ID

VAR-202112-0566


CVE

CVE-2021-44228


TITLE

Apache Log4j allows insecure JNDI lookups

Trust: 0.8

sources: CERT/CC: VU#930724

DESCRIPTION

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. Apache Log4j allows insecure JNDI lookups that could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the vulnerable Java application using Log4j.CVE-2021-4104 Affected CVE-2021-44228 Affected CVE-2021-45046 AffectedCVE-2021-4104 Affected CVE-2021-44228 Affected CVE-2021-45046 Affected. This update also fixes CVE-2020-9488 in the oldstable distribution (buster). Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. For the oldstable distribution (buster), this problem has been fixed in version 2.15.0-1~deb10u1. For the stable distribution (bullseye), this problem has been fixed in version 2.15.0-1~deb11u1. We recommend that you upgrade your apache-log4j2 packages. For the detailed security status of apache-log4j2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apache-log4j2 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmG0+YVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQvXA/+LIMVC0X80Qc6No564VodtTN3Ci0NyaUcQyZG8Gyo2tPuwKEpOUpmom7f wcZvQgKvwxs3Ad1M5Zt/6Ql3v0KbwzBah0v8KUV86B6g4yb+Wno7iKQR1mN47bpz 2SJPzf6IECwtmz3zYI3fLuJJ/dvAMRlQ+nhPsC8/zJGJgfFHFmDyfG8TtlrYLUHS Pjpov4C/VllQGJ5MjyVF93OqTCy4V7WxH/RgT1YBOs71KNCq5yPoch35geytSQoM Kk59qFLQgST2kYhLVxRRbdQAAhbA7W5XythKqphon6nRmlJPHSGkXMf9s0N3cm6K Zkmvo2/A29FiceZj/bSM4/qw7gqbsJfpSMcTKmxhReolsXAJVj4mGu9cZZTAP7Tb g8fl8kGljFd01ka0208eFyILHCR2bAF2xgS1nG6TCc170azDkvW38fZHHkLQIPbF TOwxoNv8dHgyT6pfI+BDYKy9pNvrLk/jqXkOpry6nY+Ji/RcjGBDIR3VP25VsMk8 6zwERE1LX0IvwiaSFBg6oyWW4siINZzFyVXryLvRr/YBIAYKGv+Y1Wn8ageACItW 2SZjLbK4uBTOHyvPITBgOZSYD7kYcTPxdbb8ntw7Uo489hYXzjYlloTBoUPg1G3o gyZnRfW0yYf2bA63I7vVBDTITt8K4H1UkUDEOIUjXGekFLqDnGw= =BY2+ -----END PGP SIGNATURE----- . Description: Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. Security Fix(es): * log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value (CVE-2021-44228) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value 5. JIRA issues fixed (https://issues.jboss.org/): LOG-1897 - Applying cluster state is causing elasticsearch to hit an issue and become unusable LOG-1925 - [release-5.3] No datapoint for CPU on openshift-logging dashboard LOG-1962 - [release-5.3] CLO panic: runtime error: slice bounds out of range [:-1] 6. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. Installation instructions are available from the Fuse product documentation pages: Fuse 7.8: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/deploying_into_spring_boot/patch-red-hat-fuse-applications Fuse 7.9: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/deploying_into_spring_boot/patch-red-hat-fuse-applications Fuse 7.10: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/deploying_into_spring_boot/patch-red-hat-fuse-applications 4. 2021-12-11: VMSA-2021-0028.1 Updated advisory with workaround information for multiple products including vCenter Server Appliance, vRealize Operations, Horizon, vRealize Log Insight, Unified Access Gateway. 2021-12-13: VMSA-2021-0028.2 Revised advisory with updates to multiple products. \x95 VMware HCX \x95 VMware NSX-T Data Center \x95 VMware WorkspaceOne Access \x95 VMware Identity Manager \x95 VMware vRealize Operations Cloud Proxy \x95 VMware vRealize Lifecycle Manager \x95 VMware Site Recovery Manager, vSphere Replication \x95 VMware Carbon Black Cloud Workload Appliance \x95 VMware Carbon Black EDR Server \x95 VMware Tanzu GemFire \x95 VMware Tanzu Greenplum \x95 VMware Tanzu Operations Manager \x95 VMware Tanzu Application Service for VMs \x95 VMware Tanzu Kubernetes Grid Integrated Edition \x95 VMware Tanzu Observability by Wavefront Nozzle \x95 Healthwatch for Tanzu Application Service \x95 Spring Cloud Services for VMware Tanzu \x95 API Portal for VMware Tanzu \x95 Single Sign-On for VMware Tanzu Application Service \x95 App Metrics \x95 VMware vCenter Cloud Gateway \x95 VMware Cloud Foundation \x95 VMware Workspace ONE Access Connector \x95 VMware Horizon DaaS \x95 VMware Horizon Cloud Connector \x95 VMware NSX Data Center for vSphere \x95 VMware AppDefense Appliance \x95 VMware Cloud Director Object Storage Extension You are receiving this alert because you are subscribed to the VMware Security Announcements mailing list. To modify your subscription or unsubscribe please visit https://lists.vmware.com/mailman/listinfo/security-announce. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: Red Hat Process Automation Manager 7.12.0 security update Advisory ID: RHSA-2022:0296-01 Product: Red Hat Process Automation Manager Advisory URL: https://access.redhat.com/errata/RHSA-2022:0296 Issue date: 2022-01-26 CVE Names: CVE-2020-28491 CVE-2021-20218 CVE-2021-29505 CVE-2021-39139 CVE-2021-39140 CVE-2021-39141 CVE-2021-39144 CVE-2021-39145 CVE-2021-39146 CVE-2021-39147 CVE-2021-39148 CVE-2021-39149 CVE-2021-39150 CVE-2021-39151 CVE-2021-39152 CVE-2021-39153 CVE-2021-39154 CVE-2021-44228 ===================================================================== 1. Summary: An update is now available for Red Hat Process Automation Manager. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This release of Red Hat Process Automation Manager 7.12.0 serves as an update to Red Hat Process Automation Manager 7.11.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value (CVE-2021-44228) * jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception (CVE-2020-28491) * kubernetes-client: fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise (CVE-2021-20218) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39145) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39151) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration (CVE-2021-39147) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator (CVE-2021-39148) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39141) * xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39146) * xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39154) * xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144) * xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39139) * xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39153) * xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140) * xstream: remote command execution attack by manipulating the processed input stream (CVE-2021-29505) * xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150) * xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. It is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1923405 - CVE-2021-20218 fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise 1930423 - CVE-2020-28491 jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception 1966735 - CVE-2021-29505 XStream: remote command execution attack by manipulating the processed input stream 1997763 - CVE-2021-39139 xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl 1997765 - CVE-2021-39140 xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler 1997769 - CVE-2021-39141 xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* 1997772 - CVE-2021-39144 xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* 1997775 - CVE-2021-39145 xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration 1997777 - CVE-2021-39146 xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue 1997779 - CVE-2021-39147 xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration 1997781 - CVE-2021-39148 xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator 1997784 - CVE-2021-39149 xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* 1997786 - CVE-2021-39150 xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* 1997791 - CVE-2021-39151 xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration 1997793 - CVE-2021-39152 xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData 1997795 - CVE-2021-39153 xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl 1997801 - CVE-2021-39154 xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue 2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value 5. References: https://access.redhat.com/security/cve/CVE-2020-28491 https://access.redhat.com/security/cve/CVE-2021-20218 https://access.redhat.com/security/cve/CVE-2021-29505 https://access.redhat.com/security/cve/CVE-2021-39139 https://access.redhat.com/security/cve/CVE-2021-39140 https://access.redhat.com/security/cve/CVE-2021-39141 https://access.redhat.com/security/cve/CVE-2021-39144 https://access.redhat.com/security/cve/CVE-2021-39145 https://access.redhat.com/security/cve/CVE-2021-39146 https://access.redhat.com/security/cve/CVE-2021-39147 https://access.redhat.com/security/cve/CVE-2021-39148 https://access.redhat.com/security/cve/CVE-2021-39149 https://access.redhat.com/security/cve/CVE-2021-39150 https://access.redhat.com/security/cve/CVE-2021-39151 https://access.redhat.com/security/cve/CVE-2021-39152 https://access.redhat.com/security/cve/CVE-2021-39153 https://access.redhat.com/security/cve/CVE-2021-39154 https://access.redhat.com/security/cve/CVE-2021-44228 https://access.redhat.com/security/updates/classification/#critical 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYfGCddzjgjWX9erEAQh0DQ//a2/cW2TUvO2IgyhaGm2FzUtSp/K3yQAT ltzGkVMSxhRIVsaiXYmwG06vDSTMRWisS10sPishpHnjLqgnNXJynFBaVm5210Au C0kRY8rbhWbro3fYDtN40PoLdjfRaeu85pq4pmKww53NEPISZOni+nmj2Zzk2iXn KOwOob9jTRIGJBs8ZUoHKBpFZR9BfrJ57OUDgOTdDt8EBi87JyRZNipU4U786mAq i0LtvsXkrIUfXe+eqGn2NnLBwf7V6NHmv6/E1BrG6nnyZQxup48wsORrEk4DLG8H I41QzVXumpS+h8wSVFPju0jMUShmj17RLibGvflDPxRoH/AQ7PHEmA3aTyIiws7/ JxV4j1Irr7x/q8PZOJ04bpAt5FLfMMaic9nHh1h3m98tlZOrAKJXWG+o+GEejEeo DJSHcE1udfWX03XWSGg+0660kfFLZZAlniIlENZHKTazl7DqFB109/60jewwghdV 0i2z1o4HDupsScmPp0eW7Qwi3cQssJ7VjuhRde3FqOkkQ2utDP++NjMZjfBRWiqS OJRycjjGfsNVjUcHXyRpx4lk8on/lnLhzO5MYualvpOhLLosEyjarNnkNCKITSwu Nr+EiWuvxddJUtVxkMn8SNKmAgiMn9VqizVxJU/YJg7GuYmXvuQujVz5ulH/f8jN ImmAojcnVn4= =eOUb -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.79

sources: NVD: CVE-2021-44228 // CERT/CC: VU#930724 // VULHUB: VHN-407408 // PACKETSTORM: 169172 // PACKETSTORM: 165295 // PACKETSTORM: 165288 // PACKETSTORM: 165285 // PACKETSTORM: 165298 // PACKETSTORM: 165326 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165632 // PACKETSTORM: 165260 // PACKETSTORM: 165733 // PACKETSTORM: 165520

AFFECTED PRODUCTS

vendor:ciscomodel:evolved programmable network managerscope:lteversion:4.1.1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.17900.52\)

Trust: 1.0

vendor:ciscomodel:virtualized infrastructure managerscope:ltversion:3.2.0

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(001.001\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:ltversion:2.3.2.1

Trust: 1.0

vendor:ciscomodel:customer experience cloud agentscope:ltversion:1.12.1

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa42-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:siemensmodel:sipass integratedscope:eqversion:2.80

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.3

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.1.5

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:ltversion:11.6

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.000\(001\)

Trust: 1.0

vendor:siemensmodel:desigo cc info centerscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.5.1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:unified workforce optimizationscope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:automated subsea tuningscope:eqversion:02.01.00

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.5\(2\)

Trust: 1.0

vendor:siemensmodel:desigo cc info centerscope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.1.3

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:9.1\(1\)

Trust: 1.0

vendor:ciscomodel:business process automationscope:ltversion:3.0.000.115

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:2.0.0

Trust: 1.0

vendor:siemensmodel:capitalscope:ltversion:2019.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:ciscomodel:emergency responderscope:eqversion:11.5\(4.65000.14\)

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(2.26\)

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.5

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa32-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(000.000\)

Trust: 1.0

vendor:ciscomodel:network assurance enginescope:eqversion:6.0\(2.1912\)

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.4\(1\)

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.4.0

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:ltversion:12.0\(1\)

Trust: 1.0

vendor:ciscomodel:video surveillance operations managerscope:ltversion:7.14.4

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.7.0

Trust: 1.0

vendor:siemensmodel:spectrum power 7scope:ltversion:2.30

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:7.0.0

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.0\(1\)

Trust: 1.0

vendor:siemensmodel:vesysscope:eqversion:2020.1

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.6\(2\)

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1h\)

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.2.2

Trust: 1.0

vendor:siemensmodel:vesysscope:eqversion:2019.1

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(000.002\)

Trust: 1.0

vendor:ciscomodel:fog directorscope:eqversion: -

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.0.1

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.4.2

Trust: 1.0

vendor:ciscomodel:prime service catalogscope:ltversion:12.1

Trust: 1.0

vendor:ciscomodel:dna centerscope:ltversion:2.1.2.8

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:21.3

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:12.5\(2\)

Trust: 1.0

vendor:ciscomodel:ucs centralscope:ltversion:2.0\(1p\)

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:gteversion:2.10.0

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.3

Trust: 1.0

vendor:siemensmodel:mindspherescope:ltversion:2021-12-16

Trust: 1.0

vendor:ciscomodel:crosswork data gatewayscope:eqversion:3.0.0

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:nexus dashboardscope:ltversion:2.1.2

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:crosswork network controllerscope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:cloudcenter suite adminscope:ltversion:5.3.1

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.3.0

Trust: 1.0

vendor:siemensmodel:sentron powermanagerscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.002\(000\)

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(4.018\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.7

Trust: 1.0

vendor:siemensmodel:e-car operation centerscope:ltversion:2021-12-13

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:11.6\(2\)

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1f\)

Trust: 1.0

vendor:ciscomodel:connected mobile experiencesscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.5.1.1

Trust: 1.0

vendor:siemensmodel:spectrum power 4scope:ltversion:4.70

Trust: 1.0

vendor:ciscomodel:unified communications manager im and presence servicescope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:network assurance enginescope:ltversion:6.0.2

Trust: 1.0

vendor:netappmodel:brocade san navigatorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:eqversion:002.003\(002.000\)

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:8.4\(1\)

Trust: 1.0

vendor:applemodel:xcodescope:ltversion:13.3

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.18119.2\)

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:11.6\(1\)

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1b\)

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:002.004\(000.914\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.6.1

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.2.1

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.3.4.1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.18900.97\)

Trust: 1.0

vendor:netappmodel:snapcenterscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:5.4

Trust: 1.0

vendor:ciscomodel:webex meetings serverscope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:dna centerscope:ltversion:2.2.2.8

Trust: 1.0

vendor:bentleymodel:synchroscope:ltversion:6.2.4.2

Trust: 1.0

vendor:ciscomodel:packaged contact center enterprisescope:ltversion:11.6

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.5.0

Trust: 1.0

vendor:ciscomodel:webex meetings serverscope:ltversion:3.0

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:8.5\(1\)

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa12-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:cyber vision sensor management extensionscope:ltversion:4.0.3

Trust: 1.0

vendor:netappmodel:cloud secure agentscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:crosswork platform infrastructurescope:eqversion:4.1.0

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:gteversion:20.4

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.6.0

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:002.007\(000.356\)

Trust: 1.0

vendor:ciscomodel:unified communications manager im \& presence servicescope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.5

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.2.3

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.1.4

Trust: 1.0

vendor:snowsoftwaremodel:vm access proxyscope:ltversion:3.6

Trust: 1.0

vendor:ciscomodel:intersight virtual appliancescope:eqversion:1.0.9-343

Trust: 1.0

vendor:ciscomodel:data center network managerscope:eqversion:11.3\(1\)

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa22-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:netappmodel:oncommand insightscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:2.4.0

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:gteversion:20.6

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.4.0

Trust: 1.0

vendor:siemensmodel:industrial edge managementscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:virtual topology systemscope:ltversion:2.6.7

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:9.0\(1\)

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:006.008\(001.000\)

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1c\)

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.6.3.1

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.4.0

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.002\(001\)

Trust: 1.0

vendor:netappmodel:ontap toolsscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:7.1.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.3.0

Trust: 1.0

vendor:ciscomodel:cloudcenterscope:ltversion:4.10.0.16

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:002.006\(000.156\)

Trust: 1.0

vendor:ciscomodel:virtualized voice browserscope:ltversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.2.3

Trust: 1.0

vendor:intelmodel:oneapi sample browserscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:sentron powermanagerscope:eqversion:4.2

Trust: 1.0

vendor:ciscomodel:cloudcenter cost optimizerscope:ltversion:5.5.2

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.5\(3\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.8

Trust: 1.0

vendor:siemensmodel:mendixscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1d\)

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1g\)

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:9.0\(2\)

Trust: 1.0

vendor:ciscomodel:crosswork zero touch provisioningscope:ltversion:2.0.1

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(001.000\)

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.4.2.1

Trust: 1.0

vendor:siemensmodel:opcenter intelligencescope:gteversion:3.2

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.010\(000.000\)

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.12.2

Trust: 1.0

vendor:ciscomodel:dna centerscope:gteversion:2.2.3.0

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.2.1

Trust: 1.0

vendor:ciscomodel:crosswork data gatewayscope:ltversion:2.0.2

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:11.6

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.0

Trust: 1.0

vendor:ciscomodel:unified communications manager im \& presence servicescope:eqversion:11.5\(1.22900.6\)

Trust: 1.0

vendor:ciscomodel:unified communications manager im and presence servicescope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.1.3

Trust: 1.0

vendor:siemensmodel:sppa-t3000 ses3000scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:cx cloud agentscope:eqversion:001.012

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:ltversion:2.10.0.1

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:4.2

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:eqversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:eqversion:2.3.2.0

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:ltversion:10.2.1v2

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.4.5.2

Trust: 1.0

vendor:ciscomodel:iot operations dashboardscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ucs directorscope:ltversion:6.8.2.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.3.1

Trust: 1.0

vendor:siemensmodel:capitalscope:eqversion:2019.1

Trust: 1.0

vendor:ciscomodel:crosswork platform infrastructurescope:ltversion:4.0.1

Trust: 1.0

vendor:ciscomodel:cyber visionscope:eqversion:4.0.2

Trust: 1.0

vendor:siemensmodel:siveillance vantagescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.000\(000\)

Trust: 1.0

vendor:ciscomodel:optical network controllerscope:ltversion:1.1.0

Trust: 1.0

vendor:netappmodel:solidfire \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:dna centerscope:gteversion:2.2.2.0

Trust: 1.0

vendor:sonicwallmodel:email securityscope:ltversion:10.0.13

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:4.1.1

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:eqversion:12.0\(1\)

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:8.7

Trust: 1.0

vendor:ciscomodel:crosswork optimization enginescope:eqversion:3.0.0

Trust: 1.0

vendor:bentleymodel:synchroscope:gteversion:6.1

Trust: 1.0

vendor:ciscomodel:dna centerscope:eqversion:2.2.2.8

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.1\(1\)

Trust: 1.0

vendor:siemensmodel:nxscope:eqversion:*

Trust: 1.0

vendor:intelmodel:datacenter managerscope:ltversion:5.1

Trust: 1.0

vendor:siemensmodel:navigatorscope:ltversion:2021-12-13

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(1.26\)

Trust: 1.0

vendor:ciscomodel:prime service catalogscope:eqversion:12.1

Trust: 1.0

vendor:siemensmodel:energyip prepayscope:ltversion:3.8.0.12

Trust: 1.0

vendor:ciscomodel:business process automationscope:gteversion:3.2.000.000

Trust: 1.0

vendor:siemensmodel:gma-managerscope:ltversion:8.6.2j-398

Trust: 1.0

vendor:ciscomodel:unified intelligence centerscope:ltversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:mobility services enginescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:broadworksscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.4

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:5.5

Trust: 1.0

vendor:ciscomodel:unified intelligence centerscope:eqversion:12.6\(2\)

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:8.5

Trust: 1.0

vendor:bentleymodel:synchro 4dscope:ltversion:6.4.3.2

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:data center network managerscope:ltversion:11.3\(1\)

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.7.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:7.0.0

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(001.002\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.6

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:4.0

Trust: 1.0

vendor:siemensmodel:spectrum power 4scope:eqversion:4.70

Trust: 1.0

vendor:ciscomodel:cloud connectscope:ltversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.4.1

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.2\(1\)

Trust: 1.0

vendor:siemensmodel:siguard dsascope:gteversion:4.2

Trust: 1.0

vendor:siemensmodel:vesysscope:eqversion:2021.1

Trust: 1.0

vendor:siemensmodel:siguard dsascope:ltversion:4.4.1

Trust: 1.0

vendor:ciscomodel:finessescope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:advanced malware protection virtual private cloud appliancescope:ltversion:3.5.4

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.0\(1\)

Trust: 1.0

vendor:netappmodel:solidfire enterprise sdsscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:energy engagescope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:eqversion:12.5\(1\)

Trust: 1.0

vendor:siemensmodel:siveillance identityscope:eqversion:1.5

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:ltversion:11.6\(2\)

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1e\)

Trust: 1.0

vendor:intelmodel:computer vision annotation toolscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:snowsoftwaremodel:snow commanderscope:ltversion:8.10.0

Trust: 1.0

vendor:netappmodel:cloud insightsscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:crosswork optimization enginescope:ltversion:2.0.1

Trust: 1.0

vendor:apachemodel:log4jscope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:emergency responderscope:eqversion:11.5\(4.66000.14\)

Trust: 1.0

vendor:intelmodel:genomics kernel libraryscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.5

Trust: 1.0

vendor:ciscomodel:cyber vision sensor management extensionscope:eqversion:4.0.2

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.21900.40\)

Trust: 1.0

vendor:ciscomodel:network insights for data centerscope:eqversion:6.0\(2.1914\)

Trust: 1.0

vendor:ciscomodel:automated subsea tuningscope:ltversion:2.1.0

Trust: 1.0

vendor:ciscomodel:finessescope:eqversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:003.001\(000.518\)

Trust: 1.0

vendor:siemensmodel:xpedition package integratorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:optical network controllerscope:eqversion:1.1

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:8.6

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.22900.28\)

Trust: 1.0

vendor:intelmodel:secure device onboardscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:unified workforce optimizationscope:eqversion:11.5\(1\)

Trust: 1.0

vendor:siemensmodel:siveillance viewpointscope:eqversion:*

Trust: 1.0

vendor:siemensmodel:industrial edge management hubscope:ltversion:2021-12-13

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.5\(1\)

Trust: 1.0

vendor:siemensmodel:solid edge harness designscope:eqversion:2020

Trust: 1.0

vendor:ciscomodel:contact center domain managerscope:ltversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:dna spacesscope:eqversion: -

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.13.0

Trust: 1.0

vendor:ciscomodel:intersight virtual appliancescope:ltversion:1.0.9-361

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.6.0

Trust: 1.0

vendor:ciscomodel:virtualized infrastructure managerscope:gteversion:3.4.0

Trust: 1.0

vendor:ciscomodel:virtual topology systemscope:eqversion:2.6.6

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.0\(1\)

Trust: 1.0

vendor:siemensmodel:spectrum power 7scope:eqversion:2.30

Trust: 1.0

vendor:ciscomodel:crosswork zero touch provisioningscope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:contact center management portalscope:ltversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.5.4.1

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa52-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:ltversion:2.9.1.3

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:14.0\(1\)

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:5.6

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.3\(1\)

Trust: 1.0

vendor:ciscomodel:smart physcope:ltversion:3.2.1

Trust: 1.0

vendor:ciscomodel:broadworksscope:ltversion:2021.11_1.162

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:003.000\(000.458\)

Trust: 1.0

vendor:siemensmodel:siveillance commandscope:lteversion:4.16.2.1

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:7.1.0

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:003.002\(000.116\)

Trust: 1.0

vendor:ciscomodel:unified contact center management portalscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:siemensmodel:operation schedulerscope:lteversion:1.1.3

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:vesysscope:ltversion:2019.1

Trust: 1.0

vendor:ciscomodel:emergency responderscope:ltversion:11.5\(4\)

Trust: 1.0

vendor:siemensmodel:logo\! soft comfortscope:eqversion:*

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:ciscomodel:emergency responderscope:eqversion:11.5

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:4.1.0

Trust: 1.0

vendor:ciscomodel:packaged contact center enterprisescope:eqversion:11.6\(1\)

Trust: 1.0

vendor:ciscomodel:dna spaces\: connectorscope:ltversion:2.5

Trust: 1.0

vendor:siemensmodel:solid edge cam proscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:business process automationscope:ltversion:3.1.000.044

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.1.2

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:9.0

Trust: 1.0

vendor:ciscomodel:virtualized infrastructure managerscope:ltversion:3.4.4

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:eqversion:12.6\(2\)

Trust: 1.0

vendor:netappmodel:cloud managerscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:head-end system universal device integration systemscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.5.0

Trust: 1.0

vendor:ciscomodel:crosswork network controllerscope:ltversion:2.0.1

Trust: 1.0

vendor:ciscomodel:unity connectionscope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:8.3\(1\)

Trust: 1.0

vendor:ciscomodel:nexus insightsscope:ltversion:6.0.2

Trust: 1.0

vendor:ciscomodel:webex meetings serverscope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:business process automationscope:ltversion:3.2.000.009

Trust: 1.0

vendor:ciscomodel:unity connectionscope:eqversion:11.5\(1.10000.6\)

Trust: 1.0

vendor:intelmodel:system studioscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:4.0

Trust: 1.0

vendor:siemensmodel:siveillance control proscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:gteversion:20.5

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1\)su3

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.4

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.5.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.15.0

Trust: 1.0

vendor:ciscomodel:unified intelligence centerscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:unity connectionscope:eqversion:11.5

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.3.0

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:4.10.0.15

Trust: 1.0

vendor:siemensmodel:siveillance identityscope:eqversion:1.6

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1a\)

Trust: 1.0

vendor:siemensmodel:opcenter intelligencescope:ltversion:3.5

Trust: 1.0

vendor:ciscomodel:cloudcenter workload managerscope:ltversion:5.5.2

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.2.3

Trust: 1.0

vendor:ciscomodel:business process automationscope:gteversion:3.1.000.000

Trust: 1.0

vendor:ciscomodel:identity services enginescope:ltversion:2.4.0

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.6

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.6.2.1

Trust: 1.0

vendor:siemensmodel:solid edge harness designscope:ltversion:2020

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1k\)

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:ltversion:7.3.0.2

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.3.5.1

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(3.025\)

Trust: 1.0

vendor:siemensmodel:teamcenterscope:eqversion:*

Trust: 1.0

vendor:siemensmodel:xpedition enterprisescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:dna centerscope:ltversion:2.2.3.4

Trust: 1.0

vendor:ciscomodel:workload optimization managerscope:ltversion:3.2.1

Trust: 1.0

vendor:siemensmodel:sipass integratedscope:eqversion:2.85

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1l\)

Trust: 1.0

vendor:ciscomodel:dna spaces connectorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:finessescope:ltversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(000.001\)

Trust: 1.0

vendor:percussionmodel:rhythmyxscope:lteversion:7.3.2

Trust: 1.0

vendor:ciscomodel:paging serverscope:ltversion:14.4.1

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:ltversion:12.5\(1\)

Trust: 1.0

sources: NVD: CVE-2021-44228

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-44228
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2021-44228
value: CRITICAL

Trust: 1.0

CNNVD: CNNVD-202112-799
value: CRITICAL

Trust: 0.6

VULHUB: VHN-407408
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-44228
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-407408
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-44228
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 6.0
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-407408 // CNNVD: CNNVD-202112-799 // NVD: CVE-2021-44228 // NVD: CVE-2021-44228

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-400

Trust: 1.1

problemtype:CWE-502

Trust: 1.1

problemtype:CWE-917

Trust: 1.1

sources: VULHUB: VHN-407408 // NVD: CVE-2021-44228

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 165260 // CNNVD: CNNVD-202112-799

TYPE

code execution

Trust: 1.1

sources: PACKETSTORM: 165295 // PACKETSTORM: 165288 // PACKETSTORM: 165285 // PACKETSTORM: 165298 // PACKETSTORM: 165326 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165632 // PACKETSTORM: 165260 // PACKETSTORM: 165733 // PACKETSTORM: 165520

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-407408

PATCH

title:Apache Log4j Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=174249

Trust: 0.6

sources: CNNVD: CNNVD-202112-799

EXTERNAL IDS

db:NVDid:CVE-2021-44228

Trust: 3.7

db:CERT/CCid:VU#930724

Trust: 2.5

db:PACKETSTORMid:165260

Trust: 1.8

db:PACKETSTORMid:165311

Trust: 1.7

db:PACKETSTORMid:165225

Trust: 1.7

db:PACKETSTORMid:165532

Trust: 1.7

db:PACKETSTORMid:165281

Trust: 1.7

db:PACKETSTORMid:165306

Trust: 1.7

db:PACKETSTORMid:165673

Trust: 1.7

db:PACKETSTORMid:165282

Trust: 1.7

db:PACKETSTORMid:165371

Trust: 1.7

db:PACKETSTORMid:167794

Trust: 1.7

db:PACKETSTORMid:167917

Trust: 1.7

db:PACKETSTORMid:165270

Trust: 1.7

db:PACKETSTORMid:165261

Trust: 1.7

db:PACKETSTORMid:165642

Trust: 1.7

db:PACKETSTORMid:165307

Trust: 1.7

db:SIEMENSid:SSA-479842

Trust: 1.7

db:SIEMENSid:SSA-714170

Trust: 1.7

db:SIEMENSid:SSA-661247

Trust: 1.7

db:SIEMENSid:SSA-397453

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/13/1

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/14/4

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/10/3

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/13/2

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/10/2

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/15/3

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/10/1

Trust: 1.7

db:PACKETSTORMid:171626

Trust: 1.6

db:PACKETSTORMid:165733

Trust: 0.8

db:PACKETSTORMid:165324

Trust: 0.7

db:PACKETSTORMid:166313

Trust: 0.7

db:PACKETSTORMid:165279

Trust: 0.7

db:PACKETSTORMid:165348

Trust: 0.7

db:EXPLOIT-DBid:50592

Trust: 0.7

db:CS-HELPid:SB2022060708

Trust: 0.6

db:CS-HELPid:SB2022012045

Trust: 0.6

db:CS-HELPid:SB2022010629

Trust: 0.6

db:CS-HELPid:SB2022072076

Trust: 0.6

db:CS-HELPid:SB2022021428

Trust: 0.6

db:CS-HELPid:SB2022071316

Trust: 0.6

db:CS-HELPid:SB2022062001

Trust: 0.6

db:CS-HELPid:SB2021122212

Trust: 0.6

db:CS-HELPid:SB2022010908

Trust: 0.6

db:CS-HELPid:SB2021122403

Trust: 0.6

db:CS-HELPid:SB2021121720

Trust: 0.6

db:CS-HELPid:SB2021123016

Trust: 0.6

db:CS-HELPid:SB2022010421

Trust: 0.6

db:CS-HELPid:SB2022031501

Trust: 0.6

db:CS-HELPid:SB2021122907

Trust: 0.6

db:CS-HELPid:SB2022012732

Trust: 0.6

db:CS-HELPid:SB2021121652

Trust: 0.6

db:CS-HELPid:SB2021121492

Trust: 0.6

db:CS-HELPid:SB2022010522

Trust: 0.6

db:CS-HELPid:SB2021121201

Trust: 0.6

db:CS-HELPid:SB2021121535

Trust: 0.6

db:CS-HELPid:SB2021122721

Trust: 0.6

db:CS-HELPid:SB2021122018

Trust: 0.6

db:CS-HELPid:SB2022032006

Trust: 0.6

db:CS-HELPid:SB2022060808

Trust: 0.6

db:CS-HELPid:SB2022011732

Trust: 0.6

db:CS-HELPid:SB2021122401

Trust: 0.6

db:CS-HELPid:SB2021121350

Trust: 0.6

db:CS-HELPid:SB2022030923

Trust: 0.6

db:CS-HELPid:SB2021122811

Trust: 0.6

db:CS-HELPid:SB2022020607

Trust: 0.6

db:CS-HELPid:SB2022012439

Trust: 0.6

db:CS-HELPid:SB2022011042

Trust: 0.6

db:CS-HELPid:SB2022021807

Trust: 0.6

db:CS-HELPid:SB2022010322

Trust: 0.6

db:CS-HELPid:SB2021122122

Trust: 0.6

db:AUSCERTid:ESB-2022.0090

Trust: 0.6

db:AUSCERTid:ESB-2022.0492

Trust: 0.6

db:AUSCERTid:ESB-2021.4211

Trust: 0.6

db:AUSCERTid:ESB-2021.4187.6

Trust: 0.6

db:AUSCERTid:ESB-2022.0237

Trust: 0.6

db:AUSCERTid:ESB-2021.4236

Trust: 0.6

db:AUSCERTid:ESB-2022.0332

Trust: 0.6

db:AUSCERTid:ESB-2022.0080

Trust: 0.6

db:AUSCERTid:ESB-2021.4186.4

Trust: 0.6

db:AUSCERTid:ESB-2021.4269

Trust: 0.6

db:AUSCERTid:ESB-2021.4198

Trust: 0.6

db:AUSCERTid:ESB-2021.4316

Trust: 0.6

db:AUSCERTid:ESB-2021.4274

Trust: 0.6

db:AUSCERTid:ESB-2022.0247

Trust: 0.6

db:AUSCERTid:ESB-2022.1188

Trust: 0.6

db:AUSCERTid:ESB-2021.4302.3

Trust: 0.6

db:AUSCERTid:ESB-2021.4256.2

Trust: 0.6

db:CXSECURITYid:WLB-2022120027

Trust: 0.6

db:CXSECURITYid:WLB-2021120069

Trust: 0.6

db:CXSECURITYid:WLB-2022080025

Trust: 0.6

db:CXSECURITYid:WLB-2022010065

Trust: 0.6

db:LENOVOid:LEN-76573

Trust: 0.6

db:ICS CERTid:ICSA-21-357-02

Trust: 0.6

db:ICS CERTid:ICSA-22-034-01

Trust: 0.6

db:EXPLOIT-DBid:51183

Trust: 0.6

db:CNNVDid:CNNVD-202112-799

Trust: 0.6

db:PACKETSTORMid:165329

Trust: 0.2

db:PACKETSTORMid:165333

Trust: 0.2

db:PACKETSTORMid:165520

Trust: 0.2

db:PACKETSTORMid:165295

Trust: 0.2

db:PACKETSTORMid:165285

Trust: 0.2

db:PACKETSTORMid:165298

Trust: 0.2

db:PACKETSTORMid:165326

Trust: 0.2

db:PACKETSTORMid:165632

Trust: 0.2

db:PACKETSTORMid:165293

Trust: 0.1

db:PACKETSTORMid:165343

Trust: 0.1

db:PACKETSTORMid:165290

Trust: 0.1

db:PACKETSTORMid:165291

Trust: 0.1

db:PACKETSTORMid:165297

Trust: 0.1

db:PACKETSTORMid:165289

Trust: 0.1

db:PACKETSTORMid:165264

Trust: 0.1

db:EXPLOIT-DBid:50590

Trust: 0.1

db:VULHUBid:VHN-407408

Trust: 0.1

db:PACKETSTORMid:169172

Trust: 0.1

db:PACKETSTORMid:165288

Trust: 0.1

sources: CERT/CC: VU#930724 // VULHUB: VHN-407408 // PACKETSTORM: 169172 // PACKETSTORM: 165295 // PACKETSTORM: 165288 // PACKETSTORM: 165285 // PACKETSTORM: 165298 // PACKETSTORM: 165326 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165632 // PACKETSTORM: 165260 // PACKETSTORM: 165733 // PACKETSTORM: 165520 // CNNVD: CNNVD-202112-799 // NVD: CVE-2021-44228

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-apache-log4j-qruknebd

Trust: 2.3

url:http://packetstormsecurity.com/files/167917/mobileiron-log4shell-remote-command-execution.html

Trust: 2.3

url:http://packetstormsecurity.com/files/165225/apache-log4j2-2.14.1-remote-code-execution.html

Trust: 2.3

url:http://packetstormsecurity.com/files/165311/log4j-scan-extensive-scanner.html

Trust: 2.3

url:http://packetstormsecurity.com/files/165371/vmware-security-advisory-2021-0028.4.html

Trust: 2.3

url:http://packetstormsecurity.com/files/165532/log4shell-http-header-injection.html

Trust: 2.3

url:http://packetstormsecurity.com/files/165642/vmware-vcenter-server-unauthenticated-log4shell-jndi-injection-remote-code-execution.html

Trust: 2.3

url:http://packetstormsecurity.com/files/165673/unifi-network-application-unauthenticated-log4shell-remote-code-execution.html

Trust: 2.3

url:https://www.kb.cert.org/vuls/id/930724

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf

Trust: 1.7

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2021-0032

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20211210-0007/

Trust: 1.7

url:https://support.apple.com/kb/ht213189

Trust: 1.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/alert-cve-2021-44228.html

Trust: 1.7

url:https://www.debian.org/security/2021/dsa-5020

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/mar/23

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/jul/11

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/dec/2

Trust: 1.7

url:http://packetstormsecurity.com/files/167794/open-xchange-app-suite-7.10.x-cross-site-scripting-command-injection.html

Trust: 1.7

url:https://github.com/nu11secur1ty/cve-mitre/tree/main/cve-2021-44228

Trust: 1.7

url:https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html

Trust: 1.7

url:http://packetstormsecurity.com/files/165260/vmware-security-advisory-2021-0028.html

Trust: 1.7

url:http://packetstormsecurity.com/files/165261/apache-log4j2-2.14.1-information-disclosure.html

Trust: 1.7

url:http://packetstormsecurity.com/files/165270/apache-log4j2-2.14.1-remote-code-execution.html

Trust: 1.7

url:http://packetstormsecurity.com/files/165281/log4j2-log4shell-regexes.html

Trust: 1.7

url:http://packetstormsecurity.com/files/165282/log4j-payload-generator.html

Trust: 1.7

url:http://packetstormsecurity.com/files/165306/l4sh-log4j-remote-code-execution.html

Trust: 1.7

url:http://packetstormsecurity.com/files/165307/log4j-remote-code-execution-word-bypassing.html

Trust: 1.7

url:https://github.com/cisagov/log4j-affected-db/blob/develop/software-list.md

Trust: 1.7

url:https://logging.apache.org/log4j/2.x/security.html

Trust: 1.7

url:https://twitter.com/kurtseifried/status/1469345530182455296

Trust: 1.7

url:https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/10/1

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/10/2

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/10/3

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/13/1

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/13/2

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/14/4

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/15/3

Trust: 1.7

url:https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-44228

Trust: 1.7

url:https://access.redhat.com/security/cve/cve-2021-44228

Trust: 1.6

url:http://packetstormsecurity.com/files/171626/ad-manager-plus-7122-remote-code-execution.html

Trust: 1.6

url:https://github.com/cisagov/log4j-affected-db

Trust: 1.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.0

url:https://bugzilla.redhat.com/):

Trust: 1.0

url:https://access.redhat.com/security/team/contact/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/m5csvunv4hwzzxgoknsk6l7rpm7bokib/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/vu57ujdcfiasio35gc55jmksrxjmcdfm/

Trust: 1.0

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2021-44228

Trust: 1.0

url:cve-2021-4104

Trust: 0.8

url:cve-2021-44228

Trust: 0.8

url:cve-2021-45046

Trust: 0.8

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-009

Trust: 0.8

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/m5csvunv4hwzzxgoknsk6l7rpm7bokib/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/vu57ujdcfiasio35gc55jmksrxjmcdfm/

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2022010908

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060808

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010629

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072076

Trust: 0.6

url:https://packetstormsecurity.com/files/165733/red-hat-security-advisory-2022-0296-03.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6527216

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4186.4

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4316

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0080

Trust: 0.6

url:https://msrc.microsoft.com/update-guide/vulnerability/cve-2021-44228

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6528268

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122212

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012732

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121201

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4302.3

Trust: 0.6

url:https://www.exploit-db.com/exploits/50592

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022080025

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011042

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121720

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122018

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0237

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122811

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022010065

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122401

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011732

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022021807

Trust: 0.6

url:https://packetstormsecurity.com/files/165324/ubuntu-security-notice-usn-5197-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021123016

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121350

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4211

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122122

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062001

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122403

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122721

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010522

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010322

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022120027

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6525816

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20211215-01-log4j-cn

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-357-02

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122907

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060708

Trust: 0.6

url:https://www.exploit-db.com/exploits/51183

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022021428

Trust: 0.6

url:https://packetstormsecurity.com/files/166313/apple-security-advisory-2022-03-14-7.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6526220

Trust: 0.6

url:https://vigilance.fr/vulnerability/apache-log4j-code-execution-via-jndi-remote-class-injection-37049

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4269

Trust: 0.6

url:https://support.apple.com/en-us/ht213189

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012439

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022020607

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4256.2

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071316

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032006

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0332

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022030923

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1188

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0492

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6526754

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2021120069

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0090

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4236

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121652

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6527330

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4198

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121492

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4187.6

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031501

Trust: 0.6

url:https://packetstormsecurity.com/files/165279/ubuntu-security-notice-usn-5192-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/165348/ubuntu-security-notice-usn-5192-2.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4274

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-76573

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012045

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121535

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010421

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0247

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-034-01

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2021-45046

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-45046

Trust: 0.4

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4104

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4104

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9488

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/apache-log4j2

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.amq.streams&version=1.8.4

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5138

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25012

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35522

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35524

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25009

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27645

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33574

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43527

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25014

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25012

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35942

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35524

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3572

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35522

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-17541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36331

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3712

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35523

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36330

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20266

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36332

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-17541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25014

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37137

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20317

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21409

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43267

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3481

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25009

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25010

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35523

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36331

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3426

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36330

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35521

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_integration/2021.q4

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5130

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=red.hat.integration&version

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5140

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=appplatform&version=7.4

Trust: 0.1

url:https://access.redhat.com/solutions/6577421

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5141

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5148

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5106

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44832

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.09.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.10.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45105

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45105

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0203

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.08.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44832

Trust: 0.1

url:https://www.vmware.com/security/advisories/vmsa-2021-0028.html

Trust: 0.1

url:http://lists.vmware.com/mailman/listinfo/security-announce

Trust: 0.1

url:https://lists.vmware.com/mailman/listinfo/security-announce.

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39139

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39141

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29505

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39145

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0296

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39144

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39149

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39150

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39151

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39140

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29505

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39151

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39152

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39150

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39139

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39153

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39144

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39148

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28491

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39146

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39140

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39149

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28491

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-39141

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0082

Trust: 0.1

sources: CERT/CC: VU#930724 // VULHUB: VHN-407408 // PACKETSTORM: 169172 // PACKETSTORM: 165295 // PACKETSTORM: 165288 // PACKETSTORM: 165285 // PACKETSTORM: 165298 // PACKETSTORM: 165326 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165632 // PACKETSTORM: 165260 // PACKETSTORM: 165733 // PACKETSTORM: 165520 // CNNVD: CNNVD-202112-799 // NVD: CVE-2021-44228

CREDITS

Red Hat

Trust: 1.0

sources: PACKETSTORM: 165295 // PACKETSTORM: 165288 // PACKETSTORM: 165285 // PACKETSTORM: 165298 // PACKETSTORM: 165326 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165632 // PACKETSTORM: 165733 // PACKETSTORM: 165520

SOURCES

db:CERT/CCid:VU#930724
db:VULHUBid:VHN-407408
db:PACKETSTORMid:169172
db:PACKETSTORMid:165295
db:PACKETSTORMid:165288
db:PACKETSTORMid:165285
db:PACKETSTORMid:165298
db:PACKETSTORMid:165326
db:PACKETSTORMid:165329
db:PACKETSTORMid:165333
db:PACKETSTORMid:165632
db:PACKETSTORMid:165260
db:PACKETSTORMid:165733
db:PACKETSTORMid:165520
db:CNNVDid:CNNVD-202112-799
db:NVDid:CVE-2021-44228

LAST UPDATE DATE

2026-03-24T21:08:25.612000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#930724date:2022-02-07T00:00:00
db:VULHUBid:VHN-407408date:2023-02-06T00:00:00
db:CNNVDid:CNNVD-202112-799date:2023-04-04T00:00:00
db:NVDid:CVE-2021-44228date:2026-02-20T16:15:59.363

SOURCES RELEASE DATE

db:CERT/CCid:VU#930724date:2021-12-15T00:00:00
db:VULHUBid:VHN-407408date:2021-12-10T00:00:00
db:PACKETSTORMid:169172date:2021-12-28T20:12:00
db:PACKETSTORMid:165295date:2021-12-15T15:26:54
db:PACKETSTORMid:165288date:2021-12-15T15:22:36
db:PACKETSTORMid:165285date:2021-12-15T15:20:26
db:PACKETSTORMid:165298date:2021-12-15T15:28:00
db:PACKETSTORMid:165326date:2021-12-16T15:22:54
db:PACKETSTORMid:165329date:2021-12-16T15:25:46
db:PACKETSTORMid:165333date:2021-12-16T15:34:27
db:PACKETSTORMid:165632date:2022-01-20T17:49:05
db:PACKETSTORMid:165260date:2021-12-14T15:27:58
db:PACKETSTORMid:165733date:2022-01-27T14:23:56
db:PACKETSTORMid:165520date:2022-01-12T15:37:25
db:CNNVDid:CNNVD-202112-799date:2021-12-10T00:00:00
db:NVDid:CVE-2021-44228date:2021-12-10T10:15:09.143