Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Configuration 13 (hide)
|
Configuration 14 (hide)
|
Configuration 15 (hide)
|
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2022/Dec/2 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2022/Jul/11 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2022/Mar/23 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/1 - Mailing List, Mitigation, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/2 - Mailing List, Mitigation, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/3 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/13/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/13/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/14/4 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/15/3 - Mailing List, Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf - Third Party Advisory | |
References | () https://github.com/cisagov/log4j-affected-db - Third Party Advisory | |
References | () https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Broken Link, Product, US Government Resource | |
References | () https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ - Release Notes | |
References | () https://logging.apache.org/log4j/2.x/security.html - Release Notes, Vendor Advisory | |
References | () https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Patch, Third Party Advisory, Vendor Advisory | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211210-0007/ - Third Party Advisory | |
References | () https://support.apple.com/kb/HT213189 - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
References | () https://twitter.com/kurtseifried/status/1469345530182455296 - Broken Link, Exploit, Third Party Advisory | |
References | () https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5020 - Mailing List, Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html - Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/930724 - Third Party Advisory, US Government Resource | |
References | () https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html - Exploit, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/alert-cve-2021-44228.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory |
24 Jul 2024, 17:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apple
Apple xcode |
|
CPE | cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:* | |
References | () http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Broken Link, Product, US Government Resource | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ - Release Notes | |
References | () https://security.netapp.com/advisory/ntap-20211210-0007/ - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
References | () https://twitter.com/kurtseifried/status/1469345530182455296 - Broken Link, Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5020 - Mailing List, Third Party Advisory |
17 Aug 2022, 17:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:* |
09 Aug 2022, 13:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-917 | |
References | (MISC) http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html - Third Party Advisory, VDB Entry | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/11 - Mailing List, Third Party Advisory |
03 Aug 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Jul 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jun 2022, 18:26
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | (MISC) https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 - Exploit, Third Party Advisory | |
References | (MISC) https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html - Exploit, Third Party Advisory |
05 May 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Apr 2022, 00:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Apr 2022, 13:45
Type | Values Removed | Values Added |
---|---|---|
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/23 - Mailing List, Third Party Advisory |
12 Apr 2022, 18:14
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/cisagov/log4j-affected-db - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT213189 - Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/23 - Third Party Advisory | |
References | (MISC) https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 - Third Party Advisory | |
CPE | cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:* cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:* |
15 Mar 2022, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Mar 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Mar 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Feb 2022, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory |
07 Feb 2022, 16:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Feb 2022, 20:31
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf - Third Party Advisory | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf - Third Party Advisory | |
References | (MISC) https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Product, US Government Resource | |
References | (MISC) http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ - Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Third Party Advisory, VDB Entry | |
References | (MISC) http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Third Party Advisory, VDB Entry | |
References | (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Patch, Third Party Advisory, Vendor Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* |
24 Jan 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jan 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Jan 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jan 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. |
28 Dec 2021, 19:32
Type | Values Removed | Values Added |
---|---|---|
References | (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Patch, Third Party Advisory | |
References | (MISC) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
CPE | cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:* cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:* |
20 Dec 2021, 18:13
Type | Values Removed | Values Added |
---|---|---|
References | (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Third Party Advisory | |
References | (MISC) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
CPE | cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.000:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:9.1\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):es02:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_network_automation:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_network_automation:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:12.5\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004:*:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.002\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.003:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1h\):*:*:*:*:*:*:* cpe:2.3:a:cisco:video_surveillance_manager:7.14\(1.26\):*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_sip_proxy:010.002\(000\):*:*:*:*:*:*:* cpe:2.3:a:cisco:dna_center:2.2.2.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:unity_connection:11.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_sip_proxy:010.000\(001\):*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:003.001\(000.518\):-:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.002.000:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_suite:5.3\(0\):*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:20.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:8.4\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1l\):*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_enterprise:12.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_suite:5.5\(0\):*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.002\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.001.000:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_suite:5.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_phy:3.1.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:dna_spaces_connector:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.22900.28\):*:*:*:*:*:*:* cpe:2.3:a:cisco:video_surveillance_manager:7.14\(4.018\):*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:12.6\(1\):es01:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.18900.97\):*:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.000\):*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.21900.40\):*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:8.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:dna_spaces:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):es01:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:8.3\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:003.002\(000.116\):-:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_express:12.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.1.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_express:12.5\(1\):-:*:*:*:*:*:* cpe:2.3:a:cisco:video_surveillance_manager:7.14\(3.025\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:virtual_topology_system:2.6.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.4\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_express:12.6\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.001\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000:*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_phy:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:mobility_services_engine:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_suite:5.4\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.2\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:9.0\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:003.000\(000.458\):-:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:12.5\(1\):su1:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_management_portal:12.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:20.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:enterprise_chat_and_email:12.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(3\):*:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:enterprise_chat_and_email:12.0\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:network_assurance_engine:6.0\(2.1912\):*:*:*:*:*:*:* cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.3.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:002.010\(000.000\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.000:*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1g\):*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.18119.2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\(2\):*:*:*:*:*:*:* cpe:2.3:a:cisco:emergency_responder:11.5\(4.65000.14\):*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:9.0\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:11.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.000\):*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:emergency_responder:11.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_sip_proxy:010.002\(001\):*:*:*:*:*:*:* cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:12.0\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:11.5\(1.22900.6\):*:*:*:*:*:*:* cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_suite:4.10\(0.15\):*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:20.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:emergency_responder:11.5\(4.66000.14\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.000.001:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_network_automation:4.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_sip_proxy:010.000\(000\):*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:integrated_management_controller_supervisor:002.003\(002.000\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_phy:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_phy:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central_software:2.0\(1k\):*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_network_automation:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:002.004\(000.914\):-:*:*:*:*:*:* cpe:2.3:a:cisco:network_insights_for_data_center:6.0\(2.1914\):*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:002.006\(000.156\):-:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:12.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_phy:21.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:12.5\(1\):su2:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.001\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:7.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_intelligence_center:12.6\(2\):-:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:cx_cloud_agent:001.012:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:002.007\(000.356\):-:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:11.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:12.6\(1\):es03:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):-:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_enterprise:12.0\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:14.0\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unity_connection:11.5\(1.10000.6\):*:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:12.6\(1\):es02:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:12.6\(1\):-:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.3\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:* cpe:2.3:a:cisco:video_surveillance_manager:7.14\(2.26\):*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_phy:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.1\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:006.008\(001.000\):*:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.004.000.003:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.17900.52\):*:*:*:*:*:*:* cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.0\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:optical_network_controller:1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_network_automation:4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:20.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_workforce_optimization:11.5\(1\):sr7:*:*:*:*:*:* cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:12.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.001.001:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_express:12.5\(1\):su1:*:*:*:*:*:* |
16 Dec 2021, 19:56
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html - Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html - Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html - Third Party Advisory, VDB Entry | |
References | (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Mitigation, Third Party Advisory | |
References | (CERT-VN) https://www.kb.cert.org/vuls/id/930724 - Third Party Advisory, US Government Resource | |
References | (MISC) http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | (DEBIAN) https://www.debian.org/security/2021/dsa-5020 - Third Party Advisory | |
References | (MISC) https://twitter.com/kurtseifried/status/1469345530182455296 - Exploit, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html - Third Party Advisory, VDB Entry | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html - Mailing List, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html - Third Party Advisory, VDB Entry | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/12/15/3 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/1 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/12/14/4 - Mailing List, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | (MISC) http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/2 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf - Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_harness_design:2020:sp2002:*:*:*:*:*:* cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:network_assurance_engine:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:video_surveillance_operations_manager:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\)su3:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5:*:*:*:*:*:* cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:* cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:siveillance_command:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_suite_admin:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_7:2.30:-:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:siemens:xpedition_package_integrator:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:connected_mobile_experiences:-:*:*:*:*:*:*:* cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip:8.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:paging_server:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:wan_automation_engine:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:* cpe:2.3:a:intel:system_studio:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:nexus_insights:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3:*:*:*:*:*:* cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:2019.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release4:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:2019.1:-:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:sentron_powermanager:4.2:*:*:*:*:*:*:* cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_4:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:11.5\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_optimization_engine:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:fog_director:-:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:* cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_harness_design:2020:*:*:*:*:*:*:* cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_4:4.70:-:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:gma-manager:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_workload_manager:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:mindsphere:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:data_center_network_manager:11.3\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:2019.1:sp1912:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.1:*:*:*:*:*:*:* cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:12.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:packaged_contact_center_enterprise:11.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_network_controller:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip:9.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_data_gateway:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:e-car_operation_center:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloud_connect:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:nx:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:energy_engage:3.1:*:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_harness_design:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:head-end_system_universal_device_integration_system:*:*:*:*:*:*:*:* cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:* cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_harness_design:2020:-:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:* cpe:2.3:a:siemens:industrial_edge_management:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_4:4.70:sp8:*:*:*:*:*:* cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:* cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:customer_experience_cloud_agent:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\(2\):*:*:*:*:*:*:* cpe:2.3:o:cisco:unified_sip_proxy:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:siveillance_vantage:*:*:*:*:*:*:*:* cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip:8.6:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter_cost_optimizer:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_info_center:5.1:*:*:*:*:*:*:* cpe:2.3:a:siemens:xpedition_enterprise:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_platform_infrastructure:4.1.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:smart_phy:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:session_management:*:*:* cpe:2.3:o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:optical_network_controller:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:navigator:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:dna_spaces\:_connector:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip:8.7:*:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_7:2.30:*:*:*:*:*:*:* cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:logo\!_soft_comfort:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_info_center:5.0:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:finesse:12.6\(1\):*:*:*:*:*:*:* cpe:2.3:a:cisco:ucs_central:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_4:4.70:sp7:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:contact_center_management_portal:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:intersight_virtual_appliance:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:* cpe:2.3:a:intel:data_center_manager:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2:*:*:*:*:*:* cpe:2.3:a:cisco:iot_operations_dashboard:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:siveillance_viewpoint:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:contact_center_domain_manager:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:siveillance_control_pro:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:* cpe:2.3:a:siemens:spectrum_power_7:2.30:sp2:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:-:*:*:*:*:* cpe:2.3:a:siemens:industrial_edge_management_hub:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_platform_infrastructure:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:sentron_powermanager:4.1:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:workload_optimization_manager:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:teamcenter:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:crosswork_optimization_engine:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_cam_pro:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_customer_voice_portal:12.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:* cpe:2.3:o:cisco:unified_intelligence_center:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:* cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:-:*:*:* cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:* |
16 Dec 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Dec 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Dec 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Dec 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. |
15 Dec 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. | |
References |
|
15 Dec 2021, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Dec 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). |
13 Dec 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2021, 15:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:* cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:* cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:* cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:* |
|
CWE | CWE-502 | |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 10.0 |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/1 - Mailing List, Mitigation, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/2 - Mailing List, Mitigation, Third Party Advisory | |
References | (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20211210-0007/ - Vendor Advisory | |
References | (MISC) http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://www.oracle.com/security-alerts/alert-cve-2021-44228.html - Third Party Advisory | |
References | (MISC) https://logging.apache.org/log4j/2.x/security.html - Release Notes, Vendor Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/3 - Mailing List, Third Party Advisory | |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory |
13 Dec 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against remote code execution by defaulting "com.sun.jndi.rmi.object.trustURLCodebase" and "com.sun.jndi.cosnaming.object.trustURLCodebase" to "false". |
12 Dec 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). |
12 Dec 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Dec 2021, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Dec 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Dec 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Dec 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Dec 2021, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2021-12-10 10:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44228
Mitre link : CVE-2021-44228
CVE.ORG link : CVE-2021-44228
JSON object : View
cisco
- network_assurance_engine
- network_insights_for_data_center
- dna_spaces\
- optical_network_controller
- connected_mobile_experiences
- contact_center_management_portal
- crosswork_zero_touch_provisioning
- firepower_1120
- webex_meetings_server
- iot_operations_dashboard
- identity_services_engine
- cyber_vision
- emergency_responder
- evolved_programmable_network_manager
- unified_sip_proxy
- dna_spaces
- firepower_4112
- firepower_4140
- connected_analytics_for_network_deployment
- video_surveillance_operations_manager
- video_surveillance_manager
- nexus_insights
- mobility_services_engine
- crosswork_network_controller
- firepower_1150
- firepower_4150
- wan_automation_engine
- crosswork_network_automation
- integrated_management_controller_supervisor
- cyber_vision_sensor_management_extension
- ucs_director
- firepower_4145
- cloudcenter
- intersight_virtual_appliance
- broadworks
- automated_subsea_tuning
- firepower_2120
- cloud_connect
- cloudcenter_suite
- virtual_topology_system
- smart_phy
- firepower_4110
- prime_service_catalog
- unified_contact_center_enterprise
- fog_director
- data_center_network_manager
- packaged_contact_center_enterprise
- sd-wan_vmanage
- firepower_2140
- dna_spaces_connector
- common_services_platform_collector
- advanced_malware_protection_virtual_private_cloud_appliance
- unified_contact_center_express
- firepower_1010
- firepower_4115
- firepower_2130
- firepower_threat_defense
- customer_experience_cloud_agent
- finesse
- paging_server
- crosswork_data_gateway
- firepower_9300
- crosswork_platform_infrastructure
- cx_cloud_agent
- unified_contact_center_management_portal
- nexus_dashboard
- fxos
- unified_computing_system
- firepower_1140
- unified_workforce_optimization
- virtualized_voice_browser
- business_process_automation
- unified_intelligence_center
- dna_center
- network_services_orchestrator
- ucs_central
- cloudcenter_cost_optimizer
- virtualized_infrastructure_manager
- firepower_2110
- enterprise_chat_and_email
- crosswork_optimization_engine
- unified_communications_manager
- firepower_4125
- network_dashboard_fabric_controller
- workload_optimization_manager
- contact_center_domain_manager
- unified_communications_manager_im_and_presence_service
- unified_customer_voice_portal
- firepower_4120
- cloudcenter_workload_manager
- cloudcenter_suite_admin
- unity_connection
- ucs_central_software
- unified_communications_manager_im_\&_presence_service
siemens
- siveillance_identity
- opcenter_intelligence
- teamcenter
- xpedition_enterprise
- spectrum_power_4
- desigo_cc_info_center
- siveillance_command
- desigo_cc_advanced_reports
- e-car_operation_center
- sppa-t3000_ses3000
- xpedition_package_integrator
- solid_edge_cam_pro
- gma-manager
- energy_engage
- logo\!_soft_comfort
- mendix
- vesys
- industrial_edge_management
- sppa-t3000_ses3000_firmware
- siveillance_viewpoint
- operation_scheduler
- industrial_edge_management_hub
- siguard_dsa
- siveillance_vantage
- sentron_powermanager
- solid_edge_harness_design
- navigator
- head-end_system_universal_device_integration_system
- comos
- sipass_integrated
- mindsphere
- nx
- spectrum_power_7
- siveillance_control_pro
- energyip
- energyip_prepay
- captial
debian
- debian_linux
bentley
- synchro
- synchro_4d
netapp
- cloud_secure_agent
- active_iq_unified_manager
- cloud_manager
- oncommand_insight
- cloud_insights
- ontap_tools
- snapcenter
intel
- genomics_kernel_library
- system_debugger
- sensor_solution_firmware_development_kit
- system_studio
- computer_vision_annotation_tool
- data_center_manager
- secure_device_onboard
- audio_development_kit
- oneapi_sample_browser
snowsoftware
- vm_access_proxy
- snow_commander
apple
- xcode
apache
- log4j
fedoraproject
- fedora
percussion
- rhythmyx
sonicwall
- email_security