ID

VAR-202112-0566


CVE

CVE-2021-44228


TITLE

Debian Security Advisory 5020-1

Trust: 0.1

sources: PACKETSTORM: 169172

DESCRIPTION

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. This update also fixes CVE-2020-9488 in the oldstable distribution (buster). Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. For the oldstable distribution (buster), this problem has been fixed in version 2.15.0-1~deb10u1. For the stable distribution (bullseye), this problem has been fixed in version 2.15.0-1~deb11u1. We recommend that you upgrade your apache-log4j2 packages. For the detailed security status of apache-log4j2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apache-log4j2 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmG0+YVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQvXA/+LIMVC0X80Qc6No564VodtTN3Ci0NyaUcQyZG8Gyo2tPuwKEpOUpmom7f wcZvQgKvwxs3Ad1M5Zt/6Ql3v0KbwzBah0v8KUV86B6g4yb+Wno7iKQR1mN47bpz 2SJPzf6IECwtmz3zYI3fLuJJ/dvAMRlQ+nhPsC8/zJGJgfFHFmDyfG8TtlrYLUHS Pjpov4C/VllQGJ5MjyVF93OqTCy4V7WxH/RgT1YBOs71KNCq5yPoch35geytSQoM Kk59qFLQgST2kYhLVxRRbdQAAhbA7W5XythKqphon6nRmlJPHSGkXMf9s0N3cm6K Zkmvo2/A29FiceZj/bSM4/qw7gqbsJfpSMcTKmxhReolsXAJVj4mGu9cZZTAP7Tb g8fl8kGljFd01ka0208eFyILHCR2bAF2xgS1nG6TCc170azDkvW38fZHHkLQIPbF TOwxoNv8dHgyT6pfI+BDYKy9pNvrLk/jqXkOpry6nY+Ji/RcjGBDIR3VP25VsMk8 6zwERE1LX0IvwiaSFBg6oyWW4siINZzFyVXryLvRr/YBIAYKGv+Y1Wn8ageACItW 2SZjLbK4uBTOHyvPITBgOZSYD7kYcTPxdbb8ntw7Uo489hYXzjYlloTBoUPg1G3o gyZnRfW0yYf2bA63I7vVBDTITt8K4H1UkUDEOIUjXGekFLqDnGw= =BY2+ -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: Red Hat Data Grid 8.2.2 security update Advisory ID: RHSA-2021:5132-01 Product: Red Hat JBoss Data Grid Advisory URL: https://access.redhat.com/errata/RHSA-2021:5132 Issue date: 2021-12-14 CVE Names: CVE-2021-44228 ===================================================================== 1. Summary: An update for Red Hat Data Grid is now available. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale. Data Grid 8.2.2 replaces Data Grid 8.2.1 and includes bug fixes and enhancements. Find out more about Data Grid 8.2.2 in the Release Notes [3]. Security Fix(es): * log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value (CVE-2021-44228) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: To install this update, do the following: 1. Download the Data Grid 8.2.2 server patch from the customer portal[²]. 2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on. 3. Install the Data Grid 8.2.2 server patch. Refer to the 8.2.2 Release Notes[³] for patching instructions. 4. Restart Data Grid to ensure the changes take effect. 4. Bugs fixed (https://bugzilla.redhat.com/): 2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value 5. References: https://access.redhat.com/security/cve/CVE-2021-44228 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/jbossnetwork/restricted/softwareDetail.html?softwareId=70381&product=data.grid&version=8.2&downloadType=patches https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.2/html-single/red_hat_data_grid_8.2_release_notes/index https://access.redhat.com/security/vulnerabilities/RHSB-2021-009 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYblI0NzjgjWX9erEAQj7mw//TtZnFmrLI6Ts7uC19MnLA/vVPXT1i2Qz R1CZ4T7QCZkiJCNXvwYHj7iQgOm5o/seXRE38qGtJWqiyrZMGHVQnDl1Vuhm31jg 6lxhpjn0kKKZanznosCxF3U2ovLhrEx+5in4piNiyV6CKkkgBV7UvESGWlIKiumq 1r79DAQ7WdYPoOk+m+b5p/okFJXyD0FcEbrqZcgJQCmR9zyJ6DGAy4N9+cgEgGaC QoVZaXa+pUEVjiAOAg0XNcb+GyYSMFwkPUR14NI0V2OHIo97aBg9AG1HrOj3QmSG 5LR/8zWQbfSbtTIzR67gBGF8F8nvnEeBARYje97Cx2FcHGDFisLHM8OGqFNjU5+I HepIdPjwcoy3kPDSfQ9WXx7Iz03tMCbhMWUhH9MRYuUAzCHgsAryZ4AnTBa+Hn7B 7WHuVf24eFcoJysoWGsbQZDzN5oxqIRXP2mA5k7MVemHV5L+7KV15KyJWaDqTdI+ DTpw8kP/WboloegmZmaqbPLlfvl91G8LjU5yfLaa+rNHkbyT4G1c3iQm5yLWlsYW yfGf+XiZPoF5S6862qdx7YPZG0yTkaUYU0Spnr8eV9wt9uUIp57jczrBzgBKYlN0 BdNv9DgqbGvhmdz/k95gRZUpdYAvF6J4+Y4h9uXgxqfdGZjFCSlegOG8gleCnvEw dfFqyyf+3ZQ= =be8O -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. The References section of this erratum contains a download link (you must log in to download the update). JIRA issues fixed (https://issues.jboss.org/): LOG-1775 - [release-5.2] Syslog output is serializing json incorrectly LOG-1824 - [release-5.2] Rejected by Elasticsearch and unexpected json-parsing LOG-1963 - [release-5.2] CLO panic: runtime error: slice bounds out of range [:-1] LOG-1970 - Applying cluster state is causing elasticsearch to hit an issue and become unusable 6. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. ========================================================================= Ubuntu Security Notice USN-5192-2 December 17, 2021 apache-log4j2 vulnerability ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Apache Log4j 2 could be made to crash or run programs as an administrator if it received a specially crafted input. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details: Chen Zhaojun discovered that Apache Log4j 2 allows remote attackers to run programs via a special crafted input. An attacker could use this vulnerability to cause a denial of service or possibly execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: liblog4j2-java 2.4-2ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-03-14-7 Xcode 13.3 Xcode 13.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213189. iTMSTransporter Available for: macOS Monterey 12 and later Impact: Multiple issues in iTMSTransporter Description: Multiple issues were addressed with updating FasterXML jackson-databind and Apache Log4j2. CVE-2019-14379 CVE-2021-44228 otool Available for: macOS Monterey 12 and later Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2022-22601: hjy79425575 CVE-2022-22602: hjy79425575 CVE-2022-22603: hjy79425575 CVE-2022-22604: hjy79425575 CVE-2022-22605: hjy79425575 CVE-2022-22606: hjy79425575 CVE-2022-22607: hjy79425575 CVE-2022-22608: hjy79425575 Additional recognition iTMSTransporter We would like to acknowledge Anthony Shaw of Microsoft for their assistance. ld64 We would like to acknowledge Pan ZhenPeng (@Peterpan0927) of Alibaba Security Pandora Lab for their assistance. Xcode IDE We would like to acknowledge an anonymous researcher for their assistance. Xcode 13.3 may be obtained from: https://developer.apple.com/xcode/downloads/ To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "Xcode 13.3". All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. Solution: See the following documentation, which will be updated shortly for release 3.11.z, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html This update is available via the Red Hat Network. VMware Unified Access Gateway VMware Carbon Black Workload Appliance VMware Site Recovery Manager, vSphere Replication VMware Tanzu GemFire VMware Tanzu GemFire for VMs VMware Tanzu Operations Manager VMware Tanzu Application Service for VMs VMware Horizon Agents Installer You are receiving this alert because you are subscribed to the VMware Security Announcements mailing list. To modify your subscription or unsubscribe please visit https://lists.vmware.com/mailman/listinfo/security-announce

Trust: 2.25

sources: NVD: CVE-2021-44228 // VULHUB: VHN-407408 // VULMON: CVE-2021-44228 // PACKETSTORM: 169172 // PACKETSTORM: 165293 // PACKETSTORM: 165295 // PACKETSTORM: 165287 // PACKETSTORM: 165288 // PACKETSTORM: 165291 // PACKETSTORM: 165298 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165348 // PACKETSTORM: 166313 // PACKETSTORM: 165264 // PACKETSTORM: 165371

AFFECTED PRODUCTS

vendor:ciscomodel:smart physcope:eqversion:3.1.4

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:4.1.1

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:7.0.0

Trust: 1.0

vendor:siemensmodel:xpedition package integratorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.5.1.1

Trust: 1.0

vendor:ciscomodel:optical network controllerscope:eqversion:1.1

Trust: 1.0

vendor:siemensmodel:desigo cc info centerscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:lteversion:4.1.1

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:gteversion:20.5

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa52-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:ciscomodel:cloudcenter suite adminscope:ltversion:5.3.1

Trust: 1.0

vendor:ciscomodel:emergency responderscope:ltversion:11.5\(4\)

Trust: 1.0

vendor:ciscomodel:connected mobile experiencesscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:crosswork zero touch provisioningscope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1d\)

Trust: 1.0

vendor:siemensmodel:siveillance vantagescope:eqversion:*

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.010\(000.000\)

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1e\)

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.3.5.1

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.3

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:9.0

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.8

Trust: 1.0

vendor:ciscomodel:unity connectionscope:eqversion:11.5\(1.10000.6\)

Trust: 1.0

vendor:siemensmodel:teamcenterscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:dna centerscope:ltversion:2.2.3.4

Trust: 1.0

vendor:siemensmodel:opcenter intelligencescope:gteversion:3.2

Trust: 1.0

vendor:sonicwallmodel:email securityscope:ltversion:10.0.13

Trust: 1.0

vendor:ciscomodel:dna centerscope:ltversion:2.1.2.8

Trust: 1.0

vendor:ciscomodel:finessescope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:006.005.000.

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:003.002\(000.116\)

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.0\(1\)

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:12.5\(2\)

Trust: 1.0

vendor:netappmodel:cloud insightsscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(000.001\)

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.15.0

Trust: 1.0

vendor:ciscomodel:cyber visionscope:eqversion:4.0.2

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:7.1.0

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.4.0

Trust: 1.0

vendor:siemensmodel:industrial edge management hubscope:ltversion:2021-12-13

Trust: 1.0

vendor:percussionmodel:rhythmyxscope:lteversion:7.3.2

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa12-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:siemensmodel:siveillance identityscope:eqversion:1.6

Trust: 1.0

vendor:ciscomodel:fog directorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:unified communications manager im and presence servicescope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:broadworksscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1k\)

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.7.0

Trust: 1.0

vendor:ciscomodel:emergency responderscope:eqversion:11.5\(4.66000.14\)

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:dna centerscope:gteversion:2.2.2.0

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.1.3

Trust: 1.0

vendor:ciscomodel:contact center domain managerscope:ltversion:12.5\(1\)

Trust: 1.0

vendor:bentleymodel:synchroscope:ltversion:6.2.4.2

Trust: 1.0

vendor:ciscomodel:automated subsea tuningscope:ltversion:2.1.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.12.2

Trust: 1.0

vendor:siemensmodel:spectrum power 4scope:eqversion:4.70

Trust: 1.0

vendor:ciscomodel:cloudcenter workload managerscope:ltversion:5.5.2

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:ltversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:unified communications manager im and presence servicescope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.18119.2\)

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.1.3

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.6

Trust: 1.0

vendor:siemensmodel:vesysscope:eqversion:2021.1

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:ltversion:2.3.2.1

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:8.6

Trust: 1.0

vendor:netappmodel:snapcenterscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:cyber vision sensor management extensionscope:eqversion:4.0.2

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:gteversion:2.10.0

Trust: 1.0

vendor:siemensmodel:siguard dsascope:ltversion:4.4.1

Trust: 1.0

vendor:ciscomodel:virtualized infrastructure managerscope:ltversion:3.4.4

Trust: 1.0

vendor:siemensmodel:siveillance control proscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:virtual topology systemscope:eqversion:2.6.6

Trust: 1.0

vendor:ciscomodel:packaged contact center enterprisescope:eqversion:11.6\(1\)

Trust: 1.0

vendor:ciscomodel:network assurance enginescope:eqversion:6.0\(2.1912\)

Trust: 1.0

vendor:siemensmodel:mindspherescope:ltversion:2021-12-16

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:8.3\(1\)

Trust: 1.0

vendor:ciscomodel:webex meetings serverscope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:dna centerscope:gteversion:2.2.3.0

Trust: 1.0

vendor:ciscomodel:unified intelligence centerscope:ltversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:eqversion:12.6\(2\)

Trust: 1.0

vendor:siemensmodel:vesysscope:eqversion:2019.1

Trust: 1.0

vendor:ciscomodel:business process automationscope:gteversion:3.1.000.000

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:ltversion:2.10.0.1

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:8.7

Trust: 1.0

vendor:ciscomodel:ucs directorscope:ltversion:6.8.2.0

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.4\(1\)

Trust: 1.0

vendor:siemensmodel:sentron powermanagerscope:eqversion:4.2

Trust: 1.0

vendor:ciscomodel:optical network controllerscope:ltversion:1.1.0

Trust: 1.0

vendor:ciscomodel:business process automationscope:ltversion:3.2.000.009

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:5.6

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:002.004\(000.914\)

Trust: 1.0

vendor:ciscomodel:unified contact center management portalscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:netappmodel:cloud managerscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:siveillance commandscope:lteversion:4.16.2.1

Trust: 1.0

vendor:ciscomodel:cx cloud agentscope:eqversion:001.012

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:emergency responderscope:eqversion:11.5\(4.65000.14\)

Trust: 1.0

vendor:siemensmodel:solid edge cam proscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:2.4.0

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.2.2

Trust: 1.0

vendor:netappmodel:solidfire \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.3.0

Trust: 1.0

vendor:siemensmodel:energyipscope:eqversion:8.5

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.5

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:006.005.000.000

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa22-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:ciscomodel:crosswork optimization enginescope:ltversion:2.0.1

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.4.0

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.1\(1\)

Trust: 1.0

vendor:ciscomodel:workload optimization managerscope:ltversion:3.2.1

Trust: 1.0

vendor:siemensmodel:vesysscope:eqversion:2020.1

Trust: 1.0

vendor:ciscomodel:network assurance enginescope:ltversion:6.0.2

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1b\)

Trust: 1.0

vendor:ciscomodel:customer experience cloud agentscope:ltversion:1.12.1

Trust: 1.0

vendor:ciscomodel:dna centerscope:eqversion:2.2.2.8

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:ltversion:12.0\(1\)

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:11.6

Trust: 1.0

vendor:intelmodel:oneapi sample browserscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex meetings serverscope:eqversion:4.0

Trust: 1.0

vendor:bentleymodel:synchro 4dscope:ltversion:6.4.3.2

Trust: 1.0

vendor:siemensmodel:energyip prepayscope:ltversion:3.8.0.12

Trust: 1.0

vendor:siemensmodel:sipass integratedscope:eqversion:2.80

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:008.000.000

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:9.0\(1\)

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:11.6\(1\)

Trust: 1.0

vendor:siemensmodel:e-car operation centerscope:ltversion:2021-12-13

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1g\)

Trust: 1.0

vendor:ciscomodel:crosswork platform infrastructurescope:ltversion:4.0.1

Trust: 1.0

vendor:ciscomodel:paging serverscope:ltversion:14.4.1

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.4.2.1

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.3.4.1

Trust: 1.0

vendor:intelmodel:computer vision annotation toolscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:dna centerscope:ltversion:2.2.2.8

Trust: 1.0

vendor:ciscomodel:webex meetings serverscope:ltversion:3.0

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:002.006\(000.156\)

Trust: 1.0

vendor:siemensmodel:industrial edge managementscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:unified computing systemscope:eqversion:006.008\(001.000\)

Trust: 1.0

vendor:siemensmodel:solid edge harness designscope:eqversion:2020

Trust: 1.0

vendor:ciscomodel:unified workforce optimizationscope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:business process automationscope:ltversion:3.0.000.115

Trust: 1.0

vendor:netappmodel:brocade san navigatorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:5.5

Trust: 1.0

vendor:siemensmodel:spectrum power 7scope:ltversion:2.30

Trust: 1.0

vendor:ciscomodel:contact center management portalscope:ltversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(1.26\)

Trust: 1.0

vendor:siemensmodel:capitalscope:eqversion:2019.1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.18900.97\)

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:eqversion:12.5\(1\)

Trust: 1.0

vendor:siemensmodel:siveillance identityscope:eqversion:1.5

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:crosswork optimization enginescope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:dna spaces connectorscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:logo\! soft comfortscope:eqversion:*

Trust: 1.0

vendor:siemensmodel:desigo cc info centerscope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:virtualized voice browserscope:ltversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.6.2.1

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:nexus dashboardscope:ltversion:2.1.2

Trust: 1.0

vendor:siemensmodel:spectrum power 4scope:ltversion:4.70

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.3\(0\)

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.002\(000\)

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1f\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:gteversion:20.4

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1\)su3

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.2.1

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:7.3

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(001.002\)

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.6.0

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(001.001\)

Trust: 1.0

vendor:ciscomodel:finessescope:ltversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.5

Trust: 1.0

vendor:siemensmodel:siveillance viewpointscope:eqversion:*

Trust: 1.0

vendor:snowsoftwaremodel:vm access proxyscope:ltversion:3.6

Trust: 1.0

vendor:ciscomodel:business process automationscope:ltversion:3.1.000.044

Trust: 1.0

vendor:siemensmodel:xpedition enterprisescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:crosswork network controllerscope:ltversion:2.0.1

Trust: 1.0

vendor:intelmodel:genomics kernel libraryscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.2.3

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:ltversion:11.6\(2\)

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:gteversion:5.4

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.5.0

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1h\)

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.6

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:8.5\(1\)

Trust: 1.0

vendor:intelmodel:secure device onboardscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.2\(1\)

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.7

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.5.4.1

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.4

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.1.5

Trust: 1.0

vendor:siemensmodel:sppa-t3000 ses3000scope:eqversion:*

Trust: 1.0

vendor:intelmodel:datacenter managerscope:ltversion:5.1

Trust: 1.0

vendor:ciscomodel:dna spaces\: connectorscope:ltversion:2.5

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1a\)

Trust: 1.0

vendor:snowsoftwaremodel:snow commanderscope:ltversion:8.10.0

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:007.003.000

Trust: 1.0

vendor:ciscomodel:crosswork data gatewayscope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.5\(1\)

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(3.025\)

Trust: 1.0

vendor:ciscomodel:advanced malware protection virtual private cloud appliancescope:ltversion:3.5.4

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.3.0

Trust: 1.0

vendor:siemensmodel:capitalscope:ltversion:2019.1

Trust: 1.0

vendor:apachemodel:log4jscope:eqversion:2.0

Trust: 1.0

vendor:bentleymodel:synchroscope:gteversion:6.1

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:unified communications manager im \& presence servicescope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:9.1\(1\)

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:crosswork network controllerscope:eqversion:3.0.0

Trust: 1.0

vendor:ciscomodel:intersight virtual appliancescope:ltversion:1.0.9-361

Trust: 1.0

vendor:siemensmodel:navigatorscope:ltversion:2021-12-13

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.2.3

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:002.007\(000.356\)

Trust: 1.0

vendor:siemensmodel:sipass integratedscope:eqversion:2.85

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:006.004.000.003

Trust: 1.0

vendor:siemensmodel:opcenter intelligencescope:ltversion:3.5

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:007.003.001.001

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:8.4\(1\)

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:5.1

Trust: 1.0

vendor:siemensmodel:operation schedulerscope:lteversion:1.1.3

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(2.26\)

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(000.000\)

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:4.1.0

Trust: 1.0

vendor:ciscomodel:network insights for data centerscope:eqversion:6.0\(2.1914\)

Trust: 1.0

vendor:ciscomodel:intersight virtual appliancescope:eqversion:1.0.9-343

Trust: 1.0

vendor:ciscomodel:automated subsea tuningscope:eqversion:02.01.00

Trust: 1.0

vendor:siemensmodel:energy engagescope:eqversion:3.1

Trust: 1.0

vendor:siemensmodel:sentron powermanagerscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:finessescope:eqversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1l\)

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.5\(1\)

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:5.5\(0\)

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:ltversion:10.2.1v2

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.4\(1\)

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:9.0\(2\)

Trust: 1.0

vendor:ciscomodel:unity connectionscope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:data center network managerscope:eqversion:11.3\(1\)

Trust: 1.0

vendor:ciscomodel:virtualized infrastructure managerscope:ltversion:3.2.0

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:7.0.0

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.0

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:eqversion:002.003\(002.000\)

Trust: 1.0

vendor:ciscomodel:cloudcenter cost optimizerscope:ltversion:5.5.2

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.4

Trust: 1.0

vendor:ciscomodel:unified contact center expressscope:eqversion:12.5\(1\)

Trust: 1.0

vendor:siemensmodel:mendixscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.5\(2\)

Trust: 1.0

vendor:siemensmodel:vesysscope:ltversion:2019.1

Trust: 1.0

vendor:ciscomodel:cloud connectscope:ltversion:12.6\(1\)

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:008.000.000.000.004

Trust: 1.0

vendor:ciscomodel:cloudcenterscope:ltversion:4.10.0.16

Trust: 1.0

vendor:ciscomodel:data center network managerscope:ltversion:11.3\(1\)

Trust: 1.0

vendor:ciscomodel:dna spacesscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa32-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.000\(001\)

Trust: 1.0

vendor:ciscomodel:video surveillance managerscope:eqversion:7.14\(4.018\)

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:4.2

Trust: 1.0

vendor:intelmodel:system studioscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:head-end system universal device integration systemscope:eqversion:*

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:007.002.000

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.5\(3\)

Trust: 1.0

vendor:ciscomodel:unified communications manager im \& presence servicescope:eqversion:11.5\(1.22900.6\)

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.4.0

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.4.5.2

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.3\(1\)

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.6.0

Trust: 1.0

vendor:ciscomodel:mobility services enginescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:7.1.0

Trust: 1.0

vendor:ciscomodel:paging serverscope:eqversion:14.0\(1\)

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:003.001\(000.518\)

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.0\(1\)

Trust: 1.0

vendor:ciscomodel:unified intelligence centerscope:eqversion:12.6\(1\)

Trust: 1.0

vendor:ciscomodel:enterprise chat and emailscope:eqversion:12.0\(1\)

Trust: 1.0

vendor:ciscomodel:identity services enginescope:ltversion:2.4.0

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.7.0

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.13.0

Trust: 1.0

vendor:netappmodel:cloud secure agentscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:video surveillance operations managerscope:ltversion:7.14.4

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.2.1

Trust: 1.0

vendor:ciscomodel:ucs centralscope:ltversion:2.0\(1p\)

Trust: 1.0

vendor:ciscomodel:identity services enginescope:eqversion:003.000\(000.458\)

Trust: 1.0

vendor:ciscomodel:iot operations dashboardscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:eqversion:6.5.0

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:4.1

Trust: 1.0

vendor:ciscomodel:fxosscope:eqversion:6.2.3

Trust: 1.0

vendor:ciscomodel:cloudcenter suitescope:eqversion:4.10\(0.15\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.21900.40\)

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:007.000.001

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:ltversion:11.6

Trust: 1.0

vendor:ciscomodel:crosswork platform infrastructurescope:eqversion:4.1.0

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(001.000\)

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:eqversion:7.3

Trust: 1.0

vendor:ciscomodel:packaged contact center enterprisescope:ltversion:11.6

Trust: 1.0

vendor:ciscomodel:network services orchestratorscope:ltversion:5.6.3.1

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.22900.28\)

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:broadworksscope:ltversion:2021.11_1.162

Trust: 1.0

vendor:ciscomodel:unified workforce optimizationscope:eqversion:11.5\(1\)

Trust: 1.0

vendor:siemensmodel:comosscope:ltversion:10.4.2

Trust: 1.0

vendor:ciscomodel:wan automation enginescope:ltversion:7.3.0.2

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:007.001.000

Trust: 1.0

vendor:ciscomodel:nexus insightsscope:ltversion:6.0.2

Trust: 1.0

vendor:ciscomodel:ucs central softwarescope:eqversion:2.0\(1c\)

Trust: 1.0

vendor:netappmodel:oncommand insightscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:smart physcope:ltversion:3.2.1

Trust: 1.0

vendor:ciscomodel:unified intelligence centerscope:eqversion:12.6\(2\)

Trust: 1.0

vendor:siemensmodel:siguard dsascope:gteversion:4.2

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:12.6\(2\)

Trust: 1.0

vendor:ciscomodel:business process automationscope:gteversion:3.2.000.000

Trust: 1.0

vendor:ciscomodel:connected analytics for network deploymentscope:eqversion:007.003.003

Trust: 1.0

vendor:siemensmodel:gma-managerscope:ltversion:8.6.2j-398

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:siemensmodel:solid edge harness designscope:ltversion:2020

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:gteversion:20.6

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:21.3

Trust: 1.0

vendor:ciscomodel:smart physcope:eqversion:3.1.2

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.000\(000\)

Trust: 1.0

vendor:ciscomodel:evolved programmable network managerscope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:network dashboard fabric controllerscope:eqversion:11.0\(1\)

Trust: 1.0

vendor:ciscomodel:unified sip proxyscope:eqversion:010.002\(001\)

Trust: 1.0

vendor:siemensmodel:6bk1602-0aa42-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:ciscomodel:virtualized infrastructure managerscope:gteversion:3.4.0

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:ltversion:11.5\(1\)

Trust: 1.0

vendor:ciscomodel:crosswork zero touch provisioningscope:ltversion:2.0.1

Trust: 1.0

vendor:applemodel:xcodescope:ltversion:13.3

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:eqversion:002.009\(000.002\)

Trust: 1.0

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.17900.52\)

Trust: 1.0

vendor:ciscomodel:unity connectionscope:eqversion:11.5

Trust: 1.0

vendor:ciscomodel:cyber vision sensor management extensionscope:ltversion:4.0.3

Trust: 1.0

vendor:ciscomodel:virtual topology systemscope:ltversion:2.6.7

Trust: 1.0

vendor:ciscomodel:crosswork network automationscope:eqversion:2.0.0

Trust: 1.0

vendor:ciscomodel:prime service catalogscope:eqversion:12.1

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.3.1

Trust: 1.0

vendor:ciscomodel:crosswork data gatewayscope:ltversion:2.0.2

Trust: 1.0

vendor:ciscomodel:emergency responderscope:eqversion:11.5

Trust: 1.0

vendor:ciscomodel:unified customer voice portalscope:eqversion:12.5

Trust: 1.0

vendor:netappmodel:ontap toolsscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:eqversion:20.6.1

Trust: 1.0

vendor:ciscomodel:unified contact center enterprisescope:eqversion:11.6\(2\)

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:eqversion:2.3.2.0

Trust: 1.0

vendor:siemensmodel:spectrum power 7scope:eqversion:2.30

Trust: 1.0

vendor:siemensmodel:desigo cc advanced reportsscope:eqversion:3.0

Trust: 1.0

vendor:siemensmodel:nxscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:common services platform collectorscope:ltversion:2.9.1.3

Trust: 1.0

vendor:ciscomodel:prime service catalogscope:ltversion:12.1

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.0.1

Trust: 1.0

vendor:netappmodel:solidfire enterprise sdsscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2021-44228

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-44228
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2021-44228
value: CRITICAL

Trust: 1.0

VULHUB: VHN-407408
value: HIGH

Trust: 0.1

VULMON: CVE-2021-44228
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-44228
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-407408
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-44228
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 6.0
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-407408 // VULMON: CVE-2021-44228 // NVD: CVE-2021-44228 // NVD: CVE-2021-44228

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-400

Trust: 1.1

problemtype:CWE-502

Trust: 1.1

problemtype:CWE-917

Trust: 1.1

sources: VULHUB: VHN-407408 // NVD: CVE-2021-44228

THREAT TYPE

remote

Trust: 0.2

sources: PACKETSTORM: 165348 // PACKETSTORM: 165371

TYPE

code execution

Trust: 1.1

sources: PACKETSTORM: 165293 // PACKETSTORM: 165295 // PACKETSTORM: 165287 // PACKETSTORM: 165288 // PACKETSTORM: 165291 // PACKETSTORM: 165298 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 166313 // PACKETSTORM: 165264 // PACKETSTORM: 165371

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-407408

PATCH

title:Debian CVElist Bug Report Logs: apache-log4j2: CVE-2021-44228: Remote code injection via crafted log messagesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=4eae9b09b97da57f4ca6103cc85ed4da

Trust: 0.1

title:Debian CVElist Bug Report Logs: apache-log4j2: CVE-2021-45046: Incomplete fix for CVE-2021-44228 in certain non-default configurationsurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=b88a8ce4fc53c3a45830bc6bbde8b01c

Trust: 0.1

title:Debian Security Advisories: DSA-5020-1 apache-log4j2 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=24c79c59809a2c5bcddc81889b23a6bc

Trust: 0.1

title:Debian Security Advisories: DSA-5022-1 apache-log4j2 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=5ba53229ef5f408ed29126bd4f624def

Trust: 0.1

title:IBM: Security Bulletin: There is vulnerability in Apache Log4j used by Content Manager OnDemand z/OS. Content Manager OnDemand z/OS has addressed the applicable CVE [CVE-2021-44228]url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=dbdfcf9d51b60adf542d500e515b9ba8

Trust: 0.1

title:Red Hat: CVE-2021-44228url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-44228

Trust: 0.1

title:IBM: An update on the Apache Log4j 2.x vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=0648a3f00f067d373b069c4f2acd5db4

Trust: 0.1

title:Amazon Linux AMI: ALAS-2021-1553url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1553

Trust: 0.1

title:IBM: Security Bulletin: IBM Cloud Pak System is vulnerable to arbitrary code execution due to Apache Log4j (CVE-2021-45046, CVE-2021-44228)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=c8b40ff47e1d31bee8b0fbdbdd4fe212

Trust: 0.1

title:IBM: Security Bulletin: IBM Cloud Pak System is vulnerable to arbitrary code execution due to Apache Log4j (CVE-2021-45046, CVE-2021-44228)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=654a4f5a7bd1fdfd229558535923710b

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1731url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1731

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1730url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1730

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-44228 log

Trust: 0.1

title: - url:https://github.com/canarieids/Zeek-Ubuntu-22.04

Trust: 0.1

title: - url:https://github.com/f5devcentral/f5-professional-services

Trust: 0.1

title:Log4J-CVE-2021-44228-Mitigation-Cheat-Sheeturl:https://github.com/thedevappsecguy/Log4J-CVE-2021-44228-Mitigation-Cheat-Sheet

Trust: 0.1

title:spring-on-k8surl:https://github.com/AndriyKalashnykov/spring-on-k8s

Trust: 0.1

title:jaygoobyurl:https://github.com/jaygooby/jaygooby

Trust: 0.1

title:log4j-log4shell-playgroundurl:https://github.com/rgl/log4j-log4shell-playground

Trust: 0.1

title:Log4jurl:https://github.com/kaganoglu/Log4j

Trust: 0.1

title:trivy-cve-scanurl:https://github.com/broadinstitute/trivy-cve-scan

Trust: 0.1

title:test-44228url:https://github.com/datadavev/test-44228

Trust: 0.1

title:cve-2021-44228-helpersurl:https://github.com/uint0/cve-2021-44228-helpers

Trust: 0.1

title:log4j-vendor-listurl:https://github.com/bizzarecontacts/log4j-vendor-list

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-44228

Trust: 0.1

title:log4shellurl:https://github.com/0xsyr0/log4shell

Trust: 0.1

title:cve-2021-44228-qingteng-online-patchurl:https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch

Trust: 0.1

title:cve-2021-44228url:https://github.com/corelight/cve-2021-44228

Trust: 0.1

title:Log4Shell-IOCsurl:https://github.com/curated-intel/Log4Shell-IOCs

Trust: 0.1

title:Sitecore.Solr-log4j-mitigationurl:https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation

Trust: 0.1

title:check-log4jurl:https://github.com/yahoo/check-log4j

Trust: 0.1

sources: VULMON: CVE-2021-44228

EXTERNAL IDS

db:NVDid:CVE-2021-44228

Trust: 2.5

db:PACKETSTORMid:165371

Trust: 1.2

db:PACKETSTORMid:165311

Trust: 1.1

db:PACKETSTORMid:165225

Trust: 1.1

db:PACKETSTORMid:165532

Trust: 1.1

db:PACKETSTORMid:165281

Trust: 1.1

db:PACKETSTORMid:165306

Trust: 1.1

db:PACKETSTORMid:165260

Trust: 1.1

db:PACKETSTORMid:165673

Trust: 1.1

db:PACKETSTORMid:165282

Trust: 1.1

db:PACKETSTORMid:167794

Trust: 1.1

db:PACKETSTORMid:167917

Trust: 1.1

db:PACKETSTORMid:165270

Trust: 1.1

db:PACKETSTORMid:165261

Trust: 1.1

db:PACKETSTORMid:165642

Trust: 1.1

db:PACKETSTORMid:165307

Trust: 1.1

db:SIEMENSid:SSA-479842

Trust: 1.1

db:SIEMENSid:SSA-714170

Trust: 1.1

db:SIEMENSid:SSA-661247

Trust: 1.1

db:SIEMENSid:SSA-397453

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/12/13/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/12/14/4

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/12/10/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/12/13/2

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/12/10/2

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/12/15/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/12/10/1

Trust: 1.1

db:CERT/CCid:VU#930724

Trust: 1.1

db:PACKETSTORMid:171626

Trust: 1.0

db:PACKETSTORMid:165293

Trust: 0.2

db:PACKETSTORMid:165329

Trust: 0.2

db:PACKETSTORMid:165333

Trust: 0.2

db:PACKETSTORMid:165295

Trust: 0.2

db:PACKETSTORMid:165291

Trust: 0.2

db:PACKETSTORMid:166313

Trust: 0.2

db:PACKETSTORMid:165298

Trust: 0.2

db:PACKETSTORMid:165348

Trust: 0.2

db:PACKETSTORMid:165264

Trust: 0.2

db:PACKETSTORMid:165343

Trust: 0.1

db:PACKETSTORMid:165324

Trust: 0.1

db:PACKETSTORMid:165520

Trust: 0.1

db:PACKETSTORMid:165285

Trust: 0.1

db:PACKETSTORMid:165290

Trust: 0.1

db:PACKETSTORMid:165733

Trust: 0.1

db:PACKETSTORMid:165279

Trust: 0.1

db:PACKETSTORMid:165297

Trust: 0.1

db:PACKETSTORMid:165326

Trust: 0.1

db:PACKETSTORMid:165289

Trust: 0.1

db:PACKETSTORMid:165632

Trust: 0.1

db:EXPLOIT-DBid:50592

Trust: 0.1

db:EXPLOIT-DBid:50590

Trust: 0.1

db:VULHUBid:VHN-407408

Trust: 0.1

db:VULMONid:CVE-2021-44228

Trust: 0.1

db:PACKETSTORMid:169172

Trust: 0.1

db:PACKETSTORMid:165287

Trust: 0.1

db:PACKETSTORMid:165288

Trust: 0.1

sources: VULHUB: VHN-407408 // VULMON: CVE-2021-44228 // PACKETSTORM: 169172 // PACKETSTORM: 165293 // PACKETSTORM: 165295 // PACKETSTORM: 165287 // PACKETSTORM: 165288 // PACKETSTORM: 165291 // PACKETSTORM: 165298 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165348 // PACKETSTORM: 166313 // PACKETSTORM: 165264 // PACKETSTORM: 165371 // NVD: CVE-2021-44228

REFERENCES

url:https://www.kb.cert.org/vuls/id/930724

Trust: 1.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-apache-log4j-qruknebd

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf

Trust: 1.1

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2021-0032

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20211210-0007/

Trust: 1.1

url:https://support.apple.com/kb/ht213189

Trust: 1.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/alert-cve-2021-44228.html

Trust: 1.1

url:https://www.debian.org/security/2021/dsa-5020

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/mar/23

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/jul/11

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/dec/2

Trust: 1.1

url:http://packetstormsecurity.com/files/167794/open-xchange-app-suite-7.10.x-cross-site-scripting-command-injection.html

Trust: 1.1

url:http://packetstormsecurity.com/files/167917/mobileiron-log4shell-remote-command-execution.html

Trust: 1.1

url:https://github.com/nu11secur1ty/cve-mitre/tree/main/cve-2021-44228

Trust: 1.1

url:https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165225/apache-log4j2-2.14.1-remote-code-execution.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165260/vmware-security-advisory-2021-0028.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165261/apache-log4j2-2.14.1-information-disclosure.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165270/apache-log4j2-2.14.1-remote-code-execution.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165281/log4j2-log4shell-regexes.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165282/log4j-payload-generator.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165306/l4sh-log4j-remote-code-execution.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165307/log4j-remote-code-execution-word-bypassing.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165311/log4j-scan-extensive-scanner.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165371/vmware-security-advisory-2021-0028.4.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165532/log4shell-http-header-injection.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165642/vmware-vcenter-server-unauthenticated-log4shell-jndi-injection-remote-code-execution.html

Trust: 1.1

url:http://packetstormsecurity.com/files/165673/unifi-network-application-unauthenticated-log4shell-remote-code-execution.html

Trust: 1.1

url:https://github.com/cisagov/log4j-affected-db

Trust: 1.1

url:https://github.com/cisagov/log4j-affected-db/blob/develop/software-list.md

Trust: 1.1

url:https://logging.apache.org/log4j/2.x/security.html

Trust: 1.1

url:https://twitter.com/kurtseifried/status/1469345530182455296

Trust: 1.1

url:https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/12/10/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/12/10/2

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/12/10/3

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/12/13/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/12/13/2

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/12/14/4

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/12/15/3

Trust: 1.1

url:https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44228

Trust: 1.1

url:http://packetstormsecurity.com/files/171626/ad-manager-plus-7122-remote-code-execution.html

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/m5csvunv4hwzzxgoknsk6l7rpm7bokib/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/vu57ujdcfiasio35gc55jmksrxjmcdfm/

Trust: 1.0

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-009

Trust: 0.9

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2021-44228

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.5

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25013

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25012

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35522

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35524

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25013

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25009

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-27645

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33574

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-43527

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14145

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25014

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-14145

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25012

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35521

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-35942

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35524

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3572

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35522

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-37136

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-17541

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36331

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3712

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31535

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35523

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36330

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20266

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36332

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25010

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-17541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25014

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-37137

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20317

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-21409

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-43267

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3481

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25009

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25010

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-35523

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-36331

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3426

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.2

url:https://issues.jboss.org/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-36330

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-35521

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-45046

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-45046

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/m5csvunv4hwzzxgoknsk6l7rpm7bokib/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/vu57ujdcfiasio35gc55jmksrxjmcdfm/

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9488

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/apache-log4j2

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5132

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.2/html-single/red_hat_data_grid_8.2_release_notes/index

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/softwaredetail.html?softwareid=70381&product=data.grid&version=8.2&downloadtype=patches

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.amq.streams&version=1.8.4

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5138

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5127

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5129

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5108

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5140

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=appplatform&version=7.4

Trust: 0.1

url:https://access.redhat.com/solutions/6577421

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4104

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4104

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5148

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5106

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5192-1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5192-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22604

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22602

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22608

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14379

Trust: 0.1

url:https://support.apple.com/ht213189.

Trust: 0.1

url:https://developer.apple.com/xcode/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22606

Trust: 0.1

url:https://support.apple.com/en-us/ht201222.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22601

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22605

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22603

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5094

Trust: 0.1

url:https://access.redhat.com/articles/11258.

Trust: 0.1

url:https://www.vmware.com/security/advisories/vmsa-2021-0028.html

Trust: 0.1

url:http://lists.vmware.com/mailman/listinfo/security-announce

Trust: 0.1

url:https://lists.vmware.com/mailman/listinfo/security-announce.

Trust: 0.1

sources: VULHUB: VHN-407408 // PACKETSTORM: 169172 // PACKETSTORM: 165293 // PACKETSTORM: 165295 // PACKETSTORM: 165287 // PACKETSTORM: 165288 // PACKETSTORM: 165291 // PACKETSTORM: 165298 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165348 // PACKETSTORM: 166313 // PACKETSTORM: 165264 // PACKETSTORM: 165371 // NVD: CVE-2021-44228

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 165293 // PACKETSTORM: 165295 // PACKETSTORM: 165287 // PACKETSTORM: 165288 // PACKETSTORM: 165291 // PACKETSTORM: 165298 // PACKETSTORM: 165329 // PACKETSTORM: 165333 // PACKETSTORM: 165264

SOURCES

db:VULHUBid:VHN-407408
db:VULMONid:CVE-2021-44228
db:PACKETSTORMid:169172
db:PACKETSTORMid:165293
db:PACKETSTORMid:165295
db:PACKETSTORMid:165287
db:PACKETSTORMid:165288
db:PACKETSTORMid:165291
db:PACKETSTORMid:165298
db:PACKETSTORMid:165329
db:PACKETSTORMid:165333
db:PACKETSTORMid:165348
db:PACKETSTORMid:166313
db:PACKETSTORMid:165264
db:PACKETSTORMid:165371
db:NVDid:CVE-2021-44228

LAST UPDATE DATE

2025-10-20T01:59:58.322000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-407408date:2023-02-06T00:00:00
db:VULMONid:CVE-2021-44228date:2023-11-07T00:00:00
db:NVDid:CVE-2021-44228date:2025-08-08T18:52:00.230

SOURCES RELEASE DATE

db:VULHUBid:VHN-407408date:2021-12-10T00:00:00
db:VULMONid:CVE-2021-44228date:2021-12-10T00:00:00
db:PACKETSTORMid:169172date:2021-12-28T20:12:00
db:PACKETSTORMid:165293date:2021-12-15T15:24:58
db:PACKETSTORMid:165295date:2021-12-15T15:26:54
db:PACKETSTORMid:165287date:2021-12-15T15:20:43
db:PACKETSTORMid:165288date:2021-12-15T15:22:36
db:PACKETSTORMid:165291date:2021-12-15T15:23:37
db:PACKETSTORMid:165298date:2021-12-15T15:28:00
db:PACKETSTORMid:165329date:2021-12-16T15:25:46
db:PACKETSTORMid:165333date:2021-12-16T15:34:27
db:PACKETSTORMid:165348date:2021-12-17T14:06:52
db:PACKETSTORMid:166313date:2022-03-15T15:45:58
db:PACKETSTORMid:165264date:2021-12-14T15:34:14
db:PACKETSTORMid:165371date:2021-12-20T16:19:51
db:NVDid:CVE-2021-44228date:2021-12-10T10:15:09.143