|Exaopc| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|Exaplog| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|Exaquantum| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|FAST/TOOLS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|PRM| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|ProSafe-RS| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|ProSafe-RS Lite| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|STARDOM| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|Yokogawa|VTSPortal| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| -|YSoft SAFEQ|All| | | | | | |[Ysoft Safeq](https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf)| +|Yokogawa|CI Server| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|Exaopc| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|Exaplog| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|Exaquantum| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|FAST/TOOLS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|PRM| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|ProSafe-RS| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|ProSafe-RS Lite| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|STARDOM| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|Yokogawa|VTSPortal| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.yokogawa.com/solutions/products-platforms/announcements/important-notice/log4shell/)| +|YSoft SAFEQ|All| | | | | ||[Ysoft Safeq](https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf)| diff --git a/software/software_list_z.md b/software/software_list_z.md index 731cfec5e..aeea9f449 100644 --- a/software/software_list_z.md +++ b/software/software_list_z.md @@ -7,10 +7,11 @@ | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:| +|Zix|All| | | | | ||[link](https://status.appriver.com/)| |Zabbix|All| |Not vuln|Not vuln|Not vuln|Not vuln|Zabbix is aware of this vulnerability, has completed verification, and can conclude that the only product where we use Java is Zabbix Java Gateway, which does not utilize the log4j library, thereby is not impacted by this vulnerability.|[source](https://blog.zabbix.com/zabbix-not-affected-by-the-log4j-exploit/17873/)| |Zammad|All| |Not vuln|Workaround| | |Most of Zammad instances make use of Elasticsearch which might be vulnerable.|[source](https://community.zammad.org/t/cve-2021-44228-elasticsearch-users-be-aware/8256)| -|Zaproxy|All| | | | | | |[Zaproxy](https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/)| -|Zebra|All| | | | | | |[Zebra lifeguard Security](https://www.zebra.com/us/en/support-downloads/lifeguard-security/cve-2021-442280-dubbed-log4shell-or-logjam-vulnerability.html)| +|Zaproxy|All| | | | | ||[Zaproxy](https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/)| +|Zebra|All| | | | | ||[Zebra lifeguard Security](https://www.zebra.com/us/en/support-downloads/lifeguard-security/cve-2021-442280-dubbed-log4shell-or-logjam-vulnerability.html)| |Zeiss|Cataract Suite|1.3.1|Not vuln|Fix| | |Patch is available|[source](https://www.zeiss.com/meditec/int/cybersecurity/apache-log4j/english.html)| |Zeiss|EQ Workplace|1.6 and 1.8|Not vuln|Fix| | |Patch is available|[source](https://www.zeiss.com/meditec/int/cybersecurity/apache-log4j/english.html)| |Zeiss|FORUM|4.2.x|Not vuln|Fix| | |Patch is available|[source](https://www.zeiss.com/meditec/int/cybersecurity/apache-log4j/english.html)| @@ -19,18 +20,18 @@ |Zeiss|Retina Workplace|2.5.x and 2.6.x|Not vuln|Fix| | |Patch is available|[source](https://www.zeiss.com/meditec/int/cybersecurity/apache-log4j/english.html)| |Zendesk|All|All| |Vulnerable| | |Zendesk products are all cloud-based; thus there are no updates for the customers to install as the company is working on patching their infrastructure and systems.|[2021-12-13 Security Advisory - Apache Log4j (CVE-2021-44228)](https://support.zendesk.com/hc/en-us/articles/4413583476122)| |Zendesk|All| |Not vuln|Workaround| | |SaaS - No user action|[source](https://support.zendesk.com/hc/en-us/articles/4413583476122-2021-12-13-Security-Advisory-Apache-Log4j-CVE-2021-44228-)| -|Zenoss|All| | | | | | |[Zenoss](https://support.zenoss.com/hc/en-us)| -|Zentera Systems, Inc.|CoIP Access Platform|All|Not vuln|Not vuln|Not vuln|Not vuln| |[[CVE-2021-44228] Log4Shell Vulnerability in Apache Log4j](https://support.zentera.net/hc/en-us/articles/4416227743511--CVE-2021-44228-Log4Shell-Vulnerability-in-Apache-Log4j)| -|Zerto|Cloud Appliance| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://help.zerto.com/kb/000004822)| -|Zerto|Cloud Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://help.zerto.com/kb/000004822)| -|Zerto|Virtual Manager| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://help.zerto.com/kb/000004822)| -|Zerto|Virtual Replication Appliance| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://help.zerto.com/kb/000004822)| -|Zesty|.io| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.zesty.io/mindshare/company-announcements/log4j-exploit/)| -|Zimbra|All| | | | | | |[BugZilla Zimbra](https://bugzilla.zimbra.com/show_bug.cgi?id=109428)| -|Zoho|Online| | |Investigation| | | |[source](https://help.zoho.com/portal/en/community/topic/update-on-the-recent-apache-log4j-vulnerability)| -|Zoom|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://explore.zoom.us/en/trust/security/security-bulletin/security-bulletin-log4j)| -|ZPE systems Inc|All| | | | | | |[ZpeSystems CVE-2021-44228](https://support.zpesystems.com/portal/en/kb/articles/is-nodegrid-os-and-zpe-cloud-affected-by-cve-2021-44228-apache-log4j)| -|Zscaler|All| |Not vuln|Fix| | | |[source](https://trust.zscaler.com/posts/9581)| -|Zyxel|All other products| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://community.zyxel.com/en/discussion/12229/zyxel-security-advisory-for-apache-log4j-rce-vulnerability)| +|Zenoss|All| | | | | ||[Zenoss](https://support.zenoss.com/hc/en-us)| +|Zentera Systems, Inc.|CoIP Access Platform|All|Not vuln|Not vuln|Not vuln|Not vuln||[[CVE-2021-44228] Log4Shell Vulnerability in Apache Log4j](https://support.zentera.net/hc/en-us/articles/4416227743511--CVE-2021-44228-Log4Shell-Vulnerability-in-Apache-Log4j)| +|Zerto|Cloud Appliance| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://help.zerto.com/kb/000004822)| +|Zerto|Cloud Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://help.zerto.com/kb/000004822)| +|Zerto|Virtual Manager| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://help.zerto.com/kb/000004822)| +|Zerto|Virtual Replication Appliance| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://help.zerto.com/kb/000004822)| +|Zesty|.io| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.zesty.io/mindshare/company-announcements/log4j-exploit/)| +|Zimbra|All| | | | | ||[BugZilla Zimbra](https://bugzilla.zimbra.com/show_bug.cgi?id=109428)| +|Zoho|Online| | |Investigation| | ||[source](https://help.zoho.com/portal/en/community/topic/update-on-the-recent-apache-log4j-vulnerability)| +|Zoom|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://explore.zoom.us/en/trust/security/security-bulletin/security-bulletin-log4j)| +|ZPE systems Inc|All| | | | | ||[ZpeSystems CVE-2021-44228](https://support.zpesystems.com/portal/en/kb/articles/is-nodegrid-os-and-zpe-cloud-affected-by-cve-2021-44228-apache-log4j)| +|Zscaler|All| |Not vuln|Fix| | ||[source](https://trust.zscaler.com/posts/9581)| +|Zyxel|All other products| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://community.zyxel.com/en/discussion/12229/zyxel-security-advisory-for-apache-log4j-rce-vulnerability)| |Zyxel|NetAtlas Element Management System (EMS)| | |Vulnerable| | |Hotfix availability Dec. 20, 2021, Patch availability in end of Feb. 2022|[source](https://community.zyxel.com/en/discussion/12229/zyxel-security-advisory-for-apache-log4j-rce-vulnerability)| -|Zyxel|Security Firewall/Gateways|ZLD Firmware Security Services, Nebula|Not vuln|Not vuln|Not vuln|Not vuln| |[Zyxel Security Advisory](https://community.zyxel.com/en/discussion/12229/zyxel-security-advisory-for-apache-log4j-rce-vulnerability)| +|Zyxel|Security Firewall/Gateways|ZLD Firmware Security Services, Nebula|Not vuln|Not vuln|Not vuln|Not vuln||[Zyxel Security Advisory](https://community.zyxel.com/en/discussion/12229/zyxel-security-advisory-for-apache-log4j-rce-vulnerability)|