Last active
October 14, 2025 08:35
-
Star
(1,092)
You must be signed in to star a gist -
Fork
(94)
You must be signed in to fork a gist
-
-
Save SwitHak/b66db3a06c2955a9cb71a8718970c592 to your computer and use it in GitHub Desktop.
Revisions
-
SwitHak revised this gist
Dec 20, 2021 . 1 changed file with 19 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -46,6 +46,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## AlienVault : https://success.alienvault.com/s/article/are-USM-Anywhere-or-USM-Central-vulnerable-to-CVE-2021-44228 ## Alphatron Medical : https://www.alphatronmedical.com/home.html ## Altaro : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995170 ## AMI : https://www.ami.com/ami-analysis-and-response-to-cve-2021-44228-log4j-vulnerability/ ## Anaqua : https://www.anaqua.com/ ## APACHE Global : https://blogs.apache.org/security/entry/cve-2021-44228 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ @@ -54,6 +55,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Appdynamics : https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability ## Appeon : https://community.appeon.com/index.php/qna/q-a/apache-log4j2-remote-code-execution-vulnerability-cve-2021-44228-and-powerbuilder-infomaker#reply-31358 ## AppGate : https://www.appgate.com/blog/appgate-sdp-unaffected-by-log4j-vulnerability ## AppviewX : https://www.appviewx.com/blogs/apache-log4j-cve-2021-44228-vulnerability-zero-trust-networks-are-the-future/ ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Aqua Security : https://docs.google.com/document/d/e/2PACX-1vSmFR3oHPXOih1wENKd7RXn0dsHzgPUe91jJwDTsaVxJtcJEroktWNLq7BMUx9v7oDZRHqLVgkJnqCm/pub @@ -65,6 +67,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## ArcServe : https://twitter.com/Arcserve/status/1470571214263361537 ## ArcticWolf : https://arcticwolf.com/resources/blog/log4j ## Aruba Networks: https://asp.arubanetworks.com/notifications/Tm90aWZpY2F0aW9uOjEwMTQ0;notificationCategory=Security ## AspenTech : https://esupport.aspentech.com/S_Article?id=000099310 ## Ataccama : https://www.ataccama.com/files/log4j2-vulnerability-cve-2021-44228-fix.pdf ## Atempo : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3999431 ## Atera : https://www.reddit.com/r/atera/comments/rh7xb1/apache_log4j_2_security_advisory_update/ @@ -90,6 +93,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 # B ## B&W Software : https://www.buw-soft.de/en/2021/12/20/investigation-about-log4j-vulnerability-of-bw-products/ ## BackBox : https://updates.backbox.com/V6.5/Docs/CVE-2021-44228.pdf ## BACKBLAZE : https://twitter.com/backblaze/status/1469477224277368838 ## Balbix : https://www.balbix.com/blog/broad-exposure-to-log4shell-cve-2021-44228-highlights-how-the-attack-surface-has-exploded/ @@ -130,6 +134,8 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## CarbonBlack : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## CAS genesisWorld : https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446 ## Cato Networks : https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/ ## Celiveo : https://support.celiveo.com/support/solutions/articles/79000129570-cve-2021-44228-log4shell-log4j-vulnerability-celiveo-is-not-affected- ## Celonis : https://www.celopeers.com/s/article/Celonis-Advisory-CVE-2021-44228 ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## Cerebrate : https://twitter.com/cerebrateproje1/status/1470347775141421058 ## Cerebro : https://github.com/lmenezes/cerebro/blob/main/conf/logback.xml#L5 @@ -150,6 +156,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Cloudogu : https://community.cloudogu.com/t/security-vulnerability-log4shell-cve-2021-44228/417 ## Cloudron : https://forum.cloudron.io/topic/6153/log4j-and-log4j2-library-vulnerability?lang=en-US ## Clover : https://community.clover.com/articles/35868/apache-log4j-vulnerability-cve-2021-44228.html ## CMND.io : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-4002005 ## CPanel : https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ ## Code42 : https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_response_to_industry_security_incidents ## CodeBeamer : https://codebeamer.com/cb/wiki/19872365 @@ -199,6 +206,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Devolutions : https://blog.devolutions.net/2021/12/critical-vulnerability-in-log4j/ ## Diebold Nixdorf : https://www.dieboldnixdorf.com/en-us/apache ## Digicert : https://knowledge.digicert.com/alerts/digicert-log4j-response.html ## Digilent waveforms : https://forum.digilentinc.com/topic/22531-has-waveforms-been-affected-by-the-log4j-vulnerability-cve-2021-44228/ ## Digital AI : https://support.digital.ai/hc/en-us/articles/4412377686674-Log4J-Vulnerability-to-Zero-Day-Exploit-and-Digital-ai#overview-0-1 ## DNSFilter : https://www.dnsfilter.com/blog/dnsfilter-response-to-log4j-vulnerability ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ @@ -317,6 +325,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## IBA-AG : https://www.iba-ag.com/en/security ## Ibexa : https://developers.ibexa.co/security-advisories/cve-2021-44228-log4j-vulnerability ## IBM : https://www.ibm.com/support/pages/node/6525548 ## IDS : https://en.ids-imaging.com/news-article/information-log4j-vulnerability.html ## IFS : https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436 ## IGEL : https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html ## Ignite Realtime OpenFire : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 @@ -378,6 +387,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Kafka Connect CosmosDB : https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md ## Karakun : https://board.karakun.com/viewtopic.php?f=21&t=8351 ## Kaseya : https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment ## Katalon : https://forum.katalon.com/t/katalon-response-to-the-log4j2-exploit-cve-2021-44228/60742/5 ## Keeper Security : https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/ ## KEMP : https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit ## KEMP 2 : https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228- @@ -432,6 +442,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1 ## MariaDB : https://mariadb.com/resources/blog/log4shell-and-mariadb-cve-2021-44228/ ## Marin software : https://insights.marinsoftware.com/marin-software/marin-software-statement-on-log4j-vulnerability/ ## MathWorks Matlab : https://www.mathworks.com/matlabcentral/answers/1610640-apache-log4j-vulnerability-cve-2021-44228-how-does-it-affect-matlab-run-time ## Matillion : https://documentation.matillion.com/docs/security-advisory-14th-december-2021 ## Matomo : https://forum.matomo.org/t/matomo-is-not-concerned-by-the-log4j-security-breach-cve-2021-44228-discovered-on-december-2021-the-9th/44089 @@ -441,6 +452,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## MediaWiki : https://www.mediawiki.org/wiki/Wikibase/Announcements/2021-12-14/en ## MEINBERG : https://www.meinbergglobal.com/english/news/meinberg-lantime-and-microsync-systems-not-at-risk-from-log4j-security-exploit.htm ## Memurai : https://www.memurai.com/blog/apache-log4j2-cve-2021-44228 ## Mendix :https://status.mendix.com/incidents/8j5043my610c ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## MicroFocus : https://portal.microfocus.com/s/customportalsearch?language=en_US&searchtext=CVE-2021-44228 ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ @@ -498,6 +510,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Okta : https://sec.okta.com/articles/2021/12/log4shell ## Onespan :https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776 ## OnlyOffice : https://forum.onlyoffice.com/t/does-onlyoffice-documentserver-uses-log4j/841 ## OpenCMS : https://documentation.opencms.org/opencms-documentation/server-installation/log4j-security-vulnerability/index.html ## Opengear : https://opengear.zendesk.com/hc/en-us/articles/4412713339419-CVE-2021-44228-aka-Log4Shell-Opengear-products-are-not-affected ## OpenHab : https://github.com/openhab/openhab-distro/pull/1343 ## OpenNMS : https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/ @@ -670,6 +683,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## SonicWall : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce ## SOS Berlin : https://www.sos-berlin.com/en/news-mitigation-log4j-vulnerability ## SpaceLabs Healthcare : https://www.spacelabshealthcare.com/products/security/security-advisories-and-archives/log4shell-vulnerability-assessment-and-potential-product-impact-statement/ ## Spambrella : https://www.spambrella.com/faq/status-of-spambrella-products-with-cve-2021-44228/ ## Sprecher Automation : https://www.sprecher-automation.com/en/it-security/security-alerts ## Splashtop : https://support-splashtopbusiness.splashtop.com/hc/en-us/articles/4412788262811-Is-Splashtop-affected-by-Apache-Log4j- @@ -692,6 +706,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## SUSE : https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/ ## Sweepwidget : https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032 ## Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 ## Swisslog : https://www.swisslog.com/en-us/about-swisslog/newsroom/news-press-releases-blog-posts/2021/12/apache-cyber-attack ## Swyx : https://service.swyx.net/hc/de/articles/4412323539474 ## Syncplify : https://blog.syncplify.com/no-we-are-not-affected-by-log4j-vulnerability/ ## Synchro MSP : https://community.syncromsp.com/t/log4j-rce-cve-2021-4428/1350 @@ -713,6 +728,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## TechSmith : https://support.techsmith.com/hc/en-us/articles/4416620527885?input_string=log4j ## Tenable : https://www.tenable.com/log4j ## Telestream : http://www.telestream.net/telestream-support/Apache-Log4j2-Bulletin.htm ## Terra : https://terra.bio/terras-security-response-to-the-log4j-vulnerability/ ## TestOut : https://support.testout.com/hc/en-us/articles/4413081889947-Is-TestOut-LabSim-Impacted-by-the-Apache-Log4j-vulnerability-CVE-2021-44228- ## Thales : https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=02863d13db544110f0e3220805961914&sysparm_article=KB0025287 ## Thales (SafeNet) HSM : https://supportportal.thalesgroup.com/csm?id=kb_article_protected&sys_id=12acaed3dbd841105d310573f3961953 @@ -749,8 +765,10 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Varnish Software : https://docs.varnish-software.com/security/CVE-2021-44228-45046/ ## Veeam : https://www.veeam.com/kb4254 ## Vector : https://www.vector.com/cl/en/support-downloads/security-advisories/log4j/#c248921 ## VLC : https://www.videolan.org/news.html#news-2021-12-15 ## Venafi : https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice ## Vendavo : https://www.vendavo.com/all/latest-vendavo-response-to-log4shell-vulnerability/ ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052070 ## Vertica : https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used ## Vertiv : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996968 @@ -789,6 +807,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## XenForo : https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/ ## Xerox : https://security.business.xerox.com/wp-content/uploads/2021/12/Xerox-Special-Bulletin-Regarding-CVE-2021-44228.pdf ## Xilinx : https://support.xilinx.com/s/article/76957?language=en_US ## Xmind : https://support.xmind.net/hc/en-us/community/posts/4412509904537 ## XPertDoc : https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727 ## XPLG : https://www.xplg.com/log4j-vulnerability-exploit-log4shell-xplg-secure/ ## Xray connector plugin : https://github.com/jenkinsci/xray-connector-plugin/issues/53 -
SwitHak revised this gist
Dec 20, 2021 . 1 changed file with 15 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -126,6 +126,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Caddy : https://caddy.community/t/apache-log4j-remote-code-execution-vulnerability/14403 ## Calyptix Security : https://twitter.com/calyptix/status/1470498981147029507 ## Camunda : https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910 ## Canon : https://www.canon.com.au/support/support-news/support-news/security-advisory-potential-apache-log4j-vulnerability ## CarbonBlack : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## CAS genesisWorld : https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446 ## Cato Networks : https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/ @@ -141,7 +142,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## CIS : https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961 ## Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd ## Citrix : https://support.citrix.com/article/CTX335705 ## Claris : https://community.claris.com/en/s/article/Q-A-Claris-products-and-the-Apache-Log4j-vulnerability ## Cloudera : https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019 ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## CloudFoundry : https://www.cloudfoundry.org/blog/log4j-vulnerability-cve-2021-44228-impact-on-cloud-foundry-products/ @@ -176,6 +177,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## CyberArk : https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228 ## Cybereason : https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228 ## CyberRes : https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228 ## Cytoscape : https://cytoscape.org/common_issues.html#log4shell # D ## DarkTrace : https://customerportal.darktrace.com/inside-the-soc/get-article/201 @@ -225,6 +227,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## ESI Group : https://myesi.esi-group.com/support/apache-log4j-vulnerability. ## ESRI : https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/ ## Estos : https://support.estos.de/de/sicherheitshinweise/estos-von-kritischer-schwachstelle-in-log4j-cve-2021-44228-nicht-betroffen ## Eurolinux : https://en.euro-linux.com/blog/critical-vulnerability-cve-2021-44228-in-apache-log4j/ ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 ## Evolveum Midpoint : https://evolveum.com/midpoint-not-vulnerable-to-log4shell/ ## Ewon : https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42 @@ -292,7 +295,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## HAProxy : https://www.haproxy.com/blog/december-2021-log4shell-mitigation/ ## HarmanPro AMX : https://help.harmanpro.com/apache-log4j-vulnerability ## Hashicorp : https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228/33138 ## Hazelcast : https://support.hazelcast.com/s/article/Security-Advisory-for-Log4Shell ## HCL Global : https://support.hcltechsw.com/csm/en?id=kb_article&sysparm_article=KB0095490 ## HelpSystems Clearswift : https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687 ## Hewlett Packard Enterprise HPE : https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04215en_us @@ -318,6 +321,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## IGEL : https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html ## Ignite Realtime OpenFire : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## iGrafx : https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/ ## Illumina : https://support.illumina.com/bulletins/2021/121/investigation-of-log4j-vulnerability-with-clarity-lims.html ## Illuminated Cloud : https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html ## Illumio : https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html ## IManage : https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e @@ -337,6 +341,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## InterSystems : https://www.intersystems.com/gt/apache-log4j2/ ## Interworks : https://interworks.com/blog/2021/12/14/log4j-vulnerability-cve-2021-44228-information/ ## Intuiface : https://twitter.com/Intuiface/status/1471095195664015363 ## Intuit Quickbooks : https://quickbooks.intuit.com/learn-support/en-us/quickbooks-time/0-day-log4j-exploit/00/990291 ## iRedMail : https://forum.iredmail.org/topic18605-log4j-cve202144228.html ## IronCore Labs : https://twitter.com/IronCoreLabs/status/1469359583147659269 ## Ironnet : https://www.ironnet.com/blog/ironnet-security-notifications-related-to-log4j-vulnerability @@ -347,6 +352,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # J ## Jamasoftware : https://community.jamasoftware.com/communities/community-home/digestviewer/viewthread?MessageKey=06d26f9c-2abe-4c10-93d4-c0f6c8a01b22&CommunityKey=c9d20d4c-5bb6-4f19-92eb-e7cee0942d51&tab=digestviewer#bm06d26f9c-2abe-4c10-93d4-c0f6c8a01b22 ## Jam Software : https://knowledgebase.jam-software.de/7577 ## JAMF : https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html ## Jaspersoft : https://community.jaspersoft.com/wiki/apache-log4j-vulnerability-update-jaspersoft-products ## JazzSM DASH IBM : https://www.ibm.com/support/pages/node/6525552 @@ -360,6 +366,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Jitsi : https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md ## JPOS : https://github.com/jpos/jPOS/commit/d615199a1bdd35c35d63c07c10fd0bdbbc96f625 ## JobRouter : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995497 ## Johnson Controls : https://www.johnsoncontrols.com/-/media/jci/cyber-solutions/product-security-advisories/2021/jci-psa-2021-23-v3.pdf?la=en&hash=1FC58B65D948E106055CA63184EFBCAB5C7DD9A1 ## Journyx : https://community.journyx.com/support/solutions/articles/9000209044-apache-log4j-2-vulnerability-cve-2021-44228- ## Jump Desktop : https://support.jumpdesktop.com/hc/en-us/articles/4416720395021-Log4j-CVE-2021-44228-CVE-2021-45046-Statement ## Juniper Networks : https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259 @@ -383,6 +390,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Konica Minolta : https://www.konicaminolta.de/de-de/support/log4j ## Kronos UKG : https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US ## Kyberna : https://www.kyberna.com/detail/log4j-sicherheitsluecke ## Kyocera : https://www.kyoceradocumentsolutions.de/de/support/sicherheitsluecke-Log4j.html # L ## L3Harris Geospatial : https://www.l3harrisgeospatial.com/Support/Self-Help-Tools/Help-Articles/Help-Articles-Detail/ArtMID/10220/ArticleID/24141/Impact-of-Log4j-Java-Security-Vulnerability-CVE-2021-44228-on-L3Harris-Geospatial-software @@ -509,13 +517,15 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## OxygenXML : https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html # P ## Palissade : https://kb.palisade.com/index.php?pg=kb.printer.friendly&id=3#p1826 ## Palo-Alto Networks : https://security.paloaltonetworks.com/CVE-2021-44228 ## PandoraFMS : https://pandorafms.com/blog/es/cve-2021-44228/ ## Panopto : https://support.panopto.com/s/article/Panopto-Statement-on-the-Log4j2-Zero-Day-Vulnerability ## Pantheon hosting : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996953 ## PaperCut : https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228 ## Parallels : https://kb.parallels.com/en/128696 ## Parse.ly : https://blog.parse.ly/parse-ly-log4shell/ ## PasswordSafe : https://www.passwordsafe.com/de/blog/log4j-zero-day-luecke/ ## PasswordState : https://www.reddit.com/r/passwordstate/comments/rf7d62/log4j_zeroday_log4shell_vulnerability/ ## Pebblehost : https://help.pebblehost.com/en/article/patching-the-log4j-rce-exploit-14wyvz0/ ## PDQ : https://www.pdq.com/blog/log4j-vulnerability-cve-2021-44228/ @@ -551,7 +561,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## ProtonMail : https://twitter.com/ProtonMail/status/1470377648492797953 ## Proxmox : https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880 ## PRTG Paessler : https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228 ## PTC : https://www.ptc.com/en/documents/log4j ## PTV Group : https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information ## Pulse Secure : https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/?kA13Z000000L3dR ## Puppet : https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/ @@ -634,6 +644,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Server Eye : https://www.server-eye.de/blog/sicherheitsluecke-log4j-server-eye-systeme-sind-nicht-betroffen/ ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 ## Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 ## SFIRM : https://www.sfirm.de/nc/aktuelle-meldungen/aktuelles/article//update-141221-sfirm-440-von-java-sicherheitsluecke-log4j-nicht-betroffen.html ## Shibboleth : http://shibboleth.net/pipermail/announce/2021-December/000253.html ## Shopify : https://community.shopify.com/c/technical-q-a/is-shopify-affected-by-the-log4j-vulnerability/td-p/1417625 ## Siebel : https://www.siebelhub.com/main/2021/12/log4j-vulnerability-cve-2021-44228-and-siebel-crm.html @@ -748,6 +759,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Vigilant Software (CyberComply : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3997784 ## VIPRE : https://labs.vipre.com/security-advisory-vipres-analysis-of-critical-log4j-vulnerability/ ## Viso Trust : https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492 ## VisualSVN : https://www.visualsvn.com/company/news/visualsvn-products-are-not-affected-by-CVE-2021-44228 ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## VTScada : https://www.vtscada.com/vtscada-unaffected-by-log4j/ -
SwitHak revised this gist
Dec 19, 2021 . 1 changed file with 16 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -27,6 +27,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Acquia : https://support.acquia.com/hc/en-us/articles/4415823329047-Apache-log4j-CVE-2021-44228 ## Acronis : https://security-advisory.acronis.com/advisories/SEC-3859 ## ActiveState : https://www.activestate.com/blog/activestate-statement-java-log4j-vulnerability/ ## Acunetix : https://www.acunetix.com/blog/web-security-zone/critical-alert-log4shell-cve-2021-44228-in-log4j-possibly-the-biggest-impact-vulnerability-ever/ ## Adaptec : https://ask.adaptec.com/app/answers/detail/a_id/17523/kw/log4j ## Addigy : https://addigy.com/blog/addigy-and-apaches-log4j2-cve-2021-44228-status/ ## Adeptia : https://support.adeptia.com/hc/en-us/articles/4412815509524-CVE-2021-44228-Log4j2-Vulnerability-Mitigation- @@ -83,7 +84,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## AWS New : https://aws.amazon.com/security/security-bulletins/AWS-2021-006/ ## AWS OLD: https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ ## AXS Guard : https://www.axsguard.com/en_US/blog/security-news-4/log4j-vulnerability-77 ## Axway Applications : https://support.axway.com/news/1331/lang/en ## AXON : https://my.axon.com/s/trust/response-to-log4j2-vuln?language=en_US ## AxxonSoft : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996387 ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 @@ -122,6 +123,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # C ## C4b XPHONE : https://www.c4b.com/de/news/log4j.php ## Caddy : https://caddy.community/t/apache-log4j-remote-code-execution-vulnerability/14403 ## Calyptix Security : https://twitter.com/calyptix/status/1470498981147029507 ## Camunda : https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910 ## CarbonBlack : https://www.vmware.com/security/advisories/VMSA-2021-0028.html @@ -142,6 +144,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Claris : https://support.claris.com/s/article/CVE-2021-44228-Apache-Log4j-Vulnerability-and-Claris-products?language=en_US ## Cloudera : https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019 ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## CloudFoundry : https://www.cloudfoundry.org/blog/log4j-vulnerability-cve-2021-44228-impact-on-cloud-foundry-products/ ## Cloudian HyperStore : https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228 ## Cloudogu : https://community.cloudogu.com/t/security-vulnerability-log4shell-cve-2021-44228/417 ## Cloudron : https://forum.cloudron.io/topic/6153/log4j-and-log4j2-library-vulnerability?lang=en-US @@ -263,6 +266,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Gerrit code review : https://www.gerritcodereview.com/2021-12-13-log4j-statement.html ## GFI : https://techtalk.gfi.com/impact-of-log4j-vulnerability-on-gfi/ ## Ghidra : https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning ## Gigamon : https://community.gigamon.com/gigamoncp/s/article/Are-Gigamon-products-affected-by-CVE-2021-44228 ## GitHub : https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ## GitHub Response : https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/ ## GitLab : https://forum.gitlab.com/t/cve-2021-4428/62763 @@ -296,10 +300,12 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Hexagon : https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US ## Hikvision : https://video.xortec.de/media/pdf/87/e8/03/kw50_Update-for-Apache-Log4j2-Issue-Hikvision_official.pdf ## Hitachi Vantara : https://knowledge.hitachivantara.com/Support_Information/Hitachi_Vantara_Security_Advisories/CVE-2021-44228_-_Apache_Log4j2 ## HomeAssistant : https://community.home-assistant.io/t/looking-for-advice-on-log4j/367250/6 ## Honeywell : https://www.honeywell.com/us/en/press/2021/12/honeywells-statement-on-java-apache-log4j-logging-framework-vulnerability ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 ## Huawei : https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en ## Hubspot : https://community.hubspot.com/t5/APIs-Integrations/Log4J-day-zero-exploit-CVE-2021-44228/td-p/541949 ## Hyte.IO : https://hyte.io/cve-2021-44228/ # I @@ -315,6 +321,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Illuminated Cloud : https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html ## Illumio : https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html ## IManage : https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e ## Impero Software : https://www.imperosoftware.com/us/impero-software-and-the-log4j-vulnerability/ ## Imperva : https://docs.imperva.com/howto/9111b8a5/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day ## IndustrialDefender : https://www.industrialdefender.com/cve-2021-44228-log4j/ @@ -328,6 +335,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Integrative Genomics Viewer IGV : https://github.com/igvteam/igv/commit/40aa5e0c6b5f2eac0a1528658189fd7de8f20347 ## Intel : https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html ## InterSystems : https://www.intersystems.com/gt/apache-log4j2/ ## Interworks : https://interworks.com/blog/2021/12/14/log4j-vulnerability-cve-2021-44228-information/ ## Intuiface : https://twitter.com/Intuiface/status/1471095195664015363 ## iRedMail : https://forum.iredmail.org/topic18605-log4j-cve202144228.html ## IronCore Labs : https://twitter.com/IronCoreLabs/status/1469359583147659269 @@ -368,6 +376,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## KEMP 2 : https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228- ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 ## Keypass : https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250#c0bc ## KIE : https://blog.kie.org/2021/12/kie-log4j2-exploit-cve-2021-44228.html ## KiteWorks : https://www.kiteworks.com/kiteworks-news/log4shell-apache-vulnerability-what-kiteworks-customers-need-to-know/ ## Kofax : https://knowledge.kofax.com/MFD_Productivity/SafeCom/Product_Information/SafeCom_and_Log4j_vulnerability_(CVE-2021-44228) ## Komoot Photon : https://github.com/komoot/photon/issues/620 @@ -467,6 +476,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Nomachine : https://forums.nomachine.com/topic/apache-log4j-notification ## NoviFlow : https://noviflow.com/noviflow-products-and-the-log4shell-exploit-cve-2021-44228/ ## NI (National Instruments) : https://www.ni.com/en-us/support/documentation/supplemental/21/ni-response-to-apache-log4j-vulnerability-.html ## NSFocus : https://nsfocusglobal.com/apachelog4j-remote-code-execution-vulnerability-cve-2021-44228-threat-alert/ ## Nulab : https://nulab.com/blog/company-news/log4shell/ ## Nutanix : https://download.nutanix.com/alerts/Security_Advisory_0023.pdf ## Nvidia : https://nvidia.custhelp.com/app/answers/detail/a_id/5294 @@ -508,6 +518,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Parse.ly : https://blog.parse.ly/parse-ly-log4shell/ ## PasswordState : https://www.reddit.com/r/passwordstate/comments/rf7d62/log4j_zeroday_log4shell_vulnerability/ ## Pebblehost : https://help.pebblehost.com/en/article/patching-the-log4j-rce-exploit-14wyvz0/ ## PDQ : https://www.pdq.com/blog/log4j-vulnerability-cve-2021-44228/ ## Percona : https://www.percona.com/blog/log4jshell-vulnerability-update/ ## Perforce : https://www.perforce.com/support/log4j ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability @@ -529,6 +540,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## PostGreSQL : https://www.postgresql.org/about/news/postgresql-jdbc-and-the-log4j-cve-2371/ ## Postman : https://support.postman.com/hc/en-us/articles/4415791933335-Is-Postman-impacted-by-the-Log4j-vulnerability-CVE-2021-44228- ## PowerAdmin : https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/ ## Precisely : https://customer.precisely.com/s/article/CVE-2021-44228-Log4Shell?language=en_US ## Pretix : https://pretix.eu/about/de/blog/20211213-log4j/ ## PrimeKey : https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228 ## ProDVX : https://www.prodvx.com/blog/prodvx-statement-on-the-apache-log4j-security-flaw @@ -606,6 +618,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Savignano software solutions : https://savignano.atlassian.net/wiki/spaces/SNOTIFY/blog/2021/12/13/2839740417/No+Log4j+Vulnerability+in+S+Notify ## ScaleComputing : https://community.scalecomputing.com/s/article/Apache-Log4j-Vulnerability ## ScaleFusion MobileLock Pro : https://help.mobilock.in/article/t9sx43yg44-scalefusion-security-advisory-for-apache-log-4-j-vulnerability-cve-2021-44228 ## Scalingo : https://scalingo.com/blog/cve-2021-44228-log4shell ## Schneider Electric : https://download.schneider-electric.com/files?p_Doc_Ref=SESB-2021-347-01 ## SCM Manager : https://scm-manager.org/blog/posts/2021-12-13-log4shell/ ## ScreenBeam : https://customersupport.screenbeam.com/hc/en-us/articles/4416468085389-December-2021-Security-Alert-Log4j-CVE-2021-44228 @@ -693,6 +706,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Thales : https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=02863d13db544110f0e3220805961914&sysparm_article=KB0025287 ## Thales (SafeNet) HSM : https://supportportal.thalesgroup.com/csm?id=kb_article_protected&sys_id=12acaed3dbd841105d310573f3961953 ## The Access Group : https://pages.theaccessgroup.com/Response-Log4J-Dec21.html ## Therefore : https://therefore.net/log4j-therefore-unaffected/ ## ThreatLocker : https://threatlocker.kb.help/log4j-vulnerability/ ## Threema UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## ThycoticCentrify : https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md @@ -729,6 +743,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052070 ## Vertica : https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used ## Vertiv : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996968 ## VertX : https://vertx.io/blog/CVE-2021-44228/ ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## Vigilant Software (CyberComply : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3997784 ## VIPRE : https://labs.vipre.com/security-advisory-vipres-analysis-of-critical-log4j-vulnerability/ -
SwitHak revised this gist
Dec 18, 2021 . 1 changed file with 3 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -652,6 +652,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Splunk : https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html ## Spring Boot : https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot ## StarDog : https://community.stardog.com/t/stardog-7-8-1-available/3411 ## StarWind : https://www.starwindsoftware.com/security/apache_log4j/ ## Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 ## Storagement : https://www.storagement.de/index.php?action=topicofthemonth&site=log4j ## StormShield : https://www.stormshield.com/news/log4shell-security-alert-stormshield-product-response/ @@ -710,7 +711,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## TYPO3 : https://typo3.org/article/typo3-psa-2021-004 # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-55/48c64137-4a4a-41f7-b7e4-3bee505ae16e ## Ubuntu : https://ubuntu.com/security/CVE-2021-44228 ## Umbraco : https://umbraco.com/blog/security-advisory-december-15-2021-umbraco-cms-and-cloud-not-affected-by-cve-2021-44228-log4j-rce-0-day-mitigation/ ## Unify ATOS : https://networks.unify.com/security/advisories/OBSO-2112-01.pdf @@ -730,6 +731,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Vertiv : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996968 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## Vigilant Software (CyberComply : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3997784 ## VIPRE : https://labs.vipre.com/security-advisory-vipres-analysis-of-critical-log4j-vulnerability/ ## Viso Trust : https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492 ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## VTScada : https://www.vtscada.com/vtscada-unaffected-by-log4j/ -
SwitHak revised this gist
Dec 17, 2021 . 1 changed file with 36 additions and 5 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -14,11 +14,14 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # 0-9 ## 1Password : https://1password.community/discussion/comment/622612/#Comment_622612 ## 2n : https://www.2n.com/cs_CZ/novinky/produkty-2n-neohrozuje-zranitelnost-cve-2021-44228-komponenty-log4j-2 ## 2wcom : https://www.2wcom.com/2wcom-not-using-log4j/ ## 3CX : https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/#post-407911 ## 3HMIS : https://support.3mhis.com/app/account/updates/ri/5210 ## 7-Zip : https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/ ## 8x8 : https://support.8x8.com/support-services/support/Apache_Log4j_2_Vulnerability # A ## A10 Networks : https://support.a10networks.com/support/security_advisory/log4j-cve-2021-44228-cve-2021-45046/ ## ABB : https://search.abb.com/library/Download.aspx?DocumentID=9ADB012621&LanguageCode=en&DocumentPartId=&Action=Launch ## Accellence : https://www.accellence.de/en/articles/national-vulnerability-database-62 ## Acquia : https://support.acquia.com/hc/en-us/articles/4415823329047-Apache-log4j-CVE-2021-44228 @@ -42,6 +45,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## AlienVault : https://success.alienvault.com/s/article/are-USM-Anywhere-or-USM-Central-vulnerable-to-CVE-2021-44228 ## Alphatron Medical : https://www.alphatronmedical.com/home.html ## Altaro : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995170 ## Anaqua : https://www.anaqua.com/ ## APACHE Global : https://blogs.apache.org/security/entry/cve-2021-44228 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## Apigee : https://status.apigee.com/incidents/3cgzb0q2r10p @@ -61,6 +65,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## ArcticWolf : https://arcticwolf.com/resources/blog/log4j ## Aruba Networks: https://asp.arubanetworks.com/notifications/Tm90aWZpY2F0aW9uOjEwMTQ0;notificationCategory=Security ## Ataccama : https://www.ataccama.com/files/log4j2-vulnerability-cve-2021-44228-fix.pdf ## Atempo : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3999431 ## Atera : https://www.reddit.com/r/atera/comments/rh7xb1/apache_log4j_2_security_advisory_update/ ## Attivo networks : https://www.attivonetworks.com/wp-content/uploads/2021/12/Log4j_Vulnerability-Advisory-211213-4.pdf ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html @@ -102,6 +107,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BitRise : https://blog.bitrise.io/post/bitrises-response-to-log4j-vulnerability-cve-2021-44228 ## BitWarden : https://community.bitwarden.com/t/log4j-log4shell-cve-is-bitwarden-affected-due-to-docker-image/36177/2 ## BlackBaud : https://kb.blackbaud.com/knowledgebase/articles/Article/198103 ## Black Kite : https://blackkite.com/log4j-rce-vulnerability-log4shell-puts-millions-at-risk/ ## Blancco : https://support.blancco.com/display/NEWS/2021/12/12/CVE-2021-44228+-+Critical+vulnerability+in+Apache+Log4j+library ## Blumira : https://www.blumira.com/cve-2021-44228-log4shell/ @@ -112,6 +118,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## BrightSign : https://brightsign.atlassian.net/wiki/spaces/DOC/pages/370679198/Security+Statement+Log4J+Meltdown+and+Spectre+Vulnerabilities#SecurityStatement%3ALog4J%2CMeltdownandSpectreVulnerabilities-JavaApacheLog4j ## Broadcom : https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 ## Broadcom Automic Automation : https://knowledge.broadcom.com/external/article?articleId=230308 ## BuildSoft : https://bsoft.zendesk.com/hc/en-us/articles/4411821391631-Security-Advisory-Apache-Log4j-CVE-2021-44228- # C ## C4b XPHONE : https://www.c4b.com/de/news/log4j.php @@ -123,7 +130,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## Cerebrate : https://twitter.com/cerebrateproje1/status/1470347775141421058 ## Cerebro : https://github.com/lmenezes/cerebro/blob/main/conf/logback.xml#L5 ## CGM CompuGroup Medical SE & Co. KGaA Germany - Software Z1 : https://www.cgm.com/deu_de/plattformen/telematikinfrastruktur/service-und-updates/allgemeines-zu-updates/Information-zur-BSI-Warnmeldung.html ## ChaserSystems : https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected ## Checkmarx plugin : https://github.com/jenkinsci/checkmarx-plugin/pull/83 ## CheckMK : https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3 @@ -209,7 +216,10 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Emerson : https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf ## EnterpriseDT : https://enterprisedt.com/blogs/announcements/enterprisedt-does-not-use-log4j/ ## EPICOR : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996932 ## ERICOM : https://blog.ericom.com/ericom-software-products-and-the-log4shell-exploit-cve-2021-44228/ ## ESA SNAP Toolbox : https://forum.step.esa.int/t/snap-not-affected-by-log4j-vulnerability/34167 ## ESET : https://support.eset.com/en/alert8188-information-regarding-the-log4j2-vulnerability ## ESI Group : https://myesi.esi-group.com/support/apache-log4j-vulnerability. ## ESRI : https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/ ## Estos : https://support.estos.de/de/sicherheitshinweise/estos-von-kritischer-schwachstelle-in-log4j-cve-2021-44228-nicht-betroffen ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 @@ -218,6 +228,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Exabeam : https://community.exabeam.com/s/discussions?t=1639379479381 ## Exact : https://www.exact.com/news/general-statement-apache-leak ## Exivity : https://docs.exivity.com/getting-started/releases/announcements#announcement-regarding-cve-2021-44228 ## ExtraHop : https://forums.extrahop.com/t/extrahop-update-on-log4shell/8148 ## eXtreme Hosting : https://extremehosting.nl/log4shell-log4j/ ## Extreme Networks : https://extremeportal.force.com/ExtrArticleDetail?an=000100806 ## Extron : https://www.extron.com/featured/Security-at-Extron/extron-security @@ -256,6 +267,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## GitHub Response : https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/ ## GitLab : https://forum.gitlab.com/t/cve-2021-4428/62763 ## Globus : https://groups.google.com/a/globus.org/g/discuss/c/FJK0q0NoUC4 ## GLPI Project : https://forum.glpi-project.org/viewtopic.php?pid=488631#p488631 ## GoAnywhere : https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps ## GoCD : https://www.gocd.org/2021/12/14/log4j-vulnerability.html ## Google Cloud Global Products coverage : https://cloud.google.com/log4j2-security-advisory @@ -298,12 +310,12 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## IBM : https://www.ibm.com/support/pages/node/6525548 ## IFS : https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436 ## IGEL : https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html ## Ignite Realtime OpenFire : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## iGrafx : https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/ ## Illuminated Cloud : https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html ## Illumio : https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html ## IManage : https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e ## Imperva : https://docs.imperva.com/howto/9111b8a5/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day ## IndustrialDefender : https://www.industrialdefender.com/cve-2021-44228-log4j/ ## infinidat : https://support.infinidat.com/hc/en-us/articles/4413483145489-INFINIDAT-Support-Announcement-2021-010-Log4Shell-CVE-2021-44228 @@ -355,6 +367,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## KEMP : https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit ## KEMP 2 : https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228- ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 ## Keypass : https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250#c0bc ## KiteWorks : https://www.kiteworks.com/kiteworks-news/log4shell-apache-vulnerability-what-kiteworks-customers-need-to-know/ ## Kofax : https://knowledge.kofax.com/MFD_Productivity/SafeCom/Product_Information/SafeCom_and_Log4j_vulnerability_(CVE-2021-44228) ## Komoot Photon : https://github.com/komoot/photon/issues/620 @@ -374,6 +387,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell ## Lenovo : https://support.lenovo.com/ro/en/product_security/len-76573 ## LeoStream : https://support.leostream.com/support/discussions/topics/66000507567 ## Lepide : https://www.lepide.com/news/lepide-statement-on-cve-2021-44228-the-apache-log4j-vulnerability/ ## Let's Encrypt : https://community.letsencrypt.org/t/log4j-vulnerability-cve-2021-44228/167464 ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## LibreNMS : https://community.librenms.org/t/is-librenms-affected-by-vulnerable-to-cve-2021-25218-cve-2021-44228/17675/6 @@ -406,6 +420,8 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Matomo : https://forum.matomo.org/t/matomo-is-not-concerned-by-the-log4j-security-breach-cve-2021-44228-discovered-on-december-2021-the-9th/44089 ## Mattermost FocalBoard : https://forum.mattermost.org/t/log4j-vulnerability-concern/12676 ## McAfee : https://kc.mcafee.com/corporate/index?page=content&id=KB95091 ## MediathekView.de : https://mediathekview.de/changelog/13-8-1/ ## MediaWiki : https://www.mediawiki.org/wiki/Wikibase/Announcements/2021-12-14/en ## MEINBERG : https://www.meinbergglobal.com/english/news/meinberg-lantime-and-microsync-systems-not-at-risk-from-log4j-security-exploit.htm ## Memurai : https://www.memurai.com/blog/apache-log4j2-cve-2021-44228 ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 @@ -469,12 +485,13 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## OpenNMS : https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/ ## OpenMRS TALK : https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341 ## OpenSearch : https://discuss.opendistrocommunity.dev/t/log4j-patch-for-cve-2021-44228/7950 ## OpenText : https://www.opentext.com/support/log4j-remote-code-execution-advisory ## OpenTripPlanner : https://github.com/opentripplanner/OpenTripPlanner/issues/3785 ## OpenVPN : https://forums.openvpn.net/viewtopic.php?f=4&p=103724#p103750 ## OPNsense : https://forum.opnsense.org/index.php?topic=25951.msg125111#msg125111 ## Oracle : https://www.oracle.com/security-alerts/alert-cve-2021-44228.html ## Orgavision : https://www.orgavision.com/neuigkeiten/sicherheitsluecke-java-library-log4j ## OSANO : https://www.osano.com/articles/apache-log4j-vulnerability-update ## OSQUERY : https://twitter.com/osquery/status/1470831336118124549 ## OTRS : https://portal.otrs.com/external ## OVHCloud : https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/ @@ -483,6 +500,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # P ## Palo-Alto Networks : https://security.paloaltonetworks.com/CVE-2021-44228 ## PandoraFMS : https://pandorafms.com/blog/es/cve-2021-44228/ ## Panopto : https://support.panopto.com/s/article/Panopto-Statement-on-the-Log4j2-Zero-Day-Vulnerability ## Pantheon hosting : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996953 ## PaperCut : https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228 @@ -491,6 +509,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## PasswordState : https://www.reddit.com/r/passwordstate/comments/rf7d62/log4j_zeroday_log4shell_vulnerability/ ## Pebblehost : https://help.pebblehost.com/en/article/patching-the-log4j-rce-exploit-14wyvz0/ ## Percona : https://www.percona.com/blog/log4jshell-vulnerability-update/ ## Perforce : https://www.perforce.com/support/log4j ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability ## Pentaho :https://support.pentaho.com/hc/en-us/articles/4416229254541-log4j-2-zero-day-vulnerability-No-impact-to-supported-versions-of-Pentaho- ## Pexip : https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability @@ -509,8 +528,10 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## PortSwigger : https://forum.portswigger.net/thread/are-burp-collaborator-or-burp-enterprise-vulnerable-to-log4j-dc6524e0 ## PostGreSQL : https://www.postgresql.org/about/news/postgresql-jdbc-and-the-log4j-cve-2371/ ## Postman : https://support.postman.com/hc/en-us/articles/4415791933335-Is-Postman-impacted-by-the-Log4j-vulnerability-CVE-2021-44228- ## PowerAdmin : https://www.poweradmin.com/blog/solarwinds-hack-our-safety-measures/ ## Pretix : https://pretix.eu/about/de/blog/20211213-log4j/ ## PrimeKey : https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228 ## ProDVX : https://www.prodvx.com/blog/prodvx-statement-on-the-apache-log4j-security-flaw ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 ## ProSeS : https://www.proses.de/en/2021/12/16/log4shell-cve-2021-44228/ @@ -556,10 +577,12 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## RingCentral : https://www.ringcentral.com/trust-center/security-bulletin.html ## Riverbed : https://supportkb.riverbed.com/support/index?page=content&id=S35645 ## RocketChat : https://github.com/RocketChat/Rocket.Chat/issues/23927 ## Rocket Software : https://community.rocketsoftware.com/forums/forum-home/digestviewer/viewthread?MessageKey=4f7520d4-ebdf-46be-ae93-60ec058d6baa&CommunityKey=dd45d00d-59db-4884-b3eb-2b0647af231b&tab=digestviewer&bm=4f7520d4-ebdf-46be-ae93-60ec058d6baa#bm4f7520d4-ebdf-46be-ae93-60ec058d6baa ## Rockwell Automation : https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605 ## Rollbar : https://rollbar.com/blog/log4j-zero-day-2021-log4shell/ ## Rosetta UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993903 ## Rosette.com : https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability ## Royal HaskoningDHV Digital : https://www.lanner.com/fr-fr/insights/news/royal-haskoningdhv-digital-and-cve-2021-44228-apache-log4j2.html ## Rubrik : https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK ## Ruckus wireless : https://support.ruckuswireless.com/security_bulletins/313 ## Runecast : https://www.runecast.com/blog/runecast-6-0-1-0-covers-apache-log4j-java-vulnerability @@ -616,6 +639,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Snyk : https://updates.snyk.io/snyk%27s-cloud-platform-all-clear-from-log4j-exploits-216499 ## Spigot : https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/ ## Software AG : https://tech.forums.softwareag.com/t/log4j-zero-day-vulnerability/253849 ## Solace : https://solace.community/discussion/1131/solace-issue-notification-sol-61111-cve-2021-44228-cve-2021-45046-apache-log4j-jndi-vulnerability ## SolarWinds : https://www.solarwinds.com/trust-center/security-advisories/cve-2021-44228 ## SonarSource : https://community.sonarsource.com/t/sonarqube-and-the-log4j-vulnerability/54721 ## Sonatype : https://blog.sonatype.com/a-new-0-day-log4j-vulnerability-discovered-in-the-wild @@ -639,8 +663,8 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## SumoLogic : https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12 ## Superna EYEGLASS : https://manuals.supernaeyeglass.com/project-technical-advisories-all-products/HTML/technical-advisories.html#h2__1912345025 ## Suprema Inc : https://www.supremainc.com/en/ ## Surepoint : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3998301 ## SUSE : https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/ ## Sweepwidget : https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032 ## Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 ## Swyx : https://service.swyx.net/hc/de/articles/4412323539474 @@ -657,12 +681,14 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## Tanium : https://community.tanium.com/s/article/How-Tanium-Can-Help-with-CVE-2021-44228-Log4Shell#_Toc90296319 ## Targit : https://github.com/NCSC-NL/log4shell/blob/main/software/vendor-statements/Targit.png ## Tasktop : https://docs.tasktop.com/home/cve-2021-44228-apache-log4j-vulnerability-in-tasktop-products ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## TeamPasswordManager : https://teampasswordmanager.com/blog/log4j-vulnerability/ ## Teamviewer : https://www.teamviewer.com/en/trust-center/security-bulletins/hotfix-log4j2-issue/ ## TechSmith : https://support.techsmith.com/hc/en-us/articles/4416620527885?input_string=log4j ## Tenable : https://www.tenable.com/log4j ## Telestream : http://www.telestream.net/telestream-support/Apache-Log4j2-Bulletin.htm ## TestOut : https://support.testout.com/hc/en-us/articles/4413081889947-Is-TestOut-LabSim-Impacted-by-the-Apache-Log4j-vulnerability-CVE-2021-44228- ## Thales : https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=02863d13db544110f0e3220805961914&sysparm_article=KB0025287 ## Thales (SafeNet) HSM : https://supportportal.thalesgroup.com/csm?id=kb_article_protected&sys_id=12acaed3dbd841105d310573f3961953 ## The Access Group : https://pages.theaccessgroup.com/Response-Log4J-Dec21.html @@ -697,6 +723,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Varnish Software : https://docs.varnish-software.com/security/CVE-2021-44228-45046/ ## Veeam : https://www.veeam.com/kb4254 ## VLC : https://www.videolan.org/news.html#news-2021-12-15 ## Venafi : https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052070 ## Vertica : https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used @@ -705,6 +732,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Vigilant Software (CyberComply : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3997784 ## Viso Trust : https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492 ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## VTScada : https://www.vtscada.com/vtscada-unaffected-by-log4j/ # W ## Wallarm : https://lab.wallarm.com/cve-2021-44228-mitigation-update/ @@ -721,6 +749,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Wodby Cloud : https://twitter.com/wodbycloud/status/1470125735914450950 ## VoiceThread : https://twitter.com/voicethread/status/1470498119540514821 ## WordPress : https://wordpress.org/support/topic/is-the-log4j-vulnerability-an-issue/ ## Workday : https://blog.workday.com/en-us/2021/workday-response-on-log4j.html ## Worksphere : https://www.worksphere.com/product/security-update-on-log4j-cve-2021-44228 ## World Programming WPS analytics : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995649 ## Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve @@ -730,6 +759,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## XCP-ng : https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact ## XenForo : https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/ ## Xerox : https://security.business.xerox.com/wp-content/uploads/2021/12/Xerox-Special-Bulletin-Regarding-CVE-2021-44228.pdf ## Xilinx : https://support.xilinx.com/s/article/76957?language=en_US ## XPertDoc : https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727 ## XPLG : https://www.xplg.com/log4j-vulnerability-exploit-log4shell-xplg-secure/ ## Xray connector plugin : https://github.com/jenkinsci/xray-connector-plugin/issues/53 @@ -754,6 +784,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Zimbra : https://bugzilla.zimbra.com/show_bug.cgi?id=109428 ## ZPE systems Inc : https://support.zpesystems.com/portal/en/kb/articles/is-nodegrid-os-and-zpe-cloud-affected-by-cve-2021-44228-apache-log4j ## Zoom : https://community.zoom.com/t5/Community-Help-Center/Zoom-security-exposure/m-p/28109/highlight/true#M2059 ## ZoomInfo : https://engineering.zoominfo.com/zoominfo-update-on-apache-log4j-vulnerability ## Zowe : https://github.com/zowe/community/issues/1381 ## ZSCALER : https://www.zscaler.fr/blogs/security-research/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021 ## Zyxel : https://www.zyxel.com/support/Zyxel_security_advisory_for_Apache_Log4j_RCE_vulnerability.shtml -
SwitHak revised this gist
Dec 16, 2021 . 1 changed file with 49 additions and 5 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -13,7 +13,9 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # 0-9 ## 1Password : https://1password.community/discussion/comment/622612/#Comment_622612 ## 2n : https://www.2n.com/cs_CZ/novinky/produkty-2n-neohrozuje-zranitelnost-cve-2021-44228-komponenty-log4j-2 ## 3CX : https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/#post-407911 ## 3HMIS : https://support.3mhis.com/app/account/updates/ri/5210 ## 7-Zip : https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/ # A @@ -22,6 +24,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Acquia : https://support.acquia.com/hc/en-us/articles/4415823329047-Apache-log4j-CVE-2021-44228 ## Acronis : https://security-advisory.acronis.com/advisories/SEC-3859 ## ActiveState : https://www.activestate.com/blog/activestate-statement-java-log4j-vulnerability/ ## Adaptec : https://ask.adaptec.com/app/answers/detail/a_id/17523/kw/log4j ## Addigy : https://addigy.com/blog/addigy-and-apaches-log4j2-cve-2021-44228-status/ ## Adeptia : https://support.adeptia.com/hc/en-us/articles/4412815509524-CVE-2021-44228-Log4j2-Vulnerability-Mitigation- ## Adobe ColdFusion : https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html @@ -34,6 +37,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Alexion : https://alexion.nl/blog/alexion-crm-niet-vatbaar-voor-log4shell ## Alcatel : https://dokuwiki.alu4u.com/doku.php?id=log4j ## Alertus : https://help.alertus.com/s/article/Security-Advisory-Log4Shell-Vulnerability?language=en_US ## Alfresco : https://hub.alfresco.com/t5/alfresco-content-services-blog/cve-2021-44228-related-to-apache-log4j-security-advisory/ba-p/310717 ## AlgoSec UNOFICIAl : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3994072 ## AlienVault : https://success.alienvault.com/s/article/are-USM-Anywhere-or-USM-Central-vulnerable-to-CVE-2021-44228 ## Alphatron Medical : https://www.alphatronmedical.com/home.html @@ -43,10 +47,12 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Apigee : https://status.apigee.com/incidents/3cgzb0q2r10p ## Apollo : https://community.apollographql.com/t/log4j-vulnerability/2214 ## Appdynamics : https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability ## Appeon : https://community.appeon.com/index.php/qna/q-a/apache-log4j2-remote-code-execution-vulnerability-cve-2021-44228-and-powerbuilder-infomaker#reply-31358 ## AppGate : https://www.appgate.com/blog/appgate-sdp-unaffected-by-log4j-vulnerability ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Aqua Security : https://docs.google.com/document/d/e/2PACX-1vSmFR3oHPXOih1wENKd7RXn0dsHzgPUe91jJwDTsaVxJtcJEroktWNLq7BMUx9v7oDZRHqLVgkJnqCm/pub ## Arca Noae : https://www.arcanoae.com/apache-log4j-vulnerability-cve-2021-44228/ ## Arduino : https://support.arduino.cc/hc/en-us/articles/4412377144338-Arduino-s-response-to-Log4j2-vulnerability-CVE-2021-44228 ## Ariba : https://connectsupport.ariba.com/sites#announcements-display&/Event/908469 ## Arista : https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070 @@ -95,6 +101,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## BitDefender : https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BitRise : https://blog.bitrise.io/post/bitrises-response-to-log4j-vulnerability-cve-2021-44228 ## BitWarden : https://community.bitwarden.com/t/log4j-log4shell-cve-is-bitwarden-affected-due-to-docker-image/36177/2 ## Black Kite : https://blackkite.com/log4j-rce-vulnerability-log4shell-puts-millions-at-risk/ ## Blancco : https://support.blancco.com/display/NEWS/2021/12/12/CVE-2021-44228+-+Critical+vulnerability+in+Apache+Log4j+library ## Blumira : https://www.blumira.com/cve-2021-44228-log4shell/ @@ -111,7 +118,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Calyptix Security : https://twitter.com/calyptix/status/1470498981147029507 ## Camunda : https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910 ## CarbonBlack : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## CAS genesisWorld : https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446 ## Cato Networks : https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/ ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## Cerebrate : https://twitter.com/cerebrateproje1/status/1470347775141421058 @@ -163,7 +170,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # D ## DarkTrace : https://customerportal.darktrace.com/inside-the-soc/get-article/201 ## Dashlane : https://twitter.com/DashlaneSupport/status/1470933847932030976 ## Dassault Systèmes : https://kb.dsxclient.3ds.com/mashup-ui/page/resultqa?id=QA00000102301e ## Databricks : https://docs.google.com/document/d/e/2PACX-1vREjwZk17BAHGwj5Phizi4DPFS9EIUbAMX-CswlgbFwqwKXNKZC8MrT-L6wUgfIChsSHtvd_QD3-659/pub ## DataDog : https://www.datadoghq.com/log4j-vulnerability/ ## Dataminer : https://community.dataminer.services/responding-to-log4shell-vulnerability/ @@ -175,8 +182,10 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Deepinstinct : https://www.deepinstinct.com/blog/log4shell-cve-2021-44228-what-you-need-to-know ## Dell : https://www.dell.com/support/kbdoc/en-us/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## DELL : https://www.dell.com/support/kbdoc/en-us/000194416/additional-information-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 ## Denequa : https://denequa.de/log4j-information.html ## Device42 : https://blog.device42.com/2021/12/13/log4j-zero-day/ ## Devolutions : https://blog.devolutions.net/2021/12/critical-vulnerability-in-log4j/ ## Diebold Nixdorf : https://www.dieboldnixdorf.com/en-us/apache ## Digicert : https://knowledge.digicert.com/alerts/digicert-log4j-response.html ## Digital AI : https://support.digital.ai/hc/en-us/articles/4412377686674-Log4J-Vulnerability-to-Zero-Day-Exploit-and-Digital-ai#overview-0-1 ## DNSFilter : https://www.dnsfilter.com/blog/dnsfilter-response-to-log4j-vulnerability @@ -189,12 +198,15 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 # E ## EasyRedmine : https://www.easyredmine.com/news/easy-redmine-application-is-not-affected-by-the-vulnerability-cve-2021-44228 ## EclecticIQ : https://docs.eclecticiq.com/security-advisories/security-issues-and-mitigation-actions/eiq-2021-0016-2 ## Eclipse Foundation : https://wiki.eclipse.org/Eclipse_and_log4j2_vulnerability_(CVE-2021-44228) ## EFI : https://communities.efi.com/s/article/Are-Fiery-Servers-vulnerable-to-CVE-2021-44228-Apache-Log4j2?language=en_US ## EGroupware : https://help.egroupware.org/t/uk-de-statement-log4j-log4shell/76430 ## EHRBase : https://github.com/ehrbase/ehrbase/issues/700 ## Elastic : https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## Ellucian (Banner and Colleague Higher Education SIS) : https://www.ellucian.com/news/ellucian-response-apache-log4j-issue ## Emerson : https://www.emerson.com/documents/automation/emerson-cyber-security-notification-en-7881618.pdf ## EnterpriseDT : https://enterprisedt.com/blogs/announcements/enterprisedt-does-not-use-log4j/ ## EPICOR : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996932 ## ESET : https://support.eset.com/en/alert8188-information-regarding-the-log4j2-vulnerability @@ -250,6 +262,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Google Cloud Armor WAF : https://cloud.google.com/blog/products/identity-security/cloud-armor-waf-rule-to-help-address-apache-log4j-vulnerability ## Gradle : https://blog.gradle.org/log4j-vulnerability ## Grafana : https://grafana.com/blog/2021/12/14/grafana-labs-core-products-not-impacted-by-log4j-cve-2021-44228-and-related-vulnerabilities/ ## Grandstream : https://blog.grandstream.com/press-releases/grandstream-products-unaffected-by-log4j-vulnerability?hsLang=en ## GratWiFi WARNING I can't confirm it: https://www.facebook.com/GratWiFi/posts/396447615600785 ## Gravitee.io : https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability ## Gravwell : https://www.gravwell.io/blog/cve-2021-44228-log4j-does-not-impact-gravwell-products @@ -281,6 +294,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 ## I-Net software : https://faq.inetsoftware.de/t/statement-about-cve-2021-44228-log4j-vulnerability-concerning-i-net-software-products/269/3 ## IBA-AG : https://www.iba-ag.com/en/security ## Ibexa : https://developers.ibexa.co/security-advisories/cve-2021-44228-log4j-vulnerability ## IBM : https://www.ibm.com/support/pages/node/6525548 ## IFS : https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436 ## IGEL : https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html @@ -326,6 +340,8 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Jitsi : https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md ## JPOS : https://github.com/jpos/jPOS/commit/d615199a1bdd35c35d63c07c10fd0bdbbc96f625 ## JobRouter : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995497 ## Journyx : https://community.journyx.com/support/solutions/articles/9000209044-apache-log4j-2-vulnerability-cve-2021-44228- ## Jump Desktop : https://support.jumpdesktop.com/hc/en-us/articles/4416720395021-Log4j-CVE-2021-44228-CVE-2021-45046-Statement ## Juniper Networks : https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259 ## Justice Systems : https://www.justicesystems.com/services/support/ @@ -339,11 +355,12 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## KEMP : https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit ## KEMP 2 : https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228- ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 ## KiteWorks : https://www.kiteworks.com/kiteworks-news/log4shell-apache-vulnerability-what-kiteworks-customers-need-to-know/ ## Kofax : https://knowledge.kofax.com/MFD_Productivity/SafeCom/Product_Information/SafeCom_and_Log4j_vulnerability_(CVE-2021-44228) ## Komoot Photon : https://github.com/komoot/photon/issues/620 ## Konica Minolta : https://www.konicaminolta.de/de-de/support/log4j ## Kronos UKG : https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US ## Kyberna : https://www.kyberna.com/detail/log4j-sicherheitsluecke # L ## L3Harris Geospatial : https://www.l3harrisgeospatial.com/Support/Self-Help-Tools/Help-Articles/Help-Articles-Detail/ArtMID/10220/ArticleID/24141/Impact-of-Log4j-Java-Security-Vulnerability-CVE-2021-44228-on-L3Harris-Geospatial-software @@ -361,17 +378,20 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## LibreNMS : https://community.librenms.org/t/is-librenms-affected-by-vulnerable-to-cve-2021-25218-cve-2021-44228/17675/6 ## LifeRay : https://liferay.dev/blogs/-/blogs/log4j2-zero-day-vulnerability ## LifeSize : https://community.lifesize.com/s/article/Apache-Log4j2-CVE-2021-44228 ## Lightbend : https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 ## Lime CRM : https://docs.lime-crm.com/security/lcsec21-01 ## LIONGARD : https://insights.liongard.com/faq-apache-log4j-vulnerability ## LiquidFiles : https://mailchi.mp/liquidfiles/liquidfiles-log4j?e=%5BUNIQID%5D ## LiveAction : https://documentation.liveaction.com/LiveNX/LiveNX%2021.5.1%20Release%20Notes/Release%20Notes%20LiveNX%2021.5.1.1.3 ## Loftware : https://help.loftware.com/lps-kb/content/log4j%20cve-2021-44228.htm?Highlight=CVE-2021-44228 ## LogiAnalytics : https://devnet.logianalytics.com/hc/en-us/articles/4415781801751-Statement-on-Log4j-Vulnerability-CVE-2021-44228- ## LogicMonitor : https://www.logicmonitor.com/support/log4shell-security-vulnerability-cve-2021-44228 ## LogMeIn : https://community.logmein.com/t5/LogMeIn-Central-Discussions/LOG4J-Vulnerability/m-p/280317/highlight/true#M8327 ## LogRhythm : https://community.logrhythm.com/t5/Product-Security/LogRhythm-Response-to-the-Apache-Log4J-Vulnerability-Log4Shell/td-p/494068 ## Looker : https://docs.google.com/document/d/e/2PACX-1vQGN1AYNMHxsRQ9AZNu1bKyTGRUSK_9xkQBge-nu4p8PYvBKIYHhc3914KTfVtDFIXtDhc3k6SZnR2M/pub ## LucaNet : https://www.lucanet.com/en/blog/update-vulnerability-log4j ## Lucee : https://dev.lucee.org/t/lucee-is-not-affected-by-the-log4j-jndi-exploit-cve-2021-44228/9331/4 # M ## Macchina io : https://twitter.com/macchina_io/status/1469611606569099269 @@ -426,9 +446,12 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## NextGen Healthcare Mirth : https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 ## Nexus Group : https://doc.nexusgroup.com/pages/viewpage.action?pageId=83133294 ## Newrelic : https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-03/ ## Nice Software (AWS) EnginFRAME : https://download.enginframe.com/ ## NinjaRMM : https://ninjarmm.zendesk.com/hc/en-us/articles/4416226194189-12-10-21-Security-Declaration-NinjaOne-not-affected-by-CVE-2021-44228-log4j- ## Nomachine : https://forums.nomachine.com/topic/apache-log4j-notification ## NoviFlow : https://noviflow.com/noviflow-products-and-the-log4shell-exploit-cve-2021-44228/ ## NI (National Instruments) : https://www.ni.com/en-us/support/documentation/supplemental/21/ni-response-to-apache-log4j-vulnerability-.html ## Nulab : https://nulab.com/blog/company-news/log4shell/ ## Nutanix : https://download.nutanix.com/alerts/Security_Advisory_0023.pdf ## Nvidia : https://nvidia.custhelp.com/app/answers/detail/a_id/5294 ## NXLog : https://nxlog.co/news/apache-log4j-vulnerability-cve-2021-44228 @@ -476,7 +499,9 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## PiHole : https://www.reddit.com/r/pihole/comments/re225u/does_pihole_use_log4j/ ## PingIdentity : https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228 ## Pitney Bowes : https://www.pitneybowes.com/us/support/apache-log4j-vulnerability.html ## Planmeca : https://www.planmeca.com/apache-log4j-vulnerability-in-planmeca-products/ ## Planon Software : https://my.planonsoftware.com/uk/news/log4j-impact-on-planon/ ## Platform.SH : https://platform.sh/blog/2021/platformsh-protects-from-apache-log4j/ ## Plesk : https://support.plesk.com/hc/en-us/articles/4412182812818-CVE-2021-44228-vulnerability-in-log4j-package-of-Apache ## Polycom : https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf ## Portainer : https://www.portainer.io/blog/portainer-statement-re-log4j-cve-2021-44228 @@ -488,6 +513,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## PrimeKey : https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228 ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 ## ProSeS : https://www.proses.de/en/2021/12/16/log4shell-cve-2021-44228/ ## Prosys : https://prosysopc.com/news/important-security-release/ ## ProtonMail : https://twitter.com/ProtonMail/status/1470377648492797953 ## Proxmox : https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880 @@ -503,12 +529,15 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # Q ## QF-Test : https://www.qfs.de/en/blog/article/no-log4j-vulnerability-in-qf-test.html ## Qlik : https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368 ## QMATIC : https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability ## QNAP : https://www.qnap.com/en-uk/security-advisory/qsa-21-58 ## QOPPA : https://kbdeveloper.qoppa.com/cve-2021-44228-apache-log4j-vulnerability/ ## QSC Q-SYS : https://qscprod.force.com/selfhelpportal/s/article/Are-Q-SYS-products-affected-by-the-Log4j-vulnerability-CVE-2021-44228 ## QT : https://www.qt.io/blog/the-qt-company-products-not-affected-by-cve-2021-44228-log4j-vulnerability ## Quest Global : https://support.quest.com/fr-fr/search#q=CVE-2021-44228&t=Global # R ## R2ediviewer : https://r2ediviewer.de/DE/reload.html?Change-log_17858584.html ## Radfak : https://www.radfak.de/ankuendigungen-news/130-radfak-und-log4j-cve-2021-44228-sicherheitsluecke.html ## Radware : https://support.radware.com/app/answers/answer_view/a_id/1029752 ## Rapid7 : https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/ @@ -564,6 +593,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Security Onion : https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html ## Seeburger : https://servicedesk.seeburger.de/portal/en-US/Knowledge/Article/?defId=101040&id=25486312&COMMAND=Open ## SentinelOne : https://www.sentinelone.com/blog/cve-2021-44228-staying-secure-apache-log4j-vulnerability/ ## Sentry : https://blog.sentry.io/2021/12/15/sentrys-response-to-log4j-vulnerability-cve-2021-44228 ## SEP : https://support.sep.de/otrs/public.pl?Action=PublicFAQZoom;ItemID=132 ## Server Eye : https://www.server-eye.de/blog/sicherheitsluecke-log4j-server-eye-systeme-sind-nicht-betroffen/ ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 @@ -572,6 +602,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Shopify : https://community.shopify.com/c/technical-q-a/is-shopify-affected-by-the-log4j-vulnerability/td-p/1417625 ## Siebel : https://www.siebelhub.com/main/2021/12/log4j-vulnerability-cve-2021-44228-and-siebel-crm.html ## Siemens : https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf ## Sierra Wireless : https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2021-007/ ## Signald : https://gitlab.com/signald/signald/-/issues/259 ## SingleWire : https://support.singlewire.com/s/article/Apache-Log4j2-vulnerability-CVE-2021-44228 ## Sitecore : https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391 @@ -580,6 +611,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## SLF4J : http://slf4j.org/log4shell.html ## SmartBear : https://smartbear.com/security/cve-2021-44228/ ## SmileCDR : https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228 ## Sn0m : https://www.snom.com/en/press/log4j-poses-no-threat-snom-phones/ ## Snowflake : https://community.snowflake.com/s/article/No-Snowflake-exposure-to-Apache-Log4j-vulnerability-CVE-2021-44228 ## Snyk : https://updates.snyk.io/snyk%27s-cloud-platform-all-clear-from-log4j-exploits-216499 ## Spigot : https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/ @@ -598,9 +630,11 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## StarDog : https://community.stardog.com/t/stardog-7-8-1-available/3411 ## Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 ## Storagement : https://www.storagement.de/index.php?action=topicofthemonth&site=log4j ## StormShield : https://www.stormshield.com/news/log4shell-security-alert-stormshield-product-response/ ## StrangeBee TheHive & Cortex : https://blog.strangebee.com/apache-log4j-cve-2021-44228/ ## Stratodesk : http://cdn.stratodesk.com/repository/notouch-center/10/4.5.231/0/ReleaseNotes-Stratodesk-NoTouch_Center-4.5.231.html ## Strimzi : https://strimzi.io/blog/2021/12/14/strimzi-and-log4shell/ ## Stripe : https://support.stripe.com/questions/update-for-apache-log4j-vulnerability-(cve-2021-44228) ## Styra : https://blog.styra.com/blog/newest-log4j-security-vulnerability-cve-2021-44228-log4shell ## SumoLogic : https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12 ## Superna EYEGLASS : https://manuals.supernaeyeglass.com/project-technical-advisories-all-products/HTML/technical-advisories.html#h2__1912345025 @@ -619,21 +653,25 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Sysdig : https://sysdig.com/blog/cve-critical-vulnerability-log4j/ # T ## Tableau server (Now a Salesforce company!): https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## Tanium : https://community.tanium.com/s/article/How-Tanium-Can-Help-with-CVE-2021-44228-Log4Shell#_Toc90296319 ## Targit : https://github.com/NCSC-NL/log4shell/blob/main/software/vendor-statements/Targit.png ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## TeamPasswordManager : https://teampasswordmanager.com/blog/log4j-vulnerability/ ## Teamviewer : https://www.teamviewer.com/en/trust-center/security-bulletins/hotfix-log4j2-issue/ ## TechSmith : https://support.techsmith.com/hc/en-us/articles/4416620527885?input_string=log4j ## Tenable : https://www.tenable.com/log4j ## Telestream : http://www.telestream.net/telestream-support/Apache-Log4j2-Bulletin.htm ## Thales : https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=02863d13db544110f0e3220805961914&sysparm_article=KB0025287 ## Thales (SafeNet) HSM : https://supportportal.thalesgroup.com/csm?id=kb_article_protected&sys_id=12acaed3dbd841105d310573f3961953 ## The Access Group : https://pages.theaccessgroup.com/Response-Log4J-Dec21.html ## ThreatLocker : https://threatlocker.kb.help/log4j-vulnerability/ ## Threema UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## ThycoticCentrify : https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md ## Tibco : https://www.tibco.com/support/notices/2021/12/apache-log4j-vulnerability-update ## TopDesk : https://my.topdesk.com/tas/public/ssp/content/detail/knowledgeitem?unid=74952771dfab4b0794292e63b0409314 ## Top Gun Technology (TGT) : https://www.topgun-tech.com/technical-bulletin-apache-software-log4j-security-vulnerability-cve-2021-44228/ ## Topicus KeyHub : https://blog.topicus-keyhub.com/topicus-keyhub-is-not-vulnerable-to-cve-2021-44228/ ## Topix : https://www.topix.de/de/technik/systemfreigaben.html ## Tosibox : https://helpdesk.tosibox.com/support/solutions/articles/2100050946-security-advisory-on-vulnerability-in-apache-log4j-library-cve-2021-44228 @@ -642,6 +680,8 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Tricentis Tosca : https://support-hub.tricentis.com/open?number=NEW0001148&id=post ## Tripwire : https://www.tripwire.com/log4j ## TrueNAS : https://www.truenas.com/community/threads/log4j-vulnerability.97359/post-672559 ## Tufin : https://portal.tufin.com/articles/SecurityAdvisories/Apache-Log4Shell-Vulnerability-12-12-2021 ## TYPO3 : https://typo3.org/article/typo3-psa-2021-004 # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 @@ -655,12 +695,14 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # V ## VArmour : https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Varnish Software : https://docs.varnish-software.com/security/CVE-2021-44228-45046/ ## Veeam : https://www.veeam.com/kb4254 ## Venafi : https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052070 ## Vertica : https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used ## Vertiv : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996968 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## Vigilant Software (CyberComply : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3997784 ## Viso Trust : https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492 ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html @@ -678,8 +720,9 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## WitFoo : https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ ## Wodby Cloud : https://twitter.com/wodbycloud/status/1470125735914450950 ## VoiceThread : https://twitter.com/voicethread/status/1470498119540514821 ## WordPress : https://wordpress.org/support/topic/is-the-log4j-vulnerability-an-issue/ ## Worksphere : https://www.worksphere.com/product/security-update-on-log4j-cve-2021-44228 ## World Programming WPS analytics : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995649 ## Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve ## WSO2 : https://github.com/wso2/security-tools/pull/169 @@ -688,6 +731,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## XenForo : https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/ ## Xerox : https://security.business.xerox.com/wp-content/uploads/2021/12/Xerox-Special-Bulletin-Regarding-CVE-2021-44228.pdf ## XPertDoc : https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727 ## XPLG : https://www.xplg.com/log4j-vulnerability-exploit-log4shell-xplg-secure/ ## Xray connector plugin : https://github.com/jenkinsci/xray-connector-plugin/issues/53 ## XWIKI : https://forum.xwiki.org/t/log4j-cve-2021-44228-log4shell-zero-day-vulnerability/9557 -
SwitHak revised this gist
Dec 16, 2021 . 1 changed file with 221 additions and 31 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -5,41 +5,40 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 - Feel free to report any mistake directly below in the comment or in DM on Twitter [@SwitHak](https://twitter.com/SwitHak) # Other great resources - Royce Williams list sorted by vendors responses [Royce List](https://www.techsolvency.com/story-so-far/cve-2021-44228-log4j-log4shell/) - Very detailed list [NCSC-NL](https://github.com/NCSC-NL/log4shell/blob/main/software/README.md#software-overview) - The list maintained by U.S. Cybersecurity and Infrastructure Security Agency: [CISA List](https://github.com/cisagov/log4j-affected-db) [A](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#a) **[B](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#b)** [C](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#c) [D](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#d) [E](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#e) [F](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#f) [G](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#g) [H](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#h) [I](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#i) [J](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#j) [K](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#k) [L](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#l) [M](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#m) [N](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#n) [O](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#o) [P](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#p) [Q](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#q) [R](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#r) [S](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#s) [T](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#t) [U](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#u) [V](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#v) [W](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#w) [X](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#x) [Y](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#y) [Z](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#z) # 0-9 ## 1Password : https://1password.community/discussion/comment/622612/#Comment_622612 ## 3CX : https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/#post-407911 ## 7-Zip : https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/ # A ## ABB : https://search.abb.com/library/Download.aspx?DocumentID=9ADB012621&LanguageCode=en&DocumentPartId=&Action=Launch ## Accellence : https://www.accellence.de/en/articles/national-vulnerability-database-62 ## Acquia : https://support.acquia.com/hc/en-us/articles/4415823329047-Apache-log4j-CVE-2021-44228 ## Acronis : https://security-advisory.acronis.com/advisories/SEC-3859 ## ActiveState : https://www.activestate.com/blog/activestate-statement-java-log4j-vulnerability/ ## Addigy : https://addigy.com/blog/addigy-and-apaches-log4j2-cve-2021-44228-status/ ## Adeptia : https://support.adeptia.com/hc/en-us/articles/4412815509524-CVE-2021-44228-Log4j2-Vulnerability-Mitigation- ## Adobe ColdFusion : https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html ## ADP : https://www.adp.com/about-adp/data-security/alerts/adp-vulnerability-statement-apache-log4j-vulnerability-cve-2021-44228.aspx ## Adva : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996900 ## AFAS Software : https://help.afas.nl/vraagantwoord/NL/SE/120439.htm ## Agenda : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995221 ## Agilysys : https://info.agilysys.com/webmail/76642/2001127877/c3fda575e2313fac1f6a203dc6fc1db2439c3db0da22bde1b6c1b6747d7f0e2f ## Akamai : https://www.akamai.com/blog/news/CVE-2021-44228-Zero-Day-Vulnerability ## Alexion : https://alexion.nl/blog/alexion-crm-niet-vatbaar-voor-log4shell ## Alcatel : https://dokuwiki.alu4u.com/doku.php?id=log4j ## Alertus : https://help.alertus.com/s/article/Security-Advisory-Log4Shell-Vulnerability?language=en_US ## AlgoSec UNOFICIAl : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3994072 ## AlienVault : https://success.alienvault.com/s/article/are-USM-Anywhere-or-USM-Central-vulnerable-to-CVE-2021-44228 ## Alphatron Medical : https://www.alphatronmedical.com/home.html ## Altaro : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995170 ## APACHE Global : https://blogs.apache.org/security/entry/cve-2021-44228 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## Apigee : https://status.apigee.com/incidents/3cgzb0q2r10p ## Apollo : https://community.apollographql.com/t/log4j-vulnerability/2214 @@ -52,39 +51,58 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Ariba : https://connectsupport.ariba.com/sites#announcements-display&/Event/908469 ## Arista : https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070 ## ArrayNetworks : https://twitter.com/ArraySupport/status/1470141638571745282 ## ArcServe : https://twitter.com/Arcserve/status/1470571214263361537 ## ArcticWolf : https://arcticwolf.com/resources/blog/log4j ## Aruba Networks: https://asp.arubanetworks.com/notifications/Tm90aWZpY2F0aW9uOjEwMTQ0;notificationCategory=Security ## Ataccama : https://www.ataccama.com/files/log4j2-vulnerability-cve-2021-44228-fix.pdf ## Atera : https://www.reddit.com/r/atera/comments/rh7xb1/apache_log4j_2_security_advisory_update/ ## Attivo networks : https://www.attivonetworks.com/wp-content/uploads/2021/12/Log4j_Vulnerability-Advisory-211213-4.pdf ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html ## AudioCodes : https://services.audiocodes.com/app/answers/kbdetail/a_id/2225 ## Autopsy : https://www.autopsy.com/autopsy-and-log4j-vulnerability/ ## Auth0 : https://twitter.com/auth0/status/1470086301902721024 ## Autodesk : https://knowledge.autodesk.com/support/autocad/troubleshooting/caas/sfdcarticles/sfdcarticles/CVE-2021-44228.html ## Automox : https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 ## Auvik : https://status.auvik.com/incidents/58bfngkz69mj ## Avantra SYSLINK : https://support.avantra.com/support/solutions/articles/44002291388-cve-2021-44228-log4j-2-vulnerability ## Avaya : https://support.avaya.com/helpcenter/getGenericDetails?detailId=1399839287609 ## AVEPOINT : https://www.avepoint.com/company/java-zero-day-vulnerability-notification ## AVM : https://avm.de/service/aktuelle-sicherheitshinweise/#Schwachstelle%20im%20Java-Projekt%20%E2%80%9Elog4j%E2%80%9C ## AvTech RoomAlert : https://avtech.com/articles/23124/java-exploit-room-alert-link/ ## AWS New : https://aws.amazon.com/security/security-bulletins/AWS-2021-006/ ## AWS OLD: https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ ## AXS Guard : https://www.axsguard.com/en_US/blog/security-news-4/log4j-vulnerability-77 ## Axways Applications : https://support.axway.com/news/1331/lang/en ## AXON : https://my.axon.com/s/trust/response-to-log4j2-vuln?language=en_US ## AxxonSoft : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996387 ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 # B ## BackBox : https://updates.backbox.com/V6.5/Docs/CVE-2021-44228.pdf ## BACKBLAZE : https://twitter.com/backblaze/status/1469477224277368838 ## Balbix : https://www.balbix.com/blog/broad-exposure-to-log4shell-cve-2021-44228-highlights-how-the-attack-surface-has-exploded/ ## Baramundi Products : https://forum.baramundi.com/index.php?threads/baramundi-produkte-von-log4shell-schwachstelle-in-log4j-nicht-betroffen.12539/#post-62875 ## Barco : https://www.barco.com/en/support/knowledge-base/kb12495 ## Barracuda : https://www.barracuda.com/company/legal/trust-center ## BBraun : https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory/b-braun-statement-on-Apache_Log4j.html ## BD : https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j ## BEC Legal Systems : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995524 ## Bender : https://www.bender.de/en/cert ## Best Practical Request Tracker (RT) and Request Tracker for Incident Response (RTIR) : https://bestpractical.com/blog/2021/12/request-tracker-rt-and-request-tracker-for-incident-response-rtir-do-not-use-log4j ## BeyondTrust Bomgar : https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542 ## BigBlueButton : https://github.com/bigbluebutton/bigbluebutton/issues/13897#issuecomment-991652632 ## BisectHosting : https://www.bisecthosting.com/clients/index.php?rp=/knowledgebase/205/Java-Log4j-Vulnerability.html ## BitDefender : https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BitRise : https://blog.bitrise.io/post/bitrises-response-to-log4j-vulnerability-cve-2021-44228 ## Black Kite : https://blackkite.com/log4j-rce-vulnerability-log4shell-puts-millions-at-risk/ ## Blancco : https://support.blancco.com/display/NEWS/2021/12/12/CVE-2021-44228+-+Critical+vulnerability+in+Apache+Log4j+library ## Blumira : https://www.blumira.com/cve-2021-44228-log4shell/ ## BMC Software : https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability ## Boomi DELL : https://community.boomi.com/s/article/Log4j-Vulnerability ## Box : https://blog.box.com/boxs-statement-recent-log4j-vulnerability-cve-2021-44228 ## Brainworks : https://www.brainworks.de/log4j-exploit-kerio-connect-workaround/ ## BrightSign : https://brightsign.atlassian.net/wiki/spaces/DOC/pages/370679198/Security+Statement+Log4J+Meltdown+and+Spectre+Vulnerabilities#SecurityStatement%3ALog4J%2CMeltdownandSpectreVulnerabilities-JavaApacheLog4j ## Broadcom : https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 ## Broadcom Automic Automation : https://knowledge.broadcom.com/external/article?articleId=230308 @@ -94,69 +112,103 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Camunda : https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910 ## CarbonBlack : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## CAS GenesysWorld : https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446 ## Cato Networks : https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/ ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## Cerebrate : https://twitter.com/cerebrateproje1/status/1470347775141421058 ## Cerebro : https://github.com/lmenezes/cerebro/blob/main/conf/logback.xml#L5 ## CGM CompuGroup Medical SE & Co. KGaA Germany - Software Z1 : https://twitter.com/CGMeHealth/status/1470649804019675137 ## ChaserSystems : https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected ## Checkmarx plugin : https://github.com/jenkinsci/checkmarx-plugin/pull/83 ## CheckMK : https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3 ## CheckPoint : https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176865 ## Ciphermail : https://www.ciphermail.com/blog/ciphermail-gateway-and-webmail-messenger-are-not-vulnerable-to-cve-2021-44228.html ## CIS : https://cisecurity.atlassian.net/servicedesk/customer/portal/15/article/2434301961 ## Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd ## Citrix : https://support.citrix.com/article/CTX335705 ## Claris : https://support.claris.com/s/article/CVE-2021-44228-Apache-Log4j-Vulnerability-and-Claris-products?language=en_US ## Cloudera : https://my.cloudera.com/knowledge/TSB-2021-545-Critical-vulnerability-in-log4j2-CVE-2021-44228?id=332019 ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## Cloudian HyperStore : https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228 ## Cloudogu : https://community.cloudogu.com/t/security-vulnerability-log4shell-cve-2021-44228/417 ## Cloudron : https://forum.cloudron.io/topic/6153/log4j-and-log4j2-library-vulnerability?lang=en-US ## Clover : https://community.clover.com/articles/35868/apache-log4j-vulnerability-cve-2021-44228.html ## CPanel : https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ ## Code42 : https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_response_to_industry_security_incidents ## CodeBeamer : https://codebeamer.com/cb/wiki/19872365 ## Codesys : https://www.codesys.com/news-events/news/article/log4j-not-used-in-codesys.html ## CodeTwo : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995424 ## Cohesity : https://support.cohesity.com/s/article/Security-Advisory-Apache-Log4j-Remote-Code-Execution-RCE-CVE-2021-44228 ## CommVault : https://documentation.commvault.com/v11/essential/146231_security_vulnerability_and_reporting.html ## Comrex : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996774 ## ConcreteCMS.com : https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit ## Confluent : https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability ## Connect2id : https://connect2id.com/blog/connect2id-server-12-5-1 ## ConnectWise : https://www.connectwise.com/company/trust/advisories ## ContrastSecurity : https://support.contrastsecurity.com/hc/en-us/articles/4412612486548 ## ControlUp : https://status.controlup.com/incidents/qqyvh7b1dz8k ## COPADATA : https://www.copadata.com/en/support-services/knowledge-base-faq/pare-products-in-the-zenon-product-family-affect-4921/ ## Coralogix : https://twitter.com/Coralogix/status/1469713430659559425 ## CouchBase : https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402 ## Cradlepoint : https://cradlepoint.com/vulnerability-alerts/cve-2021-44228-apache-log4j-security-vulnerabilities/ ## Crate CrateDB : https://github.com/crate/crate/pull/11968#issuecomment-994577174 ## Crestron : https://www.crestron.com/Security/Security_Advisories/Apache-Log4j ## CrushFTP : https://www.crushftp.com/download.html ## CryptShare : https://www.cryptshare.com/en/support/cryptshare-support/#c67572 ## Cumul.io https://status.cumul.io/#incidents ## CURL libcurl : https://twitter.com/bagder/status/1470879113116360706 ## CyberArk : https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228 ## Cybereason : https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228 ## CyberRes : https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228 # D ## DarkTrace : https://customerportal.darktrace.com/inside-the-soc/get-article/201 ## Dashlane : https://twitter.com/DashlaneSupport/status/1470933847932030976 ## Dassault : https://kb.dsxclient.3ds.com/mashup-ui/page/resultqa?id=QA00000102301e ## Databricks : https://docs.google.com/document/d/e/2PACX-1vREjwZk17BAHGwj5Phizi4DPFS9EIUbAMX-CswlgbFwqwKXNKZC8MrT-L6wUgfIChsSHtvd_QD3-659/pub ## DataDog : https://www.datadoghq.com/log4j-vulnerability/ ## Dataminer : https://community.dataminer.services/responding-to-log4shell-vulnerability/ ## Datev : https://www.datev-community.de/t5/Freie-Themen/Log4-J-Schwachstelle/m-p/258185/highlight/true#M14308 ## Datto : https://www.datto.com/blog/dattos-response-to-log4shell ## dCache.org : https://www.dcache.org/post/log4j-vulnerability/ ## DCM4CHE.org : https://github.com/dcm4che/dcm4che/issues/1050 ## Debian : https://security-tracker.debian.org/tracker/CVE-2021-44228 ## Deepinstinct : https://www.deepinstinct.com/blog/log4shell-cve-2021-44228-what-you-need-to-know ## Dell : https://www.dell.com/support/kbdoc/en-us/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## DELL : https://www.dell.com/support/kbdoc/en-us/000194416/additional-information-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 ## Device42 : https://blog.device42.com/2021/12/13/log4j-zero-day/ ## Devolutions : https://blog.devolutions.net/2021/12/critical-vulnerability-in-log4j/ ## Digicert : https://knowledge.digicert.com/alerts/digicert-log4j-response.html ## Digital AI : https://support.digital.ai/hc/en-us/articles/4412377686674-Log4J-Vulnerability-to-Zero-Day-Exploit-and-Digital-ai#overview-0-1 ## DNSFilter : https://www.dnsfilter.com/blog/dnsfilter-response-to-log4j-vulnerability ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ ## Docusign : https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability ## DRAW.IO : https://twitter.com/drawio/status/1470061320066277382 ## DrayTek : https://www.draytek.co.uk/support/security-advisories/kb-advisory-dec2021-log4j ## DropWizard : https://twitter.com/dropwizardio/status/1469285337524580359 ## DSpace :https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 # E ## EclecticIQ : https://docs.eclecticiq.com/security-advisories/security-issues-and-mitigation-actions/eiq-2021-0016-2 ## Eclipse Foundation : https://wiki.eclipse.org/Eclipse_and_log4j2_vulnerability_(CVE-2021-44228) ## EFI : https://communities.efi.com/s/article/Are-Fiery-Servers-vulnerable-to-CVE-2021-44228-Apache-Log4j2?language=en_US ## EGroupware : https://help.egroupware.org/t/uk-de-statement-log4j-log4shell/76430 ## EHRBase : https://github.com/ehrbase/ehrbase/issues/700 ## Elastic : https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## EnterpriseDT : https://enterprisedt.com/blogs/announcements/enterprisedt-does-not-use-log4j/ ## EPICOR : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996932 ## ESET : https://support.eset.com/en/alert8188-information-regarding-the-log4j2-vulnerability ## ESRI : https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/ ## Estos : https://support.estos.de/de/sicherheitshinweise/estos-von-kritischer-schwachstelle-in-log4j-cve-2021-44228-nicht-betroffen ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 ## Evolveum Midpoint : https://evolveum.com/midpoint-not-vulnerable-to-log4shell/ ## Ewon : https://hmsnetworks.blob.core.windows.net/www/docs/librariesprovider10/downloads-monitored/manuals/release-notes/ecatcher_releasenotes.txt?sfvrsn=4f054ad7_42 ## Exabeam : https://community.exabeam.com/s/discussions?t=1639379479381 ## Exact : https://www.exact.com/news/general-statement-apache-leak ## Exivity : https://docs.exivity.com/getting-started/releases/announcements#announcement-regarding-cve-2021-44228 ## eXtreme Hosting : https://extremehosting.nl/log4shell-log4j/ ## Extreme Networks : https://extremeportal.force.com/ExtrArticleDetail?an=000100806 ## Extron : https://www.extron.com/featured/Security-at-Extron/extron-security # F ## F5 Networks : https://support.f5.com/csp/article/K19026212 @@ -165,7 +217,12 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## FAST LTA : https://blog.fast-lta.de/en/log4j2-vulnerability ## FedEx : https://www.fedex.com/en-us/service-alerts.html#weatherassess ## FileCatalyst : https://support.filecatalyst.com/index.php/Knowledgebase/Article/View/advisory-log4j-zero-day-security-vulnerability ## FileCap : https://mailchi.mp/3f82266e0717/filecap-update-version-511 ## FileCloud : https://www.getfilecloud.com/supportdocs/display/cloud/Advisory+2021-12-2+Impact+of+Apache+Log4j2+Vulnerability+on+FileCloud+Customers ## FileWave : https://kb.filewave.com/display/KB/Security+Notice:+Apache+log4j+Vulnerability+CVE-2021-44228 ## FINVI : https://finvi.com/support/ ## FireDaemon : https://kb.firedaemon.com/support/solutions/articles/4000178630 ## Flexagon : https://flexagon.com/what-is-the-impact-of-log4j-vulnerability-cve-2021-44228-on-flexdeploy/ ## Flexera : https://community.flexera.com/t5/Community-Notices/Flexera-s-response-to-Apache-Log4j-2-remote-code-execution/ba-p/216934 ## FlyWheel : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995147 ## ForcePoint : https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-Forcepoint-Security-Manager @@ -179,18 +236,23 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # G ## Gearset : https://docs.gearset.com/en/articles/5806813-gearset-log4j-statement-dec-2021 ## Genesys : https://www.genesys.com/blog/post/genesys-update-on-the-apache-log4j-vulnerability ## GeoServer : http://geoserver.org/announcements/2021/12/13/logj4-rce-statement.html ## Gerrit code review : https://www.gerritcodereview.com/2021-12-13-log4j-statement.html ## GFI : https://techtalk.gfi.com/impact-of-log4j-vulnerability-on-gfi/ ## Ghidra : https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning ## GitHub : https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ## GitHub Response : https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/ ## GitLab : https://forum.gitlab.com/t/cve-2021-4428/62763 ## Globus : https://groups.google.com/a/globus.org/g/discuss/c/FJK0q0NoUC4 ## GoAnywhere : https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps ## GoCD : https://www.gocd.org/2021/12/14/log4j-vulnerability.html ## Google Cloud Global Products coverage : https://cloud.google.com/log4j2-security-advisory ## Google Cloud Armor WAF : https://cloud.google.com/blog/products/identity-security/cloud-armor-waf-rule-to-help-address-apache-log4j-vulnerability ## Gradle : https://blog.gradle.org/log4j-vulnerability ## Grafana : https://grafana.com/blog/2021/12/14/grafana-labs-core-products-not-impacted-by-log4j-cve-2021-44228-and-related-vulnerabilities/ ## GratWiFi WARNING I can't confirm it: https://www.facebook.com/GratWiFi/posts/396447615600785 ## Gravitee.io : https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability ## Gravwell : https://www.gravwell.io/blog/cve-2021-44228-log4j-does-not-impact-gravwell-products ## GrayLog : https://www.graylog.org/post/graylog-update-for-log4j ## GreenShot : https://greenshot.atlassian.net/browse/BUG-2871 ## GuardedBox : https://twitter.com/GuardedBox/status/1469739834117799939 @@ -199,12 +261,15 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # H ## HackerOne : https://twitter.com/jobertabma/status/1469490881854013444 ## HAProxy : https://www.haproxy.com/blog/december-2021-log4shell-mitigation/ ## HarmanPro AMX : https://help.harmanpro.com/apache-log4j-vulnerability ## Hashicorp : https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228/33138 ## Hazelcast : https://github.com/hazelcast/hazelcast/commit/ad951d3b2fa1ff3412219c1d2e03a31ddf1b3011 ## HCL Global : https://support.hcltechsw.com/csm/en?id=kb_article&sysparm_article=KB0095490 ## HelpSystems Clearswift : https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687 ## Hewlett Packard Enterprise HPE : https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04215en_us ## Hewlett Packard Enterprise HPE GLOBAL : https://techhub.hpe.com/eginfolib/securityalerts/Apache%20Software%20Log4j/Apache_Software_Log4j.html ## Hexagon : https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US ## Hikvision : https://video.xortec.de/media/pdf/87/e8/03/kw50_Update-for-Apache-Log4j2-Issue-Hikvision_official.pdf ## Hitachi Vantara : https://knowledge.hitachivantara.com/Support_Information/Hitachi_Vantara_Security_Advisories/CVE-2021-44228_-_Apache_Log4j2 ## Honeywell : https://www.honeywell.com/us/en/press/2021/12/honeywells-statement-on-java-apache-log4j-logging-framework-vulnerability ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 @@ -214,23 +279,37 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # I ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 ## I-Net software : https://faq.inetsoftware.de/t/statement-about-cve-2021-44228-log4j-vulnerability-concerning-i-net-software-products/269/3 ## IBA-AG : https://www.iba-ag.com/en/security ## IBM : https://www.ibm.com/support/pages/node/6525548 ## IFS : https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436 ## IGEL : https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html ## Ignite Realtime : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## iGrafx : https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/ ## Illuminated Cloud : https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html ## Illumio : https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html ## IManage : https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e ## Imperva : https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day ## IndustrialDefender : https://www.industrialdefender.com/cve-2021-44228-log4j/ ## infinidat : https://support.infinidat.com/hc/en-us/articles/4413483145489-INFINIDAT-Support-Announcement-2021-010-Log4Shell-CVE-2021-44228 ## InfluxData : https://www.influxdata.com/blog/apache-log4j-vulnerability-cve-2021-44228/ ## Infoblox : https://support.infoblox.com/articles/Knowledge/Infoblox-NIOS-and-BloxOne-products-not-vulnerable-to-CVE-2021-44228 ## Informatica : https://network.informatica.com/community/informatica-network/blog/2021/12/10/log4j-vulnerability-update ## Inovonics Broadcast : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996774 ## Instana : https://status.instana.io/incidents/4zgcd2gzf4jw ## Instructure : https://community.canvaslms.com/t5/Community-Users/Instructure-amp-the-Apache-Log4j2-Vulnerability/ba-p/501907 ## Integrative Genomics Viewer IGV : https://github.com/igvteam/igv/commit/40aa5e0c6b5f2eac0a1528658189fd7de8f20347 ## Intel : https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html ## InterSystems : https://www.intersystems.com/gt/apache-log4j2/ ## Intuiface : https://twitter.com/Intuiface/status/1471095195664015363 ## iRedMail : https://forum.iredmail.org/topic18605-log4j-cve202144228.html ## IronCore Labs : https://twitter.com/IronCoreLabs/status/1469359583147659269 ## Ironnet : https://www.ironnet.com/blog/ironnet-security-notifications-related-to-log4j-vulnerability ## ISLONLINE : https://blog.islonline.com/2021/12/13/isl-online-is-not-affected-by-log4shell-vulnerability/ ## ISPNext : https://github.com/NCSC-NL/log4shell/blob/main/software/vendor-statements/ISPNext.png ## Ivanti : https://forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US ## IVPN : https://www.reddit.com/r/IVPN/comments/rgw3nd/comment/homt79k/?utm_source=share&utm_medium=web2x&context=3 # J ## Jamasoftware : https://community.jamasoftware.com/communities/community-home/digestviewer/viewthread?MessageKey=06d26f9c-2abe-4c10-93d4-c0f6c8a01b22&CommunityKey=c9d20d4c-5bb6-4f19-92eb-e7cee0942d51&tab=digestviewer#bm06d26f9c-2abe-4c10-93d4-c0f6c8a01b22 @@ -245,81 +324,119 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## JFROG : https://jfrog.com/knowledge-base/general-jfrog-services-are-not-affected-by-vulnerability-cve-2021-44228/ ## Jitterbit : https://success.jitterbit.com/display/DOC/Mitigating+the+Apache+Log4j2+JNDI+Vulnerability ## Jitsi : https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md ## JPOS : https://github.com/jpos/jPOS/commit/d615199a1bdd35c35d63c07c10fd0bdbbc96f625 ## JobRouter : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995497 ## Juniper Networks : https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259 ## Justice Systems : https://www.justicesystems.com/services/support/ # K ## K15t : https://help.k15t.com/k15t-apps-and-log4shell-193401141.html ## K6 : https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/ ## Kafka Connect CosmosDB : https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md ## Karakun : https://board.karakun.com/viewtopic.php?f=21&t=8351 ## Kaseya : https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment ## Keeper Security : https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/ ## KEMP : https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit ## KEMP 2 : https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228- ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 ## Kofax : https://knowledge.kofax.com/MFD_Productivity/SafeCom/Product_Information/SafeCom_and_Log4j_vulnerability_(CVE-2021-44228) ## Komoot Photon : https://github.com/komoot/photon/issues/620 ## Konica Minolta : https://www.konicaminolta.de/de-de/support/log4j ## Kronos UKG : https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US # L ## L3Harris Geospatial : https://www.l3harrisgeospatial.com/Support/Self-Help-Tools/Help-Articles/Help-Articles-Detail/ArtMID/10220/ArticleID/24141/Impact-of-Log4j-Java-Security-Vulnerability-CVE-2021-44228-on-L3Harris-Geospatial-software ## L-Soft : http://www.lsoft.com/news/log4jinfo.asp ## LabCollector : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995088 ## Lancom Systems : https://www.lancom-systems.com/service-support/instant-help/general-security-information/ ## Lansweeper : https://www.lansweeper.com/vulnerability/critical-log4j-vulnerability-affects-millions-of-applications/ ## Laserfiche : https://answers.laserfiche.com/questions/194037/Do-any-Laserfiche-products-use-the-Apache-log4j-library#194038 ## LastPass : https://support.logmeininc.com/lastpass/help/log4j-vulnerability-faq-for-lastpass-universal-proxy ## LaunchDarkly : https://launchdarkly.com/blog/audit-shows-systems-unaffected-by-log4j/ ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell ## Lenovo : https://support.lenovo.com/ro/en/product_security/len-76573 ## LeoStream : https://support.leostream.com/support/discussions/topics/66000507567 ## Let's Encrypt : https://community.letsencrypt.org/t/log4j-vulnerability-cve-2021-44228/167464 ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## LibreNMS : https://community.librenms.org/t/is-librenms-affected-by-vulnerable-to-cve-2021-25218-cve-2021-44228/17675/6 ## LifeRay : https://liferay.dev/blogs/-/blogs/log4j2-zero-day-vulnerability ## Lightbend : https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 ## Lime CRM : https://docs.lime-crm.com/security/lcsec21-01 ## LIONGARD : https://insights.liongard.com/faq-apache-log4j-vulnerability ## LiquidFiles : https://mailchi.mp/liquidfiles/liquidfiles-log4j?e=%5BUNIQID%5D ## LiveAction : https://documentation.liveaction.com/LiveNX/LiveNX%2021.5.1%20Release%20Notes/Release%20Notes%20LiveNX%2021.5.1.1.3 ## Loftware : https://help.loftware.com/lps-kb/content/log4j%20cve-2021-44228.htm?Highlight=CVE-2021-44228 ## LogicMonitor : https://www.logicmonitor.com/support/log4shell-security-vulnerability-cve-2021-44228 ## LogMeIn : https://community.logmein.com/t5/LogMeIn-Central-Discussions/LOG4J-Vulnerability/m-p/280317/highlight/true#M8327 ## LogRhythm : https://community.logrhythm.com/t5/Product-Security/LogRhythm-Response-to-the-Apache-Log4J-Vulnerability-Log4Shell/td-p/494068 ## Looker : https://docs.google.com/document/d/e/2PACX-1vQGN1AYNMHxsRQ9AZNu1bKyTGRUSK_9xkQBge-nu4p8PYvBKIYHhc3914KTfVtDFIXtDhc3k6SZnR2M/pub ## LucaNet : https://www.lucanet.com/en/blog/update-vulnerability-log4j # M ## Macchina io : https://twitter.com/macchina_io/status/1469611606569099269 ## MailCow : https://github.com/mailcow/mailcow-dockerized/issues/4375 ## MailStore : https://www.mailstore.com/en/blog/mailstore-affected-by-log4shell/ ## Maltego : https://www.maltego.com/blog/our-response-to-log4j-cve-2021-44228/ ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1 ## MariaDB : https://mariadb.com/resources/blog/log4shell-and-mariadb-cve-2021-44228/ ## MathWorks Matlab : https://www.mathworks.com/matlabcentral/answers/1610640-apache-log4j-vulnerability-cve-2021-44228-how-does-it-affect-matlab-run-time ## Matillion : https://documentation.matillion.com/docs/security-advisory-14th-december-2021 ## Matomo : https://forum.matomo.org/t/matomo-is-not-concerned-by-the-log4j-security-breach-cve-2021-44228-discovered-on-december-2021-the-9th/44089 ## Mattermost FocalBoard : https://forum.mattermost.org/t/log4j-vulnerability-concern/12676 ## McAfee : https://kc.mcafee.com/corporate/index?page=content&id=KB95091 ## MEINBERG : https://www.meinbergglobal.com/english/news/meinberg-lantime-and-microsync-systems-not-at-risk-from-log4j-security-exploit.htm ## Memurai : https://www.memurai.com/blog/apache-log4j2-cve-2021-44228 ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## MicroFocus : https://portal.microfocus.com/s/customportalsearch?language=en_US&searchtext=CVE-2021-44228 ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ ## Microstrategy : https://community.microstrategy.com/s/article/MicroStrategy-s-response-to-CVE-2021-44228-The-Log4j-0-Day-Vulnerability?language=en_US ## Midori Global : https://www.midori-global.com/blog/2021/12/15/cve-2021-44228-log4shell-midori-apps-are-not-affected ## Mikrotik : https://forum.mikrotik.com/viewtopic.php?p=897938 ## Milestone sys : https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US ## Mimecast : https://community.mimecast.com/s/article/Mimecast-Information-for-Customers-on-the-Log4Shell-Vulnerability ## Minecraft : https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition ## Mirantis : https://github.com/Mirantis/security/blob/main/news/cve-2021-44288.md ## Miro : https://miro.com/trust/updates/log4j/ ## MISP : https://twitter.com/MISPProject/status/1470051242038673412 ## Mitel : https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010 ## MongoDB : https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb ## MONARC Project : https://twitter.com/MONARCproject/status/1470349937443491851 ## Moodle : https://moodle.org/mod/forum/discuss.php?d=429966 ## MoogSoft : https://servicedesk.moogsoft.com/hc/en-us/articles/4412463233811?input_string=log4j+vulnerability+%7C%7C+cve-2021-44228 ## Motorola Avigilon : https://support.avigilon.com/s/article/Technical-Notification-Apache-Log4j2-vulnerability-impact-on-Avigilon-products-CVE-2021-44228?language=en_US ## Mulesoft : https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021 # N ## N-able : https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability ## Nagios : https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/ ## NAKIVO : https://forum.nakivo.com/index.php?/topic/7574-log4j-cve-2021-44228/&do=findComment&comment=9145 ## NELSON : https://github.com/getnelson/nelson/blob/f4d3dd1f1d4f8dfef02487f67aefb9c60ab48bf5/project/custom.scala ## NEO4J : https://community.neo4j.com/t/log4j-cve-mitigation-for-neo4j/48856 ## NetApp : https://security.netapp.com/advisory/ntap-20211210-0007/ ## NetBox : https://github.com/netbox-community/netbox/discussions/8052#discussioncomment-1796920 ## Netcup : https://www.netcup-news.de/2021/12/14/pruefung-log4j-sicherheitsluecken-abgeschlossen/ ## Netflix : https://github.com/search?q=org%3ANetflix+CVE-2021-44228&type=commits ## NetGate PFSense : https://forum.netgate.com/topic/168417/java-log4j-vulnerability-is-pfsense-affected/35 ## Netgear : https://www.reddit.com/r/NETGEAR/comments/re5iqy/comment/ho9qlvb/ ## Netwrix : https://www.netwrix.com/netwrix_statement_on_cve_2021_44228_the_apache_log4j_vulnerability.html ## NewTek : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995403 ## NextCloud : https://help.nextcloud.com/t/apache-log4j-does-not-affect-nextcloud/129244 ## NextGen Healthcare Mirth : https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 ## Nexus Group : https://doc.nexusgroup.com/pages/viewpage.action?pageId=83133294 ## Newrelic : https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-03/ ## NinjaRMM : https://ninjarmm.zendesk.com/hc/en-us/articles/4416226194189-12-10-21-Security-Declaration-NinjaOne-not-affected-by-CVE-2021-44228-log4j- ## Nomachine : https://forums.nomachine.com/topic/apache-log4j-notification ## NoviFlow : https://noviflow.com/noviflow-products-and-the-log4shell-exploit-cve-2021-44228/ ## Nutanix : https://download.nutanix.com/alerts/Security_Advisory_0023.pdf ## Nvidia : https://nvidia.custhelp.com/app/answers/detail/a_id/5294 ## NXLog : https://nxlog.co/news/apache-log4j-vulnerability-cve-2021-44228 # O ## Objectif Lune : https://learn.objectiflune.com/blog/security/statement-on-log4j-vulnerability-cve-2021-4428/ ## Obsidiandynamics KAFDROP : https://github.com/obsidiandynamics/kafdrop/issues/315 ## OCLC : https://oclc.service-now.com/status ## Octopus : https://advisories.octopus.com/adv/December.2306508680.html ## Okta : https://sec.okta.com/articles/2021/12/log4shell ## Onespan :https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776 @@ -331,30 +448,48 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## OpenSearch : https://discuss.opendistrocommunity.dev/t/log4j-patch-for-cve-2021-44228/7950 ## OpenText XMFax : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995966 ## OpenTripPlanner : https://github.com/opentripplanner/OpenTripPlanner/issues/3785 ## OpenVPN : https://forums.openvpn.net/viewtopic.php?f=4&p=103724#p103750 ## OPNsense : https://forum.opnsense.org/index.php?topic=25951.msg125111#msg125111 ## Oracle : https://www.oracle.com/security-alerts/alert-cve-2021-44228.html ## Orgavision : https://www.orgavision.com/neuigkeiten/sicherheitsluecke-java-library-log4j ## OSQUERY : https://twitter.com/osquery/status/1470831336118124549 ## OTRS : https://portal.otrs.com/external ## OVHCloud : https://blog.ovhcloud.com/log4shell-how-to-protect-my-cloud-workloads/ ## OwnCloud : https://central.owncloud.org/t/owncloud-not-directly-affected-by-log4j-vulnerability/35493 ## OxygenXML : https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html # P ## Palo-Alto Networks : https://security.paloaltonetworks.com/CVE-2021-44228 ## Panopto : https://support.panopto.com/s/article/Panopto-Statement-on-the-Log4j2-Zero-Day-Vulnerability ## Pantheon hosting : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996953 ## PaperCut : https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228 ## Parallels : https://kb.parallels.com/en/128696 ## Parse.ly : https://blog.parse.ly/parse-ly-log4shell/ ## PasswordState : https://www.reddit.com/r/passwordstate/comments/rf7d62/log4j_zeroday_log4shell_vulnerability/ ## Pebblehost : https://help.pebblehost.com/en/article/patching-the-log4j-rce-exploit-14wyvz0/ ## Percona : https://www.percona.com/blog/log4jshell-vulnerability-update/ ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability ## Pentaho :https://support.pentaho.com/hc/en-us/articles/4416229254541-log4j-2-zero-day-vulnerability-No-impact-to-supported-versions-of-Pentaho- ## Pexip : https://www.pexip.com/blog1.0/pexip-statement-on-log4j-vulnerability ## Phenix Id : https://support.phenixid.se/uncategorized/log4j-fix/ ## Phillips : https://www.philips.com/a-w/security/security-advisories.html ## PiHole : https://www.reddit.com/r/pihole/comments/re225u/does_pihole_use_log4j/ ## PingIdentity : https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228 ## Pitney Bowes : https://www.pitneybowes.com/us/support/apache-log4j-vulnerability.html ## Planon Software : https://my.planonsoftware.com/uk/news/log4j-impact-on-planon/ ## Plesk : https://support.plesk.com/hc/en-us/articles/4412182812818-CVE-2021-44228-vulnerability-in-log4j-package-of-Apache ## Polycom : https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn-21-08-poly-systems-apache.pdf ## Portainer : https://www.portainer.io/blog/portainer-statement-re-log4j-cve-2021-44228 ## PortEx : https://github.com/katjahahn/PortEx/releases ## PortSwigger : https://forum.portswigger.net/thread/are-burp-collaborator-or-burp-enterprise-vulnerable-to-log4j-dc6524e0 ## PostGreSQL : https://www.postgresql.org/about/news/postgresql-jdbc-and-the-log4j-cve-2371/ ## Postman : https://support.postman.com/hc/en-us/articles/4415791933335-Is-Postman-impacted-by-the-Log4j-vulnerability-CVE-2021-44228- ## Pretix : https://pretix.eu/about/de/blog/20211213-log4j/ ## PrimeKey : https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228 ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 ## Prosys : https://prosysopc.com/news/important-security-release/ ## ProtonMail : https://twitter.com/ProtonMail/status/1470377648492797953 ## Proxmox : https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880 ## PRTG Paessler : https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228 ## PTC : https://www.ptc.com/en/support/alerts/log4j%20zero%20day%20vulnerability%20-%2020211211 @@ -363,23 +498,37 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Puppet : https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/ ## Pure Storage : https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_(%22log4j%22) ## PWM Project : https://github.com/pwm-project/pwm/issues/628 ## Pyramid Analytics : https://community.pyramidanalytics.com/t/83hjjt4/log4j-security-vulnerability-pyramid # Q ## QF-Test : https://www.qfs.de/en/blog/article/no-log4j-vulnerability-in-qf-test.html ## Qlik : https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368 ## QNAP : https://www.qnap.com/en-uk/security-advisory/qsa-21-58 ## QSC Q-SYS : https://qscprod.force.com/selfhelpportal/s/article/Are-Q-SYS-products-affected-by-the-Log4j-vulnerability-CVE-2021-44228 ## QT : https://www.qt.io/blog/the-qt-company-products-not-affected-by-cve-2021-44228-log4j-vulnerability ## Quest Global : https://support.quest.com/fr-fr/search#q=CVE-2021-44228&t=Global # R ## Radfak : https://www.radfak.de/ankuendigungen-news/130-radfak-und-log4j-cve-2021-44228-sicherheitsluecke.html ## Radware : https://support.radware.com/app/answers/answer_view/a_id/1029752 ## Rapid7 : https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/ ## Raritan : https://www.raritan.com/support ## Ravelin : https://syslog.ravelin.com/log4shell-cve-2021-44228-4338bb8da67b ## Red5Pro : https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/ ## RedGate : https://www.red-gate.com/privacy-and-security/vulnerabilities/2021-12-15-log4j-statement ## RedHat : https://access.redhat.com/security/vulnerabilities/RHSB-2021-009 ## Redis : https://redis.com/security/notice-apache-log4j2-cve-2021-44228/ ## Reiner SCT : https://forum.reiner-sct.com/index.php?/topic/5973-timecard-und-log4j-schwachstelle/&do=findComment&comment=14933 ## Remediant : https://twitter.com/Remediant/status/1470278329454366720 ## ReportURI : https://scotthelme.co.uk/responding-to-the-log4j-2-vulnerability/ ## Respondus : https://support.respondus.com/support/index.php?/News/NewsItem/View/339 ## Revenera / Flexera : https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905 ## Ricoh : https://www.ricoh.com/info/2021/1215_1/ ## RingCentral : https://www.ringcentral.com/trust-center/security-bulletin.html ## Riverbed : https://supportkb.riverbed.com/support/index?page=content&id=S35645 ## RocketChat : https://github.com/RocketChat/Rocket.Chat/issues/23927 ## Rockwell Automation : https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605 ## Rollbar : https://rollbar.com/blog/log4j-zero-day-2021-log4shell/ ## Rosetta UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993903 ## Rosette.com : https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability ## Rubrik : https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK @@ -391,6 +540,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 # S ## SAE-IT : https://www.sae-it.com/nc/de/news/sicherheitsmeldungen.html ## SAFE FME Server : https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j ## SAGE : https://www.sagecity.com/sage-global-solutions/sage-crm/f/sage-crm-announcements-news-and-alerts/178655/advisory-apache-log4j-vulnerability-cve-2021-44228 ## SailPoint : https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/ba-p/206681 @@ -400,8 +550,13 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## SAP BusinessObjects : https://launchpad.support.sap.com/#/notes/3129956 ## SAP Global coverage : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3994039 ## SAS : https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html ## SASSAFRAS : https://www.sassafras.com/log4j-vulnerability-cve-2021-44228/ ## Savignano software solutions : https://savignano.atlassian.net/wiki/spaces/SNOTIFY/blog/2021/12/13/2839740417/No+Log4j+Vulnerability+in+S+Notify ## ScaleComputing : https://community.scalecomputing.com/s/article/Apache-Log4j-Vulnerability ## ScaleFusion MobileLock Pro : https://help.mobilock.in/article/t9sx43yg44-scalefusion-security-advisory-for-apache-log-4-j-vulnerability-cve-2021-44228 ## Schneider Electric : https://download.schneider-electric.com/files?p_Doc_Ref=SESB-2021-347-01 ## SCM Manager : https://scm-manager.org/blog/posts/2021-12-13-log4shell/ ## ScreenBeam : https://customersupport.screenbeam.com/hc/en-us/articles/4416468085389-December-2021-Security-Alert-Log4j-CVE-2021-44228 ## SDL worldServer : https://gateway.sdl.com/apex/communityknowledge?articleName=000017707 ## Seafile : https://forum.seafile.com/t/urgent-zero-day-exploit-in-log4j/15575 ## Seagull Scientific : https://support.seagullscientific.com/hc/en-us/articles/4415794235543-Apache-Log4Shell-Vulnerability @@ -414,10 +569,13 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 ## Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 ## Shibboleth : http://shibboleth.net/pipermail/announce/2021-December/000253.html ## Shopify : https://community.shopify.com/c/technical-q-a/is-shopify-affected-by-the-log4j-vulnerability/td-p/1417625 ## Siebel : https://www.siebelhub.com/main/2021/12/log4j-vulnerability-cve-2021-44228-and-siebel-crm.html ## Siemens : https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf ## Signald : https://gitlab.com/signald/signald/-/issues/259 ## SingleWire : https://support.singlewire.com/s/article/Apache-Log4j2-vulnerability-CVE-2021-44228 ## Sitecore : https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391 ## SiteGround : https://twitter.com/SiteGround/status/1470334089500798976 ## Skillable : https://skillable.com/log4shell/ ## SLF4J : http://slf4j.org/log4shell.html ## SmartBear : https://smartbear.com/security/cve-2021-44228/ @@ -431,46 +589,64 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Sonatype : https://blog.sonatype.com/a-new-0-day-log4j-vulnerability-discovered-in-the-wild ## SonicWall : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce ## SOS Berlin : https://www.sos-berlin.com/en/news-mitigation-log4j-vulnerability ## Spambrella : https://www.spambrella.com/faq/status-of-spambrella-products-with-cve-2021-44228/ ## Sprecher Automation : https://www.sprecher-automation.com/en/it-security/security-alerts ## Splashtop : https://support-splashtopbusiness.splashtop.com/hc/en-us/articles/4412788262811-Is-Splashtop-affected-by-Apache-Log4j- ## Splunk : https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html ## Spring Boot : https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot ## StarDog : https://community.stardog.com/t/stardog-7-8-1-available/3411 ## Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 ## Storagement : https://www.storagement.de/index.php?action=topicofthemonth&site=log4j ## StrangeBee TheHive & Cortex : https://blog.strangebee.com/apache-log4j-cve-2021-44228/ ## Stratodesk : http://cdn.stratodesk.com/repository/notouch-center/10/4.5.231/0/ReleaseNotes-Stratodesk-NoTouch_Center-4.5.231.html ## Strimzi : https://strimzi.io/blog/2021/12/14/strimzi-and-log4shell/ ## Styra : https://blog.styra.com/blog/newest-log4j-security-vulnerability-cve-2021-44228-log4shell ## SumoLogic : https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12 ## Superna EYEGLASS : https://manuals.supernaeyeglass.com/project-technical-advisories-all-products/HTML/technical-advisories.html#h2__1912345025 ## Suprema Inc : https://www.supremainc.com/en/ ## SUSE : https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/ ## Sumologic : https://docs.google.com/document/d/e/2PACX-1vSdeODZ2E5k0aZgHm06OJWhDQWgtxxB0ZIrTsuQjg5xaoxlogmTVGdOWoSFtDlZBdHzY6ET6k6Sk-g1/pub ## Sweepwidget : https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032 ## Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 ## Swyx : https://service.swyx.net/hc/de/articles/4412323539474 ## Syncplify : https://blog.syncplify.com/no-we-are-not-affected-by-log4j-vulnerability/ ## Synchro MSP : https://community.syncromsp.com/t/log4j-rce-cve-2021-4428/1350 ## Synology : https://www.synology.com/en-global/security/advisory/Synology_SA_21_30 ## Synopsys : https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228 ## Syntevo : https://www.syntevo.com/blog/?p=5240 ## SysAid : https://www.sysaid.com/lp/important-update-regarding-apache-log4j ## Sysdig : https://sysdig.com/blog/cve-critical-vulnerability-log4j/ # T ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## Tanium : https://community.tanium.com/s/article/How-Tanium-Can-Help-with-CVE-2021-44228-Log4Shell#_Toc90296319 ## Targit : https://github.com/NCSC-NL/log4shell/blob/main/software/vendor-statements/Targit.png ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## TeamPasswordManager : https://teampasswordmanager.com/blog/log4j-vulnerability/ ## Teamviewer : https://www.teamviewer.com/en/trust-center/security-bulletins/hotfix-log4j2-issue/ ## TechSmith : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995701 ## Tenable : https://www.tenable.com/log4j ## Telestream : http://www.telestream.net/telestream-support/Apache-Log4j2-Bulletin.htm ## Thales : https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=02863d13db544110f0e3220805961914&sysparm_article=KB0025287 ## Thales (SafeNet) HSM : https://supportportal.thalesgroup.com/csm?id=kb_article_protected&sys_id=12acaed3dbd841105d310573f3961953 ## Threema UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## ThycoticCentrify : https://docs.thycotic.com/bulletins/current/2021/cve-2021-44228-exploit.md ## Tibco : https://www.tibco.com/support/notices/2021/12/apache-log4j-vulnerability-update ## TopDesk : https://my.topdesk.com/tas/public/ssp/content/detail/knowledgeitem?unid=74952771dfab4b0794292e63b0409314 ## Topicus KeyHub : https://blog.topicus-keyhub.com/topicus-keyhub-is-not-vulnerable-to-cve-2021-44228/ ## Topix : https://www.topix.de/de/technik/systemfreigaben.html ## Tosibox : https://helpdesk.tosibox.com/support/solutions/articles/2100050946-security-advisory-on-vulnerability-in-apache-log4j-library-cve-2021-44228 ## TP-Link : https://www.tp-link.com/jp/support/faq/3255/ ## TrendMicro : https://success.trendmicro.com/solution/000289940 ## Tricentis Tosca : https://support-hub.tricentis.com/open?number=NEW0001148&id=post ## Tripwire : https://www.tripwire.com/log4j ## TrueNAS : https://www.truenas.com/community/threads/log4j-vulnerability.97359/post-672559 # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 ## Ubuntu : https://ubuntu.com/security/CVE-2021-44228 ## Umbraco : https://umbraco.com/blog/security-advisory-december-15-2021-umbraco-cms-and-cloud-not-affected-by-cve-2021-44228-log4j-rce-0-day-mitigation/ ## Unify ATOS : https://networks.unify.com/security/advisories/OBSO-2112-01.pdf ## UniFlow : https://www.uniflow.global/en/security/security-and-maintenance/ ## Unimus : https://forum.unimus.net/viewtopic.php?f=7&t=1390#top @@ -483,30 +659,43 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Venafi : https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052070 ## Vertica : https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used ## Vertiv : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3996968 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## Viso Trust : https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492 ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html # W ## Wallarm : https://lab.wallarm.com/cve-2021-44228-mitigation-update/ ## WAPT : https://www.reddit.com/r/WAPT/comments/rg38o9/wapt_is_not_affected_by_the_cve202144228_flaw/ ## Wasp Barcode technologies : https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no ## Watcher : https://twitter.com/felix_hrn/status/1470387338001977344 ## WatchGuard / Secplicity / https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/ ## Western Digital : https://www.westerndigital.com/support/product-security/wdc-21016-apache-log4j-2-remote-code-execution-vulnerability-analysis ## WildFlyAS : https://twitter.com/WildFlyAS/status/1469362190536818688 ## WindRiver : https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191 ## WireShark : https://gitlab.com/wireshark/wireshark/-/issues/17783 ## Wistia : https://status.wistia.com/incidents/jtg0dfl5l224 ## WitFoo : https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ ## Wodby Cloud : https://twitter.com/wodbycloud/status/1470125735914450950 ## VoiceThread : https://twitter.com/voicethread/status/1470498119540514821 ## World Programming WPS analytics : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995649 ## Worksphere : https://www.worksphere.com/product/security-update-on-log4j-cve-2021-44228 ## Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve ## WSO2 : https://github.com/wso2/security-tools/pull/169 # X ## XCP-ng : https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact ## XenForo : https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/ ## Xerox : https://security.business.xerox.com/wp-content/uploads/2021/12/Xerox-Special-Bulletin-Regarding-CVE-2021-44228.pdf ## XPertDoc : https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727 ## Xray connector plugin : https://github.com/jenkinsci/xray-connector-plugin/issues/53 ## XWIKI : https://forum.xwiki.org/t/log4j-cve-2021-44228-log4shell-zero-day-vulnerability/9557 # Y ## Yandex-Cloud : https://github.com/yandex-cloud/docs/blob/6ff6c676787756e7dd6101c53b051e4cd04b3e85/ru/overview/security-bulletins/index.md#10122021--cve-2021-44228--%D1%83%D0%B4%D0%B0%D0%BB%D0%B5%D0%BD%D0%BD%D0%BE%D0%B5-%D0%B2%D1%8B%D0%BF%D0%BE%D0%BB%D0%BD%D0%B5%D0%BD%D0%B8%D0%B5-%D0%BA%D0%BE%D0%B4%D0%B0-log4shell-apache-log4j ## Yellowbrick : https://support.yellowbrick.com/hc/en-us/articles/4412586575379-Security-Advisory-Yellowbrick-is-NOT-Affected-by-the-Log4Shell-Vulnerability ## YellowFin : https://community.yellowfinbi.com/announcement/notice-critical-vulnerability-in-log4j2 ## YSoft SAFEQ : https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf # Z ## Zabbix : https://blog.zabbix.com/zabbix-not-affected-by-the-log4j-exploit/17873/ @@ -520,6 +709,7 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-202 ## Zesty : https://www.zesty.io/mindshare/company-announcements/log4j-exploit/ ## Zimbra : https://bugzilla.zimbra.com/show_bug.cgi?id=109428 ## ZPE systems Inc : https://support.zpesystems.com/portal/en/kb/articles/is-nodegrid-os-and-zpe-cloud-affected-by-cve-2021-44228-apache-log4j ## Zoom : https://community.zoom.com/t5/Community-Help-Center/Zoom-security-exposure/m-p/28109/highlight/true#M2059 ## Zowe : https://github.com/zowe/community/issues/1381 ## ZSCALER : https://www.zscaler.fr/blogs/security-research/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021 ## Zyxel : https://www.zyxel.com/support/Zyxel_security_advisory_for_Apache_Log4j_RCE_vulnerability.shtml -
SwitHak revised this gist
Dec 15, 2021 . 1 changed file with 233 additions and 33 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,224 +1,363 @@ Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228) ## Errors, typos, something to say ? - If you want to add a link, comment or send it to me - Feel free to report any mistake directly below in the comment or in DM on Twitter [@SwitHak](https://twitter.com/SwitHak) # Other great resources - Royce Williams list is different, listed by vendors responses: - https://www.techsolvency.com/story-so-far/cve-2021-44228-log4j-log4shell/ - Very detailed list [NCSC-NL](https://github.com/NCSC-NL/log4shell/blob/main/software/README.md#software-overview) [A](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#a) **[B](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#b)** [C](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#c) [D](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#d) [E](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#e) [F](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#f) [G](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#g) [H](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#h) [I](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#i) [J](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#j) [K](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#k) [L](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#l) [M](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#m) [N](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#n) [O](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#o) [P](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#p) [Q](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#q) [R](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#r) [S](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#s) [T](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#t) [U](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#u) [V](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#v) [W](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#w) [X](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#x) [Y](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#y) [Z](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592?s=03#z) # 0-9 ## 3CX : https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/#post-407911 ## 7-Zip : https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/ # A ## Acquia : https://support.acquia.com/hc/en-us/articles/4415823329047-Apache-log4j-CVE-2021-44228 ## Acronis : https://security-advisory.acronis.com/advisories/SEC-3859 ## Addigy : https://addigy.com/blog/addigy-and-apaches-log4j2-cve-2021-44228-status/ ## Adeptia : https://support.adeptia.com/hc/en-us/articles/4412815509524-CVE-2021-44228-Log4j2-Vulnerability-Mitigation- ## Adobe ColdFusion : https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html ## ADP : https://www.adp.com/about-adp/data-security/alerts/adp-vulnerability-statement-apache-log4j-vulnerability-cve-2021-44228.aspx ## Agenda : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995221 ## Akamai : https://www.akamai.com/blog/news/CVE-2021-44228-Zero-Day-Vulnerability ## Alcatel : https://dokuwiki.alu4u.com/doku.php?id=log4j ## Alertus : https://help.alertus.com/s/article/Security-Advisory-Log4Shell-Vulnerability?language=en_US ## AlgoSec UNOFICIAl : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3994072 ## AlienVault UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3994150 ## Altaro : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995170 ## Apache Druid : https://github.com/apache/druid/pull/12051 ## Apache Flink : https://flink.apache.org/2021/12/10/log4j-cve.html ## Apache Guacamole https://issues.apache.org/jira/projects/GUACAMOLE/issues/GUACAMOLE-1474?filter=allissues ## Apache James : https://github.com/apache/james-project/pull/794 ## Apache Jena : https://lists.apache.org/thread/nc3gz7yvokc9ktkzs8078jr5t04nfmdy ## Apache LOG4J : https://logging.apache.org/log4j/2.x/security.html ## Apache Kafka : https://lists.apache.org/thread/lgbtvvmy68p0059yoyn9qxzosdmx4jdv ## Apache Projects : https://blogs.apache.org/security/entry/cve-2021-44228 ## Apache Pulsar : https://pulsar.apache.org/blog/2021/12/11/Log4j-CVE/ ## Apache Solr : https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228 ## Apache Struts : https://struts.apache.org/announce-2021#a20211212-2 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## Apigee : https://status.apigee.com/incidents/3cgzb0q2r10p ## Apollo : https://community.apollographql.com/t/log4j-vulnerability/2214 ## Appdynamics : https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability ## AppGate : https://www.appgate.com/blog/appgate-sdp-unaffected-by-log4j-vulnerability ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Aqua Security : https://docs.google.com/document/d/e/2PACX-1vSmFR3oHPXOih1wENKd7RXn0dsHzgPUe91jJwDTsaVxJtcJEroktWNLq7BMUx9v7oDZRHqLVgkJnqCm/pub ## Arduino : https://support.arduino.cc/hc/en-us/articles/4412377144338-Arduino-s-response-to-Log4j2-vulnerability-CVE-2021-44228 ## Ariba : https://connectsupport.ariba.com/sites#announcements-display&/Event/908469 ## Arista : https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070 ## ArrayNetworks : https://twitter.com/ArraySupport/status/1470141638571745282 ## Aruba Networks: https://asp.arubanetworks.com/notifications/Tm90aWZpY2F0aW9uOjEwMTQ0;notificationCategory=Security ## Attivo networks : https://www.attivonetworks.com/wp-content/uploads/2021/12/Log4j_Vulnerability-Advisory-211213-4.pdf ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html ## AudioCodes : https://services.audiocodes.com/app/answers/kbdetail/a_id/2225 ## Autopsy : https://www.autopsy.com/autopsy-and-log4j-vulnerability/ ## Auth0 : https://twitter.com/auth0/status/1470086301902721024 ## Autodesk : https://knowledge.autodesk.com/support/autocad/troubleshooting/caas/sfdcarticles/sfdcarticles/CVE-2021-44228.html ## Automox : https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 ## Avantra SYSLINK : https://support.avantra.com/support/solutions/articles/44002291388-cve-2021-44228-log4j-2-vulnerability ## Avaya : https://support.avaya.com/helpcenter/getGenericDetails?detailId=1399839287609 ## AVEPOINT : https://www.avepoint.com/company/java-zero-day-vulnerability-notification ## AVM UNOFICIAl : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## AvTech RoomAlert : https://avtech.com/articles/23124/java-exploit-room-alert-link/ ## AWS New : https://aws.amazon.com/security/security-bulletins/AWS-2021-006/ ## AWS OLD: https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ ## AXS Guard : https://www.axsguard.com/en_US/blog/security-news-4/log4j-vulnerability-77 ## Axways Applications : https://support.axway.com/news/1331/lang/en ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 # B ## BackBox : https://updates.backbox.com/V6.5/Docs/CVE-2021-44228.pdf ## BACKBLAZE : https://twitter.com/backblaze/status/1469477224277368838 ## Barracuda : https://blog.barracuda.com/2021/12/13/barracuda-waf-and-waf-as-a-service-protect-against-the-apache-log4j-critical-vulnerability/ ## BEC Legal Systems : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995524 ## BeyondTrust Bomgar : https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542 ## BigBlueButton : https://github.com/bigbluebutton/bigbluebutton/issues/13897#issuecomment-991652632 ## BisectHosting : https://www.bisecthosting.com/clients/index.php?rp=/knowledgebase/205/Java-Log4j-Vulnerability.html ## BitDefender : https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## Blancco : https://support.blancco.com/display/NEWS/2021/12/12/CVE-2021-44228+-+Critical+vulnerability+in+Apache+Log4j+library ## Blumira : https://www.blumira.com/cve-2021-44228-log4shell/ ## BMC Software : https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability ## Boomi DELL : https://community.boomi.com/s/article/Log4j-Vulnerability ## Broadcom : https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 ## Broadcom Automic Automation : https://knowledge.broadcom.com/external/article?articleId=230308 # C ## C4b XPHONE : https://www.c4b.com/de/news/log4j.php ## Calyptix Security : https://twitter.com/calyptix/status/1470498981147029507 ## Camunda : https://forum.camunda.org/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228/31910 ## CarbonBlack : https://www.vmware.com/security/advisories/VMSA-2021-0028.html ## CAS GenesysWorld : https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446 ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## ChaserSystems : https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected ## Checkmarx plugin : https://github.com/jenkinsci/checkmarx-plugin/pull/83 ## CheckMK : https://forum.checkmk.com/t/checkmk-not-affected-by-log4shell/28643/3 ## CheckPoint : https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176865 ## Ciphermail : https://www.ciphermail.com/blog/ciphermail-gateway-and-webmail-messenger-are-not-vulnerable-to-cve-2021-44228.html ## Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd ## Citrix : https://support.citrix.com/article/CTX335705 ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## Cloudian HyperStore : https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228 ## CPanel : https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ ## Code42 : https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_response_to_industry_security_incidents ## CodeBeamer : https://codebeamer.com/cb/wiki/19872365 ## CodeTwo : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995424 ## Cohesity : https://support.cohesity.com/s/article/Security-Advisory-Apache-Log4j-Remote-Code-Execution-RCE-CVE-2021-44228 ## CommVault : https://documentation.commvault.com/v11/essential/146231_security_vulnerability_and_reporting.html ## ConcreteCMS.com : https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit ## Confluent : https://support.confluent.io/hc/en-us/articles/4412615410580-CVE-2021-44228-log4j2-vulnerability ## Connect2id : https://connect2id.com/blog/connect2id-server-12-5-1 ## ConnectWise : https://www.connectwise.com/company/trust/advisories ## ContrastSecurity : https://support.contrastsecurity.com/hc/en-us/articles/4412612486548 ## ControlUp : https://status.controlup.com/incidents/qqyvh7b1dz8k ## Coralogix : https://twitter.com/Coralogix/status/1469713430659559425 ## CouchBase : https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402 ## Cradlepoint : https://cradlepoint.com/vulnerability-alerts/cve-2021-44228-apache-log4j-security-vulnerabilities/ ## CrushFTP : https://www.crushftp.com/download.html ## CryptShare : https://www.cryptshare.com/en/support/cryptshare-support/#c67572 ## Cumul.io https://status.cumul.io/#incidents ## CyberArk : https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228 ## Cybereason : https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228 ## CyberRes : https://community.microfocus.com/cyberres/b/sws-22/posts/summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228 # D ## DarkTrace : https://customerportal.darktrace.com/inside-the-soc/get-article/201 ## Databricks : https://docs.google.com/document/d/e/2PACX-1vREjwZk17BAHGwj5Phizi4DPFS9EIUbAMX-CswlgbFwqwKXNKZC8MrT-L6wUgfIChsSHtvd_QD3-659/pub ## DataDog : https://www.datadoghq.com/log4j-vulnerability/ ## Dataminer : https://community.dataminer.services/responding-to-log4shell-vulnerability/ ## Datev : https://www.datev-community.de/t5/Freie-Themen/Log4-J-Schwachstelle/m-p/258185/highlight/true#M14308 ## Datto : https://www.datto.com/blog/dattos-response-to-log4shell ## Debian : https://security-tracker.debian.org/tracker/CVE-2021-44228 ## Dell : https://www.dell.com/support/kbdoc/en-us/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## DELL : https://www.dell.com/support/kbdoc/en-us/000194416/additional-information-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 ## Device42 : https://blog.device42.com/2021/12/13/log4j-zero-day/ ## Digicert : https://knowledge.digicert.com/alerts/digicert-log4j-response.html ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ ## Docusign : https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability ## dCache.org : https://www.dcache.org/post/log4j-vulnerability/ ## DCM4CHE.org : https://github.com/dcm4che/dcm4che/issues/1050 ## DRAW.IO : https://twitter.com/drawio/status/1470061320066277382 ## DropWizard : https://twitter.com/dropwizardio/status/1469285337524580359 ## DSpace :https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 # E ## Eclipse Foundation : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3992521 ## EHRBase : https://github.com/ehrbase/ehrbase/issues/700 ## Elastic : https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## EnterpriseDT : https://enterprisedt.com/blogs/announcements/enterprisedt-does-not-use-log4j/ ## ESET : https://forum.eset.com/topic/30691-log4j-vulnerability/?do=findComment&comment=143745 ## ESRI : https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/ ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 ## Exabeam : https://community.exabeam.com/s/discussions?t=1639379479381 ## Extreme Networks : https://extremeportal.force.com/ExtrArticleDetail?an=000100806 # F ## F5 Networks : https://support.f5.com/csp/article/K19026212 ## F-Secure https://status.f-secure.com/incidents/sk8vmr0h34pd ## Fastly : https://www.fastly.com/blog/digging-deeper-into-log4shell-0day-rce-exploit-found-in-log4j ## FAST LTA : https://blog.fast-lta.de/en/log4j2-vulnerability ## FedEx : https://www.fedex.com/en-us/service-alerts.html#weatherassess ## FileCatalyst : https://support.filecatalyst.com/index.php/Knowledgebase/Article/View/advisory-log4j-zero-day-security-vulnerability ## FileCloud : https://www.getfilecloud.com/supportdocs/display/cloud/Advisory+2021-12-2+Impact+of+Apache+Log4j2+Vulnerability+on+FileCloud+Customers ## Flexera : https://community.flexera.com/t5/Community-Notices/Flexera-s-response-to-Apache-Log4j-2-remote-code-execution/ba-p/216934 ## FlyWheel : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995147 ## ForcePoint : https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-Forcepoint-Security-Manager ## Forescout : https://forescout.force.com/support/s/article/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228 ## ForgeRock : https://backstage.forgerock.com/knowledge/kb/article/a39102625 ## Fortinet : https://www.fortiguard.com/psirt/FG-IR-21-245 ## FTAPI : https://www.ftapi.com/blog/kritische-sicherheitslucke-in-log4j-ftapi-reagiert/# ## Fujitsu : https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-PSS-IS-2021-121000-Security-Notice-SF.pdf ## FusionAuth : https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/ # G ## Gearset : https://docs.gearset.com/en/articles/5806813-gearset-log4j-statement-dec-2021 ## Genesys : https://www.genesys.com/blog/post/genesys-update-on-the-apache-log4j-vulnerability ## Gerrit code review : https://www.gerritcodereview.com/2021-12-13-log4j-statement.html ## GFI : https://techtalk.gfi.com/impact-of-log4j-vulnerability-on-gfi/ ## Ghidra : https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning ## GitHub : https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ## GitHub Response : https://github.blog/2021-12-13-githubs-response-to-log4j-vulnerability-cve-2021-44228/ ## GitLab : https://forum.gitlab.com/t/cve-2021-4428/62763 ## GoAnywhere : https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps ## Google Cloud Global Products coverage : https://cloud.google.com/log4j2-security-advisory ## Google Cloud Armor WAF : https://cloud.google.com/blog/products/identity-security/cloud-armor-waf-rule-to-help-address-apache-log4j-vulnerability ## Grafana : https://grafana.com/blog/2021/12/14/grafana-labs-core-products-not-impacted-by-log4j-cve-2021-44228-and-related-vulnerabilities/ ## GratWiFi WARNING I can't confirm it: https://www.facebook.com/GratWiFi/posts/396447615600785 ## Gravitee.io : https://www.gravitee.io/news/about-the-log4j-cvss-10-critical-vulnerability ## GrayLog : https://www.graylog.org/post/graylog-update-for-log4j ## GreenShot : https://greenshot.atlassian.net/browse/BUG-2871 ## GuardedBox : https://twitter.com/GuardedBox/status/1469739834117799939 ## Guidewire : https://community.guidewire.com/s/article/Update-to-customers-who-have-questions-about-the-use-of-log4j-in-Guidewire-products # H ## HackerOne : https://twitter.com/jobertabma/status/1469490881854013444 ## HAProxy : https://www.haproxy.com/blog/december-2021-log4shell-mitigation/ ## Hashicorp : https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228/33138 ## Hazelcast : https://github.com/hazelcast/hazelcast/commit/ad951d3b2fa1ff3412219c1d2e03a31ddf1b3011 ## HCL Software BIGFIX: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486 ## HCL Software Notes, Domino, Verse, and Traveler : https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095516 ## Hewlett Packard Enterprise HPE : https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04215en_us ## Hewlett Packard Enterprise HPE GLOBAL : https://techhub.hpe.com/eginfolib/securityalerts/Apache%20Software%20Log4j/Apache_Software_Log4j.html ## Hitachi Vantara : https://knowledge.hitachivantara.com/Support_Information/Hitachi_Vantara_Security_Advisories/CVE-2021-44228_-_Apache_Log4j2 ## Honeywell : https://www.honeywell.com/us/en/press/2021/12/honeywells-statement-on-java-apache-log4j-logging-framework-vulnerability ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 ## Huawei : https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en ## Hubspot : https://community.hubspot.com/t5/APIs-Integrations/Log4J-day-zero-exploit-CVE-2021-44228/td-p/541949 # I ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 ## IBA-AG : https://www.iba-ag.com/en/security ## IBM : https://www.ibm.com/support/pages/node/6525548 ## IFS : https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436 ## IGEL : https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html ## Ignite Realtime : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## Illuminated Cloud : https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html ## IManage : https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e ## Imperva : https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day ## InfluxData : https://www.influxdata.com/blog/apache-log4j-vulnerability-cve-2021-44228/ ## Informatica : https://network.informatica.com/community/informatica-network/blog/2021/12/10/log4j-vulnerability-update ## Integrative Genomics Viewer IGV : https://github.com/igvteam/igv/commit/40aa5e0c6b5f2eac0a1528658189fd7de8f20347 ## Instructure : https://community.canvaslms.com/t5/Community-Users/Instructure-amp-the-Apache-Log4j2-Vulnerability/ba-p/501907 ## InterSystems : https://www.intersystems.com/gt/apache-log4j2/ ## iRedMail : https://forum.iredmail.org/topic18605-log4j-cve202144228.html ## Ironnet : https://www.ironnet.com/blog/ironnet-security-notifications-related-to-log4j-vulnerability ## Ivanti : https://forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US # J ## Jamasoftware : https://community.jamasoftware.com/communities/community-home/digestviewer/viewthread?MessageKey=06d26f9c-2abe-4c10-93d4-c0f6c8a01b22&CommunityKey=c9d20d4c-5bb6-4f19-92eb-e7cee0942d51&tab=digestviewer#bm06d26f9c-2abe-4c10-93d4-c0f6c8a01b22 ## JAMF : https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html ## Jaspersoft : https://community.jaspersoft.com/wiki/apache-log4j-vulnerability-update-jaspersoft-products ## JazzSM DASH IBM : https://www.ibm.com/support/pages/node/6525552 ## Jedox : https://www.jedox.com/en/trust/ ## Jenkins : https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/ ## JetBrains Global :https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/ ## JetBrains Teamcity : https://youtrack.jetbrains.com/issue/TW-74298 ## JetBrains YouTrack and Hub : https://youtrack.jetbrains.com/issue/JT-67582 ## JFROG : https://jfrog.com/knowledge-base/general-jfrog-services-are-not-affected-by-vulnerability-cve-2021-44228/ ## Jitterbit : https://success.jitterbit.com/display/DOC/Mitigating+the+Apache+Log4j2+JNDI+Vulnerability ## Jitsi : https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md ## JobRouter : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995497 ## Juniper Networks : https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259 # K ## K15t : https://help.k15t.com/k15t-apps-and-log4shell-193401141.html ## Kafka Connect CosmosDB : https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md ## Karakun : https://board.karakun.com/viewtopic.php?f=21&t=8351 ## Kaseya : https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 ## KEMP : https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit ## KEMP 2 : https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228- ## Kofax : https://knowledge.kofax.com/MFD_Productivity/SafeCom/Product_Information/SafeCom_and_Log4j_vulnerability_(CVE-2021-44228) ## Komoot Photon : https://github.com/komoot/photon/issues/620 ## Kronos UKG : https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US # L ## LabCollector : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995088 ## Lansweeper : https://www.lansweeper.com/vulnerability/critical-log4j-vulnerability-affects-millions-of-applications/ ## Laserfiche : https://answers.laserfiche.com/questions/194037/Do-any-Laserfiche-products-use-the-Apache-log4j-library#194038 ## LastPass : https://support.logmeininc.com/lastpass/help/log4j-vulnerability-faq-for-lastpass-universal-proxy ## LaunchDarkly : https://launchdarkly.com/blog/audit-shows-systems-unaffected-by-log4j/ ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell ## Lenovo : https://support.lenovo.com/ro/en/product_security/len-76573 ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## LibreNMS : https://community.librenms.org/t/is-librenms-affected-by-vulnerable-to-cve-2021-25218-cve-2021-44228/17675/6 ## LifeRay : https://liferay.dev/blogs/-/blogs/log4j2-zero-day-vulnerability ## Lightbend : https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 ## LiquidFiles : https://mailchi.mp/liquidfiles/liquidfiles-log4j?e=%5BUNIQID%5D ## LogicMonitor : https://www.logicmonitor.com/support/log4shell-security-vulnerability-cve-2021-44228 ## LogRhythm : https://community.logrhythm.com/t5/Product-Security/LogRhythm-Response-to-the-Apache-Log4J-Vulnerability-Log4Shell/td-p/494068 ## Looker : https://docs.google.com/document/d/e/2PACX-1vQGN1AYNMHxsRQ9AZNu1bKyTGRUSK_9xkQBge-nu4p8PYvBKIYHhc3914KTfVtDFIXtDhc3k6SZnR2M/pub # M ## Macchina io : https://twitter.com/macchina_io/status/1469611606569099269 ## MailCow : https://github.com/mailcow/mailcow-dockerized/issues/4375 ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/update-on-the-recent-apache-log4j2-vulnerability-impact-on-manageengine-on-premises-products-1 ## MathWorks Matlab : https://www.mathworks.com/matlabcentral/answers/1610640-apache-log4j-vulnerability-cve-2021-44228-how-does-it-affect-matlab-run-time ## Matomo : https://forum.matomo.org/t/matomo-is-not-concerned-by-the-log4j-security-breach-cve-2021-44228-discovered-on-december-2021-the-9th/44089 ## Mattermost FocalBoard : https://forum.mattermost.org/t/log4j-vulnerability-concern/12676 ## McAfee : https://kc.mcafee.com/corporate/index?page=content&id=KB95091 ## MEINBERG : https://www.meinbergglobal.com/english/news/meinberg-lantime-and-microsync-systems-not-at-risk-from-log4j-security-exploit.htm ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## MicroFocus : https://portal.microfocus.com/s/customportalsearch?language=en_US&searchtext=CVE-2021-44228 ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ ## Microstrategy : https://community.microstrategy.com/s/article/MicroStrategy-s-response-to-CVE-2021-44228-The-Log4j-0-Day-Vulnerability?language=en_US ## Mikrotik : https://forum.mikrotik.com/viewtopic.php?p=897938 ## Milestonesys : https://supportcommunity.milestonesys.com/s/article/Log4J-vulnerability-faq?language=en_US ## Mimecast : https://community.mimecast.com/s/article/Mimecast-Information-for-Customers-on-the-Log4Shell-Vulnerability ## Minecraft : https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition ## MISP : https://twitter.com/MISPProject/status/1470051242038673412 ## Mitel : https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0010 ## MongoDB : https://www.mongodb.com/blog/post/log4shell-vulnerability-cve-2021-44228-and-mongodb ## Moodle : https://moodle.org/mod/forum/discuss.php?d=429966 ## MoogSoft : https://servicedesk.moogsoft.com/hc/en-us/articles/4412463233811?input_string=log4j+vulnerability+%7C%7C+cve-2021-44228 ## Mulesoft : https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021 # N ## N-able : https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability ## Nagios : https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/ ## NELSON : https://github.com/getnelson/nelson/blob/f4d3dd1f1d4f8dfef02487f67aefb9c60ab48bf5/project/custom.scala ## NEO4J : https://community.neo4j.com/t/log4j-cve-mitigation-for-neo4j/48856 ## NetApp : https://security.netapp.com/advisory/ntap-20211210-0007/ ## Netflix : https://github.com/search?q=org%3ANetflix+CVE-2021-44228&type=commits ## Netgear : https://www.reddit.com/r/NETGEAR/comments/re5iqy/comment/ho9qlvb/ ## NewTek : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995403 ## NextGen Healthcare Mirth : https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 ## Nexus Group : https://doc.nexusgroup.com/pages/viewpage.action?pageId=83133294 ## Newrelic : https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-03/ ## NinjaRMM : https://ninjarmm.zendesk.com/hc/en-us/articles/4416226194189-12-10-21-Security-Declaration-NinjaOne-not-affected-by-CVE-2021-44228-log4j- ## Nutanix : https://download.nutanix.com/alerts/Security_Advisory_0023.pdf ## Nvidia : https://nvidia.custhelp.com/app/answers/detail/a_id/5294 # O ## Octopus : https://advisories.octopus.com/adv/December.2306508680.html ## Okta : https://sec.okta.com/articles/2021/12/log4shell ## Onespan :https://www.onespan.com/remote-code-execution-vulnerability-in-log4j2-cve-2018-11776 ## OnlyOffice : https://forum.onlyoffice.com/t/does-onlyoffice-documentserver-uses-log4j/841 ## Opengear : https://opengear.zendesk.com/hc/en-us/articles/4412713339419-CVE-2021-44228-aka-Log4Shell-Opengear-products-are-not-affected ## OpenHab : https://github.com/openhab/openhab-distro/pull/1343 ## OpenNMS : https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/ ## OpenMRS TALK : https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341 ## OpenSearch : https://discuss.opendistrocommunity.dev/t/log4j-patch-for-cve-2021-44228/7950 ## OpenText XMFax : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995966 ## OpenTripPlanner : https://github.com/opentripplanner/OpenTripPlanner/issues/3785 ## Oracle : https://www.oracle.com/security-alerts/alert-cve-2021-44228.html ## OSQUERY : https://twitter.com/osquery/status/1470831336118124549 ## OxygenXML : https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html # P ## Palo-Alto Networks : https://security.paloaltonetworks.com/CVE-2021-44228 ## PaperCut : https://www.papercut.com/kb/Main/Log4Shell-CVE-2021-44228 ## Parse.ly : https://blog.parse.ly/parse-ly-log4shell/ ## PasswordState : https://www.reddit.com/r/passwordstate/comments/rf7d62/log4j_zeroday_log4shell_vulnerability/ ## Pebblehost : https://help.pebblehost.com/en/article/patching-the-log4j-rce-exploit-14wyvz0/ ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability ## Pentaho :https://support.pentaho.com/hc/en-us/articles/4416229254541-log4j-2-zero-day-vulnerability-No-impact-to-supported-versions-of-Pentaho- ## Phenix Id : https://support.phenixid.se/uncategorized/log4j-fix/ ## Phillips : https://www.philips.com/a-w/security/security-advisories.html ## PingIdentity : https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228 ## Pitney Bowes : https://www.pitneybowes.com/us/support/apache-log4j-vulnerability.html ## Plesk : https://support.plesk.com/hc/en-us/articles/4412182812818-CVE-2021-44228-vulnerability-in-log4j-package-of-Apache ## Polycom : https://support.polycom.com/content/dam/polycom-support/global/documentation/plygn21-08-poly-systems-apache.pdf ## PortSwigger : https://forum.portswigger.net/thread/are-burp-collaborator-or-burp-enterprise-vulnerable-to-log4j-dc6524e0 ## Pretix : https://pretix.eu/about/de/blog/20211213-log4j/ ## PrimeKey : https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228 ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 ## Prosys : https://prosysopc.com/news/important-security-release/ ## Proxmox : https://forum.proxmox.com/threads/log4j-exploit-what-to-do.101254/#post-436880 ## PRTG Paessler : https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228 ## PTC : https://www.ptc.com/en/support/alerts/log4j%20zero%20day%20vulnerability%20-%2020211211 ## PTV Group : https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information ## Pulse Secure : https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/?kA13Z000000L3dR ## Puppet : https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/ @@ -228,101 +367,162 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # Q ## QF-Test : https://www.qfs.de/en/blog/article/no-log4j-vulnerability-in-qf-test.html ## Qlik : https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368 ## QNAP : https://www.qnap.com/en-uk/security-advisory/qsa-21-58 ## Quest KACE : https://support.quest.com/kace-systems-management-appliance/kb/335869/is-the-kace-sma-affected-by-cve-2021-44228 # R ## Radware : https://support.radware.com/app/answers/answer_view/a_id/1029752 ## Rapid7 : https://www.rapid7.com/blog/post/2021/12/14/update-on-log4shells-impact-on-rapid7-solutions-and-systems/ ## Raritan : https://www.raritan.com/support ## Red5Pro : https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/ ## RedHat : https://access.redhat.com/security/vulnerabilities/RHSB-2021-009 ## Redis : https://redis.com/security/notice-apache-log4j2-cve-2021-44228/ ## Revenera / Flexera : https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905 ## Riverbed : https://supportkb.riverbed.com/support/index?page=content&id=S35645 ## Rockwell Automation : https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605 ## Rosetta UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993903 ## Rosette.com : https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability ## Rubrik : https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK ## Ruckus wireless : https://support.ruckuswireless.com/security_bulletins/313 ## Runecast : https://www.runecast.com/blog/runecast-6-0-1-0-covers-apache-log4j-java-vulnerability ## RunDeck by PagerDuty : https://docs.rundeck.com/docs/history/CVEs/ ## RSA SecurID: https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501 ## RSA Netwitness : https://community.rsa.com/t5/netwitness-platform-product/netwitness-apache-vulnerability-log4j2-cve-2021-44228-nbsp/ta-p/660540 # S ## SAFE FME Server : https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j ## SAGE : https://www.sagecity.com/sage-global-solutions/sage-crm/f/sage-crm-announcements-news-and-alerts/178655/advisory-apache-log4j-vulnerability-cve-2021-44228 ## SailPoint : https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/ba-p/206681 ## Salesforce : https://help.salesforce.com/s/articleView?id=000363736&type=1 ## Sangoma :https://help.sangoma.com/community/s/article/Log4Shell ## SAP Advanced Platform : https://launchpad.support.sap.com/#/notes/3130698 ## SAP BusinessObjects : https://launchpad.support.sap.com/#/notes/3129956 ## SAP Global coverage : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3994039 ## SAS : https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html ## Savignano software solutions : https://savignano.atlassian.net/wiki/spaces/SNOTIFY/blog/2021/12/13/2839740417/No+Log4j+Vulnerability+in+S+Notify ## Schneider Electric : https://download.schneider-electric.com/files?p_Doc_Ref=SESB-2021-347-01 ## SDL worldServer : https://gateway.sdl.com/apex/communityknowledge?articleName=000017707 ## Seafile : https://forum.seafile.com/t/urgent-zero-day-exploit-in-log4j/15575 ## Seagull Scientific : https://support.seagullscientific.com/hc/en-us/articles/4415794235543-Apache-Log4Shell-Vulnerability ## SecurePoint : https://www.securepoint.de/news/details/sicherheitsluecke-log4j-securepoint-loesungen-nicht-betroffen.html ## Security Onion : https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html ## Seeburger : https://servicedesk.seeburger.de/portal/en-US/Knowledge/Article/?defId=101040&id=25486312&COMMAND=Open ## SentinelOne : https://www.sentinelone.com/blog/cve-2021-44228-staying-secure-apache-log4j-vulnerability/ ## SEP : https://support.sep.de/otrs/public.pl?Action=PublicFAQZoom;ItemID=132 ## Server Eye : https://www.server-eye.de/blog/sicherheitsluecke-log4j-server-eye-systeme-sind-nicht-betroffen/ ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 ## Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 ## Shibboleth : http://shibboleth.net/pipermail/announce/2021-December/000253.html ## Siemens : https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf ## Signald : https://gitlab.com/signald/signald/-/issues/259 ## SingleWire : https://support.singlewire.com/s/article/Apache-Log4j2-vulnerability-CVE-2021-44228 ## Sitecore : https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1001391 ## Skillable : https://skillable.com/log4shell/ ## SLF4J : http://slf4j.org/log4shell.html ## SmartBear : https://smartbear.com/security/cve-2021-44228/ ## SmileCDR : https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228 ## Snowflake : https://community.snowflake.com/s/article/No-Snowflake-exposure-to-Apache-Log4j-vulnerability-CVE-2021-44228 ## Snyk : https://updates.snyk.io/snyk%27s-cloud-platform-all-clear-from-log4j-exploits-216499 ## Spigot : https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/ ## Software AG : https://tech.forums.softwareag.com/t/log4j-zero-day-vulnerability/253849 ## SolarWinds : https://www.solarwinds.com/trust-center/security-advisories/cve-2021-44228 ## SonarSource : https://community.sonarsource.com/t/sonarqube-and-the-log4j-vulnerability/54721 ## Sonatype : https://blog.sonatype.com/a-new-0-day-log4j-vulnerability-discovered-in-the-wild ## SonicWall : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce ## Splashtop : https://support-splashtopbusiness.splashtop.com/hc/en-us/articles/4412788262811-Is-Splashtop-affected-by-Apache-Log4j- ## Splunk : https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html ## Spring Boot : https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot ## SOS Berlin : https://www.sos-berlin.com/en/news-mitigation-log4j-vulnerability ## StrangeBee TheHive & Cortex : https://blog.strangebee.com/apache-log4j-cve-2021-44228/ ## SumoLogic : https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12 ## Superna EYEGLASS : https://manuals.supernaeyeglass.com/project-technical-advisories-all-products/HTML/technical-advisories.html#h2__1912345025 ## Suprema Inc : https://www.supremainc.com/en/ ## SUSE : https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/ ## Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 ## Storagement : https://www.storagement.de/index.php?action=topicofthemonth&site=log4j ## Sumologic : https://docs.google.com/document/d/e/2PACX-1vSdeODZ2E5k0aZgHm06OJWhDQWgtxxB0ZIrTsuQjg5xaoxlogmTVGdOWoSFtDlZBdHzY6ET6k6Sk-g1/pub ## Sweepwidget : https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032 ## Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 ## Swyx : https://service.swyx.net/hc/de/articles/4412323539474 ## Syncplify : https://blog.syncplify.com/no-we-are-not-affected-by-log4j-vulnerability/ ## Synology : https://www.synology.com/en-global/security/advisory/Synology_SA_21_30 ## Synopsys : https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228 ## SysAid : https://www.sysaid.com/lp/important-update-regarding-apache-log4j ## Sysdig : https://sysdig.com/blog/cve-critical-vulnerability-log4j/ # T ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## Tanium : https://community.tanium.com/s/article/How-Tanium-Can-Help-with-CVE-2021-44228-Log4Shell#_Toc90296319 ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## Teamviewer : https://www.teamviewer.com/en/trust-center/security-bulletins/hotfix-log4j2-issue/ ## TechSmith : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995701 ## Tenable : https://www.tenable.com/log4j ## Thales : https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=02863d13db544110f0e3220805961914&sysparm_article=KB0025287 ## Thales (SafeNet) HSM : https://supportportal.thalesgroup.com/csm?id=kb_article_protected&sys_id=12acaed3dbd841105d310573f3961953 ## Threema UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## Tibco : https://www.tibco.com/support/notices/2021/12/apache-log4j-vulnerability-update ## TP-Link : https://community.tp-link.com/en/business/forum/topic/514452 ## TrendMicro : https://success.trendmicro.com/solution/000289940 ## Tricentis Tosca : https://support-hub.tricentis.com/open?number=NEW0001148&id=post ## Tripwire : https://www.tripwire.com/log4j # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 ## Ubuntu : https://ubuntu.com/security/CVE-2021-44228 ## Unify ATOS : https://networks.unify.com/security/advisories/OBSO-2112-01.pdf ## UniFlow : https://www.uniflow.global/en/security/security-and-maintenance/ ## Unimus : https://forum.unimus.net/viewtopic.php?f=7&t=1390#top ## USSIGNAL MSP : https://ussignal.com/blog/apache-log4j-vulnerability # V ## VArmour : https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Veeam : https://www.veeam.com/kb4254 ## Venafi : https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052070 ## Vertica : https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html # W ## Wallarm : https://lab.wallarm.com/cve-2021-44228-mitigation-update/ ## Wasp Barcode technologies : https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no ## WatchGuard / Secplicity / https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/ ## WildFlyAS : https://twitter.com/WildFlyAS/status/1469362190536818688 ## WitFoo : https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ ## Wodby Cloud : https://twitter.com/wodbycloud/status/1470125735914450950 ## World Programming WPS analytics : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995649 ## Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve ## WSO2 : https://github.com/wso2/security-tools/pull/169 # X ## XCP-ng : https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact ## XenForo : https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/ ## XPertDoc : https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727 ## Xray connector plugin : https://github.com/jenkinsci/xray-connector-plugin/issues/53 ## XWIKI : https://forum.xwiki.org/t/log4j-cve-2021-44228-log4shell-zero-day-vulnerability/9557 # Y ## Yandex-Cloud : https://github.com/yandex-cloud/docs/blob/6ff6c676787756e7dd6101c53b051e4cd04b3e85/ru/overview/security-bulletins/index.md#10122021--cve-2021-44228--%D1%83%D0%B4%D0%B0%D0%BB%D0%B5%D0%BD%D0%BD%D0%BE%D0%B5-%D0%B2%D1%8B%D0%BF%D0%BE%D0%BB%D0%BD%D0%B5%D0%BD%D0%B8%D0%B5-%D0%BA%D0%BE%D0%B4%D0%B0-log4shell-apache-log4j ## Yellowbrick : https://support.yellowbrick.com/hc/en-us/articles/4412586575379-Security-Advisory-Yellowbrick-is-NOT-Affected-by-the-Log4Shell-Vulnerability # Z ## Zabbix : https://blog.zabbix.com/zabbix-not-affected-by-the-log4j-exploit/17873/ ## ZAMMAD : https://community.zammad.org/t/cve-2021-44228-elasticsearch-users-be-aware/8256 ## Zaproxy : https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/ ## Zebra : https://www.zebra.com/us/en/support-downloads/lifeguard-security/cve-2021-442280-dubbed-log4shell-or-logjam-vulnerability.html ## Zellis : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3995461 ## Zendesk : https://support.zendesk.com/hc/en-us/articles/4413583476122 ## Zenoss : https://support.zenoss.com/hc/en-us ## Zerto : https://help.zerto.com/kb/000004822 ## Zesty : https://www.zesty.io/mindshare/company-announcements/log4j-exploit/ ## Zimbra : https://bugzilla.zimbra.com/show_bug.cgi?id=109428 ## ZPE systems Inc : https://support.zpesystems.com/portal/en/kb/articles/is-nodegrid-os-and-zpe-cloud-affected-by-cve-2021-44228-apache-log4j ## Zowe : https://github.com/zowe/community/issues/1381 ## ZSCALER : https://www.zscaler.fr/blogs/security-research/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021 ## Zyxel : https://www.zyxel.com/support/Zyxel_security_advisory_for_Apache_Log4j_RCE_vulnerability.shtml ## Errors, typos, something to say ? - If you want to add a link, comment or send it to me -
SwitHak revised this gist
Dec 14, 2021 . 1 changed file with 22 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -14,6 +14,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Apache Druid : https://github.com/apache/druid/pull/12051 ## Apache Flink : https://flink.apache.org/2021/12/10/log4j-cve.html ## Apache Guacamole https://issues.apache.org/jira/projects/GUACAMOLE/issues/GUACAMOLE-1474?filter=allissues ## Apache James : https://github.com/apache/james-project/pull/794 ## Apache LOG4J : https://logging.apache.org/log4j/2.x/security.html ## Apache Kafka : https://lists.apache.org/thread/lgbtvvmy68p0059yoyn9qxzosdmx4jdv ## Apache Solr : https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228 @@ -33,6 +34,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## AVM UNOFICIAl : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## AWS New : https://aws.amazon.com/security/security-bulletins/AWS-2021-006/ ## AWS OLD: https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ ## AXS Guard : https://www.axsguard.com/en_US/blog/security-news-4/log4j-vulnerability-77 ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 # B @@ -52,12 +54,14 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## ChaserSystems : https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected ## CheckPoint : https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176865&partition=General&product=IPS ## Ciphermail : https://www.ciphermail.com/blog/ciphermail-gateway-and-webmail-messenger-are-not-vulnerable-to-cve-2021-44228.html ## Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd ## Citrix : https://support.citrix.com/article/CTX335705 ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## Cloudian HyperStore : https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228 ## CPanel : https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ ## Code42 : https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_response_to_industry_security_incidents ## CodeBeamer : https://codebeamer.com/cb/wiki/19872365. ## CommVault https://community.commvault.com/technical-q-a-2/log4j-been-used-in-commvault-1985?postid=11745#post11745 ## ConcreteCMS.com : https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit ## Connect2id : https://connect2id.com/blog/connect2id-server-12-5-1 @@ -97,6 +101,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## F5 Networks : https://support.f5.com/csp/article/K19026212 ## F-Secure https://status.f-secure.com/incidents/sk8vmr0h34pd ## Fastly : https://www.fastly.com/blog/digging-deeper-into-log4shell-0day-rce-exploit-found-in-log4j ## FAST LTA : https://blog.fast-lta.de/en/log4j2-vulnerability ## ForcePoint : https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-Forcepoint-Security-Manager ## Forescout : https://forescout.force.com/support/s/article/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228 ## ForgeRock : https://backstage.forgerock.com/knowledge/kb/book/b21824339 @@ -112,25 +117,27 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## GoAnywhere : https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps ## Google Cloud Global Products coverage : https://cloud.google.com/log4j2-security-advisory ## Google Cloud Armor WAF : https://cloud.google.com/blog/products/identity-security/cloud-armor-waf-rule-to-help-address-apache-log4j-vulnerability ## GitLab : https://forum.gitlab.com/t/cve-2021-4428/62763 ## GrayLog : https://www.graylog.org/post/graylog-update-for-log4j ## GratWiFi WARNING I can't confirm it: https://www.facebook.com/GratWiFi/posts/396447615600785 ## GuardedBox : https://twitter.com/GuardedBox/status/1469739834117799939 ## Guidewire : https://community.guidewire.com/s/article/Update-to-customers-who-have-questions-about-the-use-of-log4j-in-Guidewire-products # H ## HackerOne : https://twitter.com/jobertabma/status/1469490881854013444 ## Hazelcast : https://github.com/hazelcast/hazelcast/commit/ad951d3b2fa1ff3412219c1d2e03a31ddf1b3011 ## HCL Software : https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486 ## Hewlett Packard Enterprise HPE : https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us ## Hitachi Vantara : https://knowledge.hitachivantara.com/Support_Information/Hitachi_Vantara_Security_Advisories/CVE-2021-44228_-_Apache_Log4j2 ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 ## Huawei : https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en # I ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 ## IBM : https://www.ibm.com/support/pages/node/6525548 ## Ignite Realtime : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## Integrative Genomics Viewer IGV : https://github.com/igvteam/igv/commit/40aa5e0c6b5f2eac0a1528658189fd7de8f20347 ## IManage : https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e ## Imperva : https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day @@ -156,6 +163,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # L ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## LifeRay : https://liferay.dev/blogs/-/blogs/log4j2-zero-day-vulnerability ## Lightbend : https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 ## LiquidFiles : https://mailchi.mp/liquidfiles/liquidfiles-log4j?e=%5BUNIQID%5D ## LogRhythm CISO email I can't confirmed : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3992599 @@ -168,7 +176,9 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Mattermost FocalBoard : https://forum.mattermost.org/t/log4j-vulnerability-concern/12676 ## McAfee : https://kc.mcafee.com/corporate/index?page=content&id=KB95091 ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## MicroFocus FILR : https://portal.microfocus.com/s/article/KM000003003?language=en_US ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ ## Microstrategy : https://community.microstrategy.com/s/article/MicroStrategy-s-response-to-CVE-2021-44228-The-Log4j-0-Day-Vulnerability?language=en_US ## Minecraft : https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition ## MISP : https://twitter.com/MISPProject/status/1470051242038673412 ## MoogSoft : https://servicedesk.moogsoft.com/hc/en-us/articles/4412463233811?input_string=log4j+vulnerability+%7C%7C+cve-2021-44228 @@ -181,6 +191,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## NetApp : https://security.netapp.com/advisory/ntap-20211210-0007/ ## Netflix : https://github.com/search?q=org%3ANetflix+CVE-2021-44228&type=commits ## NextGen Healthcare Mirth : https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 ## Nexus Group : https://doc.nexusgroup.com/pages/viewpage.action?pageId=83133294 ## Newrelic : https://discuss.newrelic.com/t/log4j-zero-day-vulnerability-and-the-new-relic-java-agent/170322 ## Nutanix : https://download.nutanix.com/alerts/Security_Advisory_0023.pdf @@ -203,14 +214,19 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## PingIdentity : https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228 ## Plesk : https://support.plesk.com/hc/en-us/articles/4412182812818-CVE-2021-44228-vulnerability-in-log4j-package-of-Apache ## Positive Technologies : https://twitter.com/ptsecurity/status/1469398376978522116 ## Pretix : https://pretix.eu/about/de/blog/20211213-log4j/ ## PrimeKey : https://support.primekey.com/news/posts/information-about-primekey-products-and-log4j-vulnerability-cve-2021-44228 ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 ## PRTG Paessler : https://kb.paessler.com/en/topic/90213-is-prtg-affected-by-cve-2021-44228 ## PTV Group : https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information ## Pulse Secure : https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/?kA13Z000000L3dR ## Puppet : https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/ ## Pure Storage : https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_(%22log4j%22) ## PWM Project : https://github.com/pwm-project/pwm/issues/628 # Q ## QF-Test : https://www.qfs.de/en/blog/article/no-log4j-vulnerability-in-qf-test.html ## Qlik : https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368 ## Quest KACE : https://support.quest.com/kace-systems-management-appliance/kb/335869/is-the-kace-sma-affected-by-cve-2021-44228 @@ -221,6 +237,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Revenera / Flexera : https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905 ## Riverbed : https://supportkb.riverbed.com/support/index?page=content&id=S35645 ## Roset.com : https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability ## Runecast : https://www.runecast.com/blog/runecast-6-0-1-0-covers-apache-log4j-java-vulnerability ## RunDeck by PagerDuty : https://docs.rundeck.com/docs/history/CVEs/ ## RSA : https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501 ## Rubrik : https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK @@ -251,11 +268,13 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce ## Splunk : https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html ## Spring Boot : https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot ## SOS Berlin : https://www.sos-berlin.com/en/news-mitigation-log4j-vulnerability ## SumoLogic : https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12 ## SUSE : https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/ ## Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 ## Sweepwidget : https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032 ## Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 ## Synology : https://www.synology.com/en-global/security/advisory/Synology_SA_21_30 ## Synopsys : https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228 ## SysAid : https://www.sysaid.com/lp/important-update-regarding-apache-log4j ## Sysdig : https://sysdig.com/blog/cve-critical-vulnerability-log4j/ @@ -264,6 +283,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## Threema UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## TP-Link : https://community.tp-link.com/en/business/forum/topic/514452 ## TrendMicro : https://success.trendmicro.com/solution/000289940 ## Tricentis Tosca : https://support-hub.tricentis.com/open?number=NEW0001148&id=post @@ -291,6 +311,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # X ## XCP-ng : https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact ## Xray connector plugin : https://github.com/jenkinsci/xray-connector-plugin/issues/53 # Y ## Yandex-Cloud : https://github.com/yandex-cloud/docs/blob/6ff6c676787756e7dd6101c53b051e4cd04b3e85/ru/overview/security-bulletins/index.md#10122021--cve-2021-44228--%D1%83%D0%B4%D0%B0%D0%BB%D0%B5%D0%BD%D0%BD%D0%BE%D0%B5-%D0%B2%D1%8B%D0%BF%D0%BE%D0%BB%D0%BD%D0%B5%D0%BD%D0%B8%D0%B5-%D0%BA%D0%BE%D0%B4%D0%B0-log4shell-apache-log4j -
SwitHak revised this gist
Dec 13, 2021 . 1 changed file with 20 additions and 5 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -19,9 +19,11 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Apache Solr : https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228 ## Apache Struts : https://struts.apache.org/announce-2021#a20211212-2 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## Apigee : https://status.apigee.com/incidents/3cgzb0q2r10p ## Appdynamics : https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Ariba : https://connectsupport.ariba.com/sites#announcements-display&/Event/908469 ## Arista : https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070 ## ArrayNetworks : https://twitter.com/ArraySupport/status/1470141638571745282 ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html @@ -64,23 +66,27 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## ControlUp : https://status.controlup.com/incidents/qqyvh7b1dz8k ## Coralogix : https://twitter.com/Coralogix/status/1469713430659559425 ## CouchBase : https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402 ## CryptShare : https://www.cryptshare.com/en/support/cryptshare-support/#c67572 ## CyberArk : https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228 ## Cybereason : https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228 # D ## Dataminer : https://community.dataminer.services/responding-to-log4shell-vulnerability/ ## Datto : https://www.datto.com/blog/dattos-response-to-log4shell ## Debian : https://security-tracker.debian.org/tracker/CVE-2021-44228 ## Dell : https://www.dell.com/support/kbdoc/fr-fr/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## DELL : https://www.dell.com/support/kbdoc/en-uk/000194416/additional-information-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ ## Docusign : https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability ## dCache.org : https://www.dcache.org/post/log4j-vulnerability/ ## DCM4CHE.org : https://github.com/dcm4che/dcm4che/issues/1050 ## DRAW.IO : https://twitter.com/drawio/status/1470061320066277382 ## DropWizard : https://twitter.com/dropwizardio/status/1469285337524580359 ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 # E ## Eclipse Foundation : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3992521 ## EHRBase : https://github.com/ehrbase/ehrbase/issues/700 ## Elastic : https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## ESET : https://forum.eset.com/topic/30691-log4j-vulnerability/?do=findComment&comment=143745 ## ESRI : https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/ @@ -95,6 +101,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Forescout : https://forescout.force.com/support/s/article/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228 ## ForgeRock : https://backstage.forgerock.com/knowledge/kb/book/b21824339 ## Fortinet : https://www.fortiguard.com/psirt/FG-IR-21-245 ## FTAPI : https://docs.ftapi.com/display/RN/4.12.2 ## FusionAuth : https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/ # G @@ -113,9 +120,12 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # H ## HackerOne : https://twitter.com/jobertabma/status/1469490881854013444 ## HCL Software : https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486 ## Hewlett Packard Enterprise HPE : https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us ## Hitachi Vantara : https://knowledge.hitachivantara.com/Support_Information/Hitachi_Vantara_Security_Advisories/CVE-2021-44228_-_Apache_Log4j2 ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 ## Huawei : https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en # I ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 @@ -140,7 +150,8 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Kafka Connect CosmosDB : https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md ## Kaseya : https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 ## KEMP : https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit ## Komoot Photon : https://github.com/komoot/photon/issues/620 # L ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell @@ -152,7 +163,8 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # M ## Macchina io : https://twitter.com/macchina_io/status/1469611606569099269 ## MailCow : https://github.com/mailcow/mailcow-dockerized/issues/4375 ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus ## ManageEngine Zoho : https://pitstop.manageengine.com/portal/en/community/topic/log4j-security-issue ## Mattermost FocalBoard : https://forum.mattermost.org/t/log4j-vulnerability-concern/12676 ## McAfee : https://kc.mcafee.com/corporate/index?page=content&id=KB95091 ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 @@ -193,6 +205,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Positive Technologies : https://twitter.com/ptsecurity/status/1469398376978522116 ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 ## PTV Group : https://company.ptvgroup.com/en/resources/service-support/log4j-latest-information ## Pulse Secure : https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/?kA13Z000000L3dR ## Puppet : https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/ ## Pure Storage : https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_(%22log4j%22) @@ -206,6 +219,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Red5Pro : https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/ ## RedHat : https://access.redhat.com/security/cve/cve-2021-44228 ## Revenera / Flexera : https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905 ## Riverbed : https://supportkb.riverbed.com/support/index?page=content&id=S35645 ## Roset.com : https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability ## RunDeck by PagerDuty : https://docs.rundeck.com/docs/history/CVEs/ ## RSA : https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501 @@ -240,6 +254,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## SumoLogic : https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12 ## SUSE : https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/ ## Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 ## Sweepwidget : https://sweepwidget.com/view/23032-v9f40ns1/4zow83-23032 ## Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 ## Synopsys : https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228 ## SysAid : https://www.sysaid.com/lp/important-update-regarding-apache-log4j @@ -261,7 +276,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## VArmour : https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052058 ## Veeam : https://www.veeam.com/kb4254 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html -
SwitHak revised this gist
Dec 13, 2021 . 1 changed file with 3 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -98,6 +98,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## FusionAuth : https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/ # G ## Gearset : https://docs.gearset.com/en/articles/5806813-gearset-log4j-statement-dec-2021 ## Genesys : https://www.genesys.com/blog/post/genesys-update-on-the-apache-log4j-vulnerability ## Ghidra : https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning ## GitHub : https://github.com/advisories/GHSA-jfh8-c2jp-5v3q @@ -132,13 +133,14 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## JazzSM DASH IBM : https://www.ibm.com/support/pages/node/6525552 ## Jenkins : https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/ ## JetBrains Teamcity : https://youtrack.jetbrains.com/issue/TW-74298 ## JFROG : https://jfrog.com/knowledge-base/general-jfrog-services-are-not-affected-by-vulnerability-cve-2021-44228/ ## Jitsi : https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md # K ## Kafka Connect CosmosDB : https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md ## Kaseya : https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 ## Kommot Photon : https://github.com/komoot/photon/issues/620 # L ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell -
SwitHak revised this gist
Dec 13, 2021 . 1 changed file with 23 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -13,11 +13,13 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Akamai : https://www.akamai.com/blog/news/CVE-2021-44228-Zero-Day-Vulnerability ## Apache Druid : https://github.com/apache/druid/pull/12051 ## Apache Flink : https://flink.apache.org/2021/12/10/log4j-cve.html ## Apache Guacamole https://issues.apache.org/jira/projects/GUACAMOLE/issues/GUACAMOLE-1474?filter=allissues ## Apache LOG4J : https://logging.apache.org/log4j/2.x/security.html ## Apache Kafka : https://lists.apache.org/thread/lgbtvvmy68p0059yoyn9qxzosdmx4jdv ## Apache Solr : https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228 ## Apache Struts : https://struts.apache.org/announce-2021#a20211212-2 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## Appdynamics : https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Arista : https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070 @@ -26,13 +28,15 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Automox : https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 ## Avantra SYSLINK : https://support.avantra.com/support/solutions/articles/44002291388-cve-2021-44228-log4j-2-vulnerability ## Avaya : https://support.avaya.com/helpcenter/getGenericDetails?detailId=1399839287609 ## AVM UNOFICIAl : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## AWS New : https://aws.amazon.com/security/security-bulletins/AWS-2021-006/ ## AWS OLD: https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 # B ## BACKBLAZE : https://twitter.com/backblaze/status/1469477224277368838 ## BeyondTrust Bomgar : https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542 ## BigBlueButton : https://github.com/bigbluebutton/bigbluebutton/issues/13897#issuecomment-991652632 ## BitDefender : https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BMC Software : https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability @@ -41,13 +45,15 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Broadcom Automic Automation : https://knowledge.broadcom.com/external/article?articleId=230308 # C ## Camunda : https://forum.camunda.org/t/cve-2021-44228-log4j-2-exploit/31871/4 ## CarbonBlack : https://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134 ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## ChaserSystems : https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected ## CheckPoint : https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176865&partition=General&product=IPS ## Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd ## Citrix : https://support.citrix.com/article/CTX335705 ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## Cloudian HyperStore : https://cloudian-support.force.com/s/article/SECURITY-Cloudian-HyperStore-Log4j-vulnerability-CVE-2021-44228 ## CPanel : https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ ## Code42 : https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_response_to_industry_security_incidents ## CommVault https://community.commvault.com/technical-q-a-2/log4j-been-used-in-commvault-1985?postid=11745#post11745 @@ -65,6 +71,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Datto : https://www.datto.com/blog/dattos-response-to-log4shell ## Debian : https://security-tracker.debian.org/tracker/CVE-2021-44228 ## Dell : https://www.dell.com/support/kbdoc/fr-fr/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## DELL : https://www.dell.com/support/kbdoc/en-uk/000194416/additional-information-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228 ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ ## Docusign : https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability ## DCM4CHE.org : https://github.com/dcm4che/dcm4che/issues/1050 @@ -78,6 +85,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## ESET : https://forum.eset.com/topic/30691-log4j-vulnerability/?do=findComment&comment=143745 ## ESRI : https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/ ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 ## Extreme Networks : https://extremeportal.force.com/ExtrArticleDetail?an=000100806 # F ## F5 Networks : https://support.f5.com/csp/article/K19026212 @@ -106,6 +114,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## HCL Software : https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486 ## Huawei : https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 ## Hewlett Packard Enterprise HPE : https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us # I ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 @@ -141,11 +150,14 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # M ## Macchina io : https://twitter.com/macchina_io/status/1469611606569099269 ## MailCow : https://github.com/mailcow/mailcow-dockerized/issues/4375 ## ManageEngine : https://pitstop.manageengine.com/portal/en/community/topic/log4j-ad-manager-plus ## Mattermost FocalBoard : https://forum.mattermost.org/t/log4j-vulnerability-concern/12676 ## McAfee : https://kc.mcafee.com/corporate/index?page=content&id=KB95091 ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ ## Minecraft : https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition ## MISP : https://twitter.com/MISPProject/status/1470051242038673412 ## MoogSoft : https://servicedesk.moogsoft.com/hc/en-us/articles/4412463233811?input_string=log4j+vulnerability+%7C%7C+cve-2021-44228 ## Mulesoft : https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021 # N @@ -155,24 +167,27 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## NetApp : https://security.netapp.com/advisory/ntap-20211210-0007/ ## Netflix : https://github.com/search?q=org%3ANetflix+CVE-2021-44228&type=commits ## NextGen Healthcare Mirth : https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 ## Newrelic : https://discuss.newrelic.com/t/log4j-zero-day-vulnerability-and-the-new-relic-java-agent/170322 ## Nutanix : https://download.nutanix.com/alerts/Security_Advisory_0023.pdf # O ## Okta : https://sec.okta.com/articles/2021/12/log4shell ## Opengear : https://opengear.zendesk.com/hc/en-us/articles/4412713339419-CVE-2021-44228-aka-Log4Shell-Opengear-products-are-not-affected ## OpenHab : https://github.com/openhab/openhab-distro/pull/1343 ## OpenNMS : https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/ ## OpenMRS TALK : https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341 ## OpenSearch : https://discuss.opendistrocommunity.dev/t/log4j-patch-for-cve-2021-44228/7950 ## Oracle : https://www.oracle.com/security-alerts/alert-cve-2021-44228.html ## OxygenXML : https://www.oxygenxml.com/security/advisory/CVE-2021-44228.html # P ## Palo-Alto Networks : https://security.paloaltonetworks.com/CVE-2021-44228 ## PaperCut : https://www.papercut.com/support/known-issues/#PO-684 ## Parse.ly : https://blog.parse.ly/parse-ly-log4shell/ ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability ## Phenix Id : https://support.phenixid.se/uncategorized/log4j-fix/ ## PingIdentity : https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228 ## Plesk : https://support.plesk.com/hc/en-us/articles/4412182812818-CVE-2021-44228-vulnerability-in-log4j-package-of-Apache ## Positive Technologies : https://twitter.com/ptsecurity/status/1469398376978522116 ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 @@ -199,9 +214,10 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## SailPoint : https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/ba-p/206681 ## Salesforce : https://help.salesforce.com/s/articleView?id=000363736&type=1 ## SAP BusinessObjects : https://launchpad.support.sap.com/#/notes/3129956 ## SAP Global coverage : https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-center/sap-tc-01-5025.pdf ## SAS : https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html ## SDL worldServer : https://gateway.sdl.com/apex/communityknowledge?articleName=000017707 ## Seafile : https://forum.seafile.com/t/urgent-zero-day-exploit-in-log4j/15575 ## Security Onion : https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 ## Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 @@ -230,6 +246,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # T ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## Threema UNOFICIAL : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3993316 ## TrendMicro : https://success.trendmicro.com/solution/000289940 ## Tricentis Tosca : https://support-hub.tricentis.com/open?number=NEW0001148&id=post @@ -241,13 +258,15 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # V ## VArmour : https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Veritas NetBackup : https://www.veritas.com/content/support/en_US/article.100052058 ## Veeam : https://forums.veeam.com/veeam-backup-for-azure-f59/log4j-cve-2021-44228-vulnerability-t78225.html#p438231 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html # W ## Wallarm : https://lab.wallarm.com/cve-2021-44228-mitigation-update/ ## WatchGuard / Secplicity / https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/ ## WildFlyAS : https://twitter.com/WildFlyAS/status/1469362190536818688 ## WitFoo : https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ ## Wodby Cloud : https://twitter.com/wodbycloud/status/1470125735914450950 ## Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve @@ -264,6 +283,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Zaproxy : https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/ ## Zerto : https://help.zerto.com/kb/000004822 ## Zesty : https://www.zesty.io/mindshare/company-announcements/log4j-exploit/ ## Zimbra : https://forums.zimbra.org/viewtopic.php?f=15&t=70240 ## ZSCALER : https://www.zscaler.fr/blogs/security-research/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021 ## Errors, typos, something to say ? -
SwitHak revised this gist
Dec 13, 2021 . No changes.There are no files selected for viewing
-
SwitHak revised this gist
Dec 13, 2021 . 1 changed file with 20 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -20,6 +20,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Arista : https://www.arista.com/en/support/advisories-notices/security-advisories/13425-security-advisory-0070 ## ArrayNetworks : https://twitter.com/ArraySupport/status/1470141638571745282 ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html ## Automox : https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 @@ -31,20 +32,24 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # B ## BACKBLAZE : https://twitter.com/backblaze/status/1469477224277368838 ## BeyondTrust Bomgar : https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542 ## BitDefender : https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BMC Software : https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability ## Boomi DELL : https://community.boomi.com/s/question/0D56S00009UQkx4SAD/is-boomi-installation-moleculegateway-protected-from-cve202144228-log4j ## Broadcom : https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 ## Broadcom Automic Automation : https://knowledge.broadcom.com/external/article?articleId=230308 # C ## CarbonBlack : https://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134 ## Cerberus FTP : https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability ## ChaserSystems : https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/#are-chasers-products-affected ## CheckPoint : https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176865&partition=General&product=IPS ## Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd ## Citrix : https://support.citrix.com/article/CTX335705 ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## CPanel : https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ ## Code42 : https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_response_to_industry_security_incidents ## CommVault https://community.commvault.com/technical-q-a-2/log4j-been-used-in-commvault-1985?postid=11745#post11745 ## ConcreteCMS.com : https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit ## Connect2id : https://connect2id.com/blog/connect2id-server-12-5-1 @@ -62,6 +67,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Dell : https://www.dell.com/support/kbdoc/fr-fr/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ ## Docusign : https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability ## DCM4CHE.org : https://github.com/dcm4che/dcm4che/issues/1050 ## DRAW.IO : https://twitter.com/drawio/status/1470061320066277382 ## DropWizard : https://twitter.com/dropwizardio/status/1469285337524580359 ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 @@ -103,10 +109,13 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # I ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 ## IBM : https://www.ibm.com/support/pages/node/6525548 ## Ignite Realtime : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## IManage : https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e ## Imperva : https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day ## Informatica : https://network.informatica.com/community/informatica-network/blog/2021/12/10/log4j-vulnerability-update ## Ironnet : https://www.ironnet.com/blog/ironnet-security-notifications-related-to-log4j-vulnerability ## Ivanti : https://forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US # J @@ -126,6 +135,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## Lightbend : https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 ## LiquidFiles : https://mailchi.mp/liquidfiles/liquidfiles-log4j?e=%5BUNIQID%5D ## LogRhythm CISO email I can't confirmed : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3992599 # M @@ -165,6 +175,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## PingIdentity : https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228 ## Positive Technologies : https://twitter.com/ptsecurity/status/1469398376978522116 ## Progress / IpSwitch : https://www.progress.com/security ## ProofPoint : https://proofpointcommunities.force.com/community/s/article/Proofpoint-Statement-Regarding-CVE-2021-44228-Java-logging-package-log4j2 ## Pulse Secure : https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/?kA13Z000000L3dR ## Puppet : https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/ ## Pure Storage : https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_(%22log4j%22) @@ -178,6 +189,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Red5Pro : https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/ ## RedHat : https://access.redhat.com/security/cve/cve-2021-44228 ## Revenera / Flexera : https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905 ## Roset.com : https://support.rosette.com/hc/en-us/articles/4416216525965-Log4j-Vulnerability ## RunDeck by PagerDuty : https://docs.rundeck.com/docs/history/CVEs/ ## RSA : https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501 ## Rubrik : https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK @@ -189,10 +201,12 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## SAP BusinessObjects : https://launchpad.support.sap.com/#/notes/3129956 ## SAP Global coverage : https://launchpad.support.sap.com/#/notes/3129930 ## SAS : https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html ## SDL worldServer : https://gateway.sdl.com/apex/communityknowledge?articleName=000017707 ## Security Onion : https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 ## Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 ## Shibboleth : http://shibboleth.net/pipermail/announce/2021-December/000253.html ## Siemens : https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf ## Signald : https://gitlab.com/signald/signald/-/issues/259 ## Skillable : https://skillable.com/log4shell/ ## SLF4J : http://slf4j.org/log4shell.html @@ -205,22 +219,27 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce ## Splunk : https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html ## Spring Boot : https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot ## SumoLogic : https://help.sumologic.com/Release-Notes/Collector-Release-Notes#december-11-2021-19-361-12 ## SUSE : https://www.suse.com/c/suse-statement-on-log4j-log4shell-cve-2021-44228-vulnerability/ ## Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 ## Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 ## Synopsys : https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228 ## SysAid : https://www.sysaid.com/lp/important-update-regarding-apache-log4j ## Sysdig : https://sysdig.com/blog/cve-critical-vulnerability-log4j/ # T ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## TrendMicro : https://success.trendmicro.com/solution/000289940 ## Tricentis Tosca : https://support-hub.tricentis.com/open?number=NEW0001148&id=post # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 ## Ubuntu : https://ubuntu.com/security/CVE-2021-44228 ## USSIGNAL MSP : https://ussignal.com/blog/apache-log4j-vulnerability # V ## VArmour : https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Veeam : https://forums.veeam.com/veeam-backup-for-azure-f59/log4j-cve-2021-44228-vulnerability-t78225.html#p438231 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md -
SwitHak revised this gist
Dec 13, 2021 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -20,6 +20,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## ArrayNetworks : https://twitter.com/ArraySupport/status/1470141638571745282 ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html ## Automox : https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 ## Avantra SYSLINK : https://support.avantra.com/support/solutions/articles/44002291388-cve-2021-44228-log4j-2-vulnerability @@ -229,6 +230,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Wallarm : https://lab.wallarm.com/cve-2021-44228-mitigation-update/ ## WatchGuard / Secplicity / https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/ ## WitFoo : https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ ## Wodby Cloud : https://twitter.com/wodbycloud/status/1470125735914450950 ## Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve ## WSO2 : https://github.com/wso2/security-tools/pull/169 -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 5 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -4,6 +4,11 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) - If you want to add a link, comment or send it to me - Feel free to report any mistake directly below in the comment or in DM on Twitter [@SwitHak](https://twitter.com/SwitHak) # Other great ressources - Royce Williams list is different, listed by vendors responses: - https://www.techsolvency.com/story-so-far/cve-2021-44228-log4j-log4shell/ - TBD # A ## Akamai : https://www.akamai.com/blog/news/CVE-2021-44228-Zero-Day-Vulnerability ## Apache Druid : https://github.com/apache/druid/pull/12051 -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -74,6 +74,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## ForcePoint : https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-Forcepoint-Security-Manager ## Forescout : https://forescout.force.com/support/s/article/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228 ## ForgeRock : https://backstage.forgerock.com/knowledge/kb/book/b21824339 ## Fortinet : https://www.fortiguard.com/psirt/FG-IR-21-245 ## FusionAuth : https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/ # G -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -11,6 +11,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Apache LOG4J : https://logging.apache.org/log4j/2.x/security.html ## Apache Kafka : https://lists.apache.org/thread/lgbtvvmy68p0059yoyn9qxzosdmx4jdv ## Apache Solr : https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228 ## Apache Struts : https://struts.apache.org/announce-2021#a20211212-2 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 @@ -55,6 +56,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Dell : https://www.dell.com/support/kbdoc/fr-fr/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ ## Docusign : https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability ## DRAW.IO : https://twitter.com/drawio/status/1470061320066277382 ## DropWizard : https://twitter.com/dropwizardio/status/1469285337524580359 ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 @@ -93,6 +95,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 # I ## I2P : https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228 ## Ignite Realtime : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## Imperva : https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -131,6 +131,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # N ## N-able : https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability ## NELSON : https://github.com/getnelson/nelson/blob/f4d3dd1f1d4f8dfef02487f67aefb9c60ab48bf5/project/custom.scala ## NEO4J : https://community.neo4j.com/t/log4j-cve-mitigation-for-neo4j/48856 ## NetApp : https://security.netapp.com/advisory/ntap-20211210-0007/ ## Netflix : https://github.com/search?q=org%3ANetflix+CVE-2021-44228&type=commits ## NextGen Healthcare Mirth : https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 0 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -201,7 +201,6 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # T ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## TrendMicro : https://success.trendmicro.com/solution/000289940 -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -207,6 +207,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 ## Ubuntu : https://ubuntu.com/security/CVE-2021-44228 ## USSIGNAL MSP : https://ussignal.com/blog/apache-log4j-vulnerability # V -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 7 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -62,6 +62,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Eclipse Foundation : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3992521 ## Elastic : https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## ESET : https://forum.eset.com/topic/30691-log4j-vulnerability/?do=findComment&comment=143745 ## ESRI : https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-software-and-cve-2021-44228-aka-log4shell-aka-logjam/ ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 # F @@ -70,6 +71,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Fastly : https://www.fastly.com/blog/digging-deeper-into-log4shell-0day-rce-exploit-found-in-log4j ## ForcePoint : https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-Forcepoint-Security-Manager ## Forescout : https://forescout.force.com/support/s/article/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228 ## ForgeRock : https://backstage.forgerock.com/knowledge/kb/book/b21824339 ## FusionAuth : https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/ # G @@ -82,6 +84,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## GrayLog : https://www.graylog.org/post/graylog-update-for-log4j ## GratWiFi WARNING I can't confirm it: https://www.facebook.com/GratWiFi/posts/396447615600785 ## GuardedBox : https://twitter.com/GuardedBox/status/1469739834117799939 ## Guidewire : https://community.guidewire.com/s/article/Update-to-customers-who-have-questions-about-the-use-of-log4j-in-Guidewire-products # H ## HackerOne : https://twitter.com/jobertabma/status/1469490881854013444 @@ -90,6 +93,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 # I ## Ignite Realtime : https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108 ## Imperva : https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/ ## Inductive Automation : https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day ## Informatica : https://network.informatica.com/community/informatica-network/blog/2021/12/10/log4j-vulnerability-update @@ -183,9 +187,11 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## SLF4J : http://slf4j.org/log4shell.html ## SmileCDR : https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228 ## Software AG : https://tech.forums.softwareag.com/t/log4j-zero-day-vulnerability/253849 ## SolarWinds : https://www.solarwinds.com/trust-center/security-advisories/cve-2021-44228 ## SonarSource : https://community.sonarsource.com/t/sonarqube-and-the-log4j-vulnerability/54721 ## Sonatype : https://blog.sonatype.com/a-new-0-day-log4j-vulnerability-discovered-in-the-wild ## SonicWall : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce ## Splunk : https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html ## Spring Boot : https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot ## SUSE : https://www.suse.com/security/cve/CVE-2021-44228.html -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 15 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -16,8 +16,10 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html ## Automox : https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 ## Avantra SYSLINK : https://support.avantra.com/support/solutions/articles/44002291388-cve-2021-44228-log4j-2-vulnerability ## Avaya : https://support.avaya.com/helpcenter/getGenericDetails?detailId=1399839287609 ## AWS New : https://aws.amazon.com/security/security-bulletins/AWS-2021-006/ ## AWS OLD: https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 # B @@ -41,6 +43,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Connect2id : https://connect2id.com/blog/connect2id-server-12-5-1 ## ConnectWise : https://www.connectwise.com/company/trust/advisories ## ContrastSecurity : https://support.contrastsecurity.com/hc/en-us/articles/4412612486548 ## ControlUp : https://status.controlup.com/incidents/qqyvh7b1dz8k ## Coralogix : https://twitter.com/Coralogix/status/1469713430659559425 ## CouchBase : https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402 ## CyberArk : https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228 @@ -74,8 +77,10 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Ghidra : https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning ## GitHub : https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ## GoAnywhere : https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps ## Google Cloud Global Products coverage : https://cloud.google.com/log4j2-security-advisory ## Google Cloud Armor WAF : https://cloud.google.com/blog/products/identity-security/cloud-armor-waf-rule-to-help-address-apache-log4j-vulnerability ## GrayLog : https://www.graylog.org/post/graylog-update-for-log4j ## GratWiFi WARNING I can't confirm it: https://www.facebook.com/GratWiFi/posts/396447615600785 ## GuardedBox : https://twitter.com/GuardedBox/status/1469739834117799939 # H @@ -107,6 +112,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## Lightbend : https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 ## LogRhythm CISO email I can't confirmed : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3992599 # M ## Macchina io : https://twitter.com/macchina_io/status/1469611606569099269 @@ -115,7 +121,8 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ ## Minecraft : https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition ## MISP : https://twitter.com/MISPProject/status/1470051242038673412 ## Mulesoft : https://help.mulesoft.com/s/article/Apache-Log4j2-vulnerability-December-2021 # N ## N-able : https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability @@ -124,6 +131,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Netflix : https://github.com/search?q=org%3ANetflix+CVE-2021-44228&type=commits ## NextGen Healthcare Mirth : https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 ## Newrelic : https://github.com/newrelic/newrelic-java-agent/issues/605 ## Nutanix : https://download.nutanix.com/alerts/Security_Advisory_0023.pdf # O ## Okta : https://sec.okta.com/articles/2021/12/log4shell @@ -151,6 +159,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Quest KACE : https://support.quest.com/kace-systems-management-appliance/kb/335869/is-the-kace-sma-affected-by-cve-2021-44228 # R ## Radware : https://support.radware.com/app/answers/answer_view/a_id/1029752 ## Red5Pro : https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/ ## RedHat : https://access.redhat.com/security/cve/cve-2021-44228 ## Revenera / Flexera : https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905 @@ -162,6 +171,8 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## SAFE FME Server : https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j ## SailPoint : https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/ba-p/206681 ## Salesforce : https://help.salesforce.com/s/articleView?id=000363736&type=1 ## SAP BusinessObjects : https://launchpad.support.sap.com/#/notes/3129956 ## SAP Global coverage : https://launchpad.support.sap.com/#/notes/3129930 ## SAS : https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html ## Security Onion : https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 @@ -193,6 +204,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## USSIGNAL MSP : https://ussignal.com/blog/apache-log4j-vulnerability # V ## Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 ## Veeam : https://forums.veeam.com/veeam-backup-for-azure-f59/log4j-cve-2021-44228-vulnerability-t78225.html#p438231 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html @@ -213,6 +225,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # Z ## ZAMMAD : https://community.zammad.org/t/cve-2021-44228-elasticsearch-users-be-aware/8256 ## Zaproxy : https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/ ## Zerto : https://help.zerto.com/kb/000004822 ## Zesty : https://www.zesty.io/mindshare/company-announcements/log4j-exploit/ ## ZSCALER : https://www.zscaler.fr/blogs/security-research/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021 -
SwitHak revised this gist
Dec 12, 2021 . No changes.There are no files selected for viewing
-
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 6 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -43,6 +43,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## ContrastSecurity : https://support.contrastsecurity.com/hc/en-us/articles/4412612486548 ## Coralogix : https://twitter.com/Coralogix/status/1469713430659559425 ## CouchBase : https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402 ## CyberArk : https://cyberark-customers.force.com/s/article/Critical-Vulnerability-CVE-2021-44228 ## Cybereason : https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228 # D @@ -55,7 +56,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 # E ## Eclipse Foundation : https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#gistcomment-3992521 ## Elastic : https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## ESET : https://forum.eset.com/topic/30691-log4j-vulnerability/?do=findComment&comment=143745 ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 @@ -114,6 +115,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ ## Minecraft : https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition ## MISp : https://twitter.com/MISPProject/status/1470051242038673412 # N ## N-able : https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability @@ -137,6 +139,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## PaperCut : https://www.papercut.com/support/known-issues/#PO-684 ## Parse.ly : https://blog.parse.ly/parse-ly-log4shell/ ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability ## PingIdentity : https://support.pingidentity.com/s/article/Log4j2-vulnerability-CVE-CVE-2021-44228 ## Positive Technologies : https://twitter.com/ptsecurity/status/1469398376978522116 ## Progress / IpSwitch : https://www.progress.com/security ## Pulse Secure : https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/?kA13Z000000L3dR @@ -156,13 +159,15 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Rubrik : https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK # S ## SAFE FME Server : https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j ## SailPoint : https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/ba-p/206681 ## Salesforce : https://help.salesforce.com/s/articleView?id=000363736&type=1 ## SAS : https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html ## Security Onion : https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 ## Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 ## Shibboleth : http://shibboleth.net/pipermail/announce/2021-December/000253.html ## Signald : https://gitlab.com/signald/signald/-/issues/259 ## Skillable : https://skillable.com/log4shell/ ## SLF4J : http://slf4j.org/log4shell.html ## SmileCDR : https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228 -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 4 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -25,6 +25,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## BitDefender : https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BMC Software : https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability ## Boomi DELL : https://community.boomi.com/s/question/0D56S00009UQkx4SAD/is-boomi-installation-moleculegateway-protected-from-cve202144228-log4j ## Broadcom : https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 # C @@ -56,6 +57,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # E ## Eclipse Foundation : https://git.eclipse.org/r/c/tracecompass/org.eclipse.tracecompass/+/188751 ## Elastic : https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## ESET : https://forum.eset.com/topic/30691-log4j-vulnerability/?do=findComment&comment=143745 ## EVLLABS JGAAP : https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 # F @@ -107,6 +109,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # M ## Macchina io : https://twitter.com/macchina_io/status/1469611606569099269 ## MailCow : https://github.com/mailcow/mailcow-dockerized/issues/4375 ## McAfee : https://kc.mcafee.com/corporate/index?page=content&id=KB95091 ## Metabase : https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 ## Microsoft : https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ @@ -163,6 +166,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Skillable : https://skillable.com/log4shell/ ## SLF4J : http://slf4j.org/log4shell.html ## SmileCDR : https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228 ## Software AG : https://tech.forums.softwareag.com/t/log4j-zero-day-vulnerability/253849 ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce ## SonarSource : https://community.sonarsource.com/t/sonarqube-and-the-log4j-vulnerability/54721 ## SonicWall : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 10 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -12,9 +12,11 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Apache Kafka : https://lists.apache.org/thread/lgbtvvmy68p0059yoyn9qxzosdmx4jdv ## Apache Solr : https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228 ## Apero CAS : https://apereo.github.io/2021/12/11/log4j-vuln/ ## APPSHEET : https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 ## Aptible : https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 ## Atlassian : https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html ## Automox : https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 ## Avaya : https://support.avaya.com/helpcenter/getGenericDetails?detailId=1399839287609 ## AWS : https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ ## AZURE Datalake store java : https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 @@ -47,6 +49,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Debian : https://security-tracker.debian.org/tracker/CVE-2021-44228 ## Dell : https://www.dell.com/support/kbdoc/fr-fr/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability ## Docker : https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ ## Docusign : https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability ## DropWizard : https://twitter.com/dropwizardio/status/1469285337524580359 ## DynaTrace : https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 @@ -74,6 +77,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # H ## HackerOne : https://twitter.com/jobertabma/status/1469490881854013444 ## HCL Software : https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486 ## Huawei : https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en ## HostiFi : https://twitter.com/hostifi_net/status/1469511114824339464 @@ -128,6 +132,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # P ## Palo-Alto Networks : https://security.paloaltonetworks.com/CVE-2021-44228 ## PaperCut : https://www.papercut.com/support/known-issues/#PO-684 ## Parse.ly : https://blog.parse.ly/parse-ly-log4shell/ ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability ## Positive Technologies : https://twitter.com/ptsecurity/status/1469398376978522116 ## Progress / IpSwitch : https://www.progress.com/security @@ -142,6 +147,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # R ## Red5Pro : https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/ ## RedHat : https://access.redhat.com/security/cve/cve-2021-44228 ## Revenera / Flexera : https://community.flexera.com/t5/Revenera-Company-News/Security-Advisory-Log4j-Java-Vulnerability-CVE-2021-44228/ba-p/216905 ## RunDeck by PagerDuty : https://docs.rundeck.com/docs/history/CVEs/ ## RSA : https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501 ## Rubrik : https://support.rubrik.com/s/announcementdetail?Id=a406f000001PwOcAAK @@ -154,6 +160,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 ## Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 ## Shibboleth : http://shibboleth.net/pipermail/announce/2021-December/000253.html ## Skillable : https://skillable.com/log4shell/ ## SLF4J : http://slf4j.org/log4shell.html ## SmileCDR : https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228 ## Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce @@ -169,19 +176,22 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # T ## Talend : https://jira.talendforge.org/browse/TCOMP-2054 ## Tanium : https://community.tanium.com/s/article/How-Tanium-Can-Help-with-CVE-2021-44228-Log4Shell ## TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 ## TrendMicro : https://success.trendmicro.com/solution/000289940 # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 ## USSIGNAL MSP : https://ussignal.com/blog/apache-log4j-vulnerability # V ## Veeam : https://forums.veeam.com/veeam-backup-for-azure-f59/log4j-cve-2021-44228-vulnerability-t78225.html#p438231 ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md ## VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html # W ## Wallarm : https://lab.wallarm.com/cve-2021-44228-mitigation-update/ ## WatchGuard / Secplicity / https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/ ## WitFoo : https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ ## Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve ## WSO2 : https://github.com/wso2/security-tools/pull/169 -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 11 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -20,6 +20,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # B ## BACKBLAZE : https://twitter.com/backblaze/status/1469477224277368838 ## BitDefender : https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BMC Software : https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability ## Broadcom : https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 @@ -33,6 +34,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## CloudFlare : https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ ## CPanel : https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ ## CommVault https://community.commvault.com/technical-q-a-2/log4j-been-used-in-commvault-1985?postid=11745#post11745 ## ConcreteCMS.com : https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit ## Connect2id : https://connect2id.com/blog/connect2id-server-12-5-1 ## ConnectWise : https://www.connectwise.com/company/trust/advisories ## ContrastSecurity : https://support.contrastsecurity.com/hc/en-us/articles/4412612486548 @@ -62,6 +64,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## FusionAuth : https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/ # G ## Genesys : https://www.genesys.com/blog/post/genesys-update-on-the-apache-log4j-vulnerability ## Ghidra : https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning ## GitHub : https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ## GoAnywhere : https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps @@ -94,6 +97,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## Keycloak : https://github.com/keycloak/keycloak/discussions/9078 # L ## Leanix : https://www.leanix.net/en/blog/log4j-vulnerability-log4shell ## LucentSKY : https://twitter.com/LucentSky/status/1469358706311974914 ## Lightbend : https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 @@ -119,6 +123,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## OpenMRS TALK : https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341 ## OpenSearch : https://discuss.opendistrocommunity.dev/t/log4j-patch-for-cve-2021-44228/7950 ## Oracle : https://www.oracle.com/security-alerts/alert-cve-2021-44228.html ## OxygenXML : https://www.oxygenxml.com/security/advisory/CVE-2019-17571.html # P ## Palo-Alto Networks : https://security.paloaltonetworks.com/CVE-2021-44228 @@ -132,8 +137,10 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # Q ## Qlik : https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368 ## Quest KACE : https://support.quest.com/kace-systems-management-appliance/kb/335869/is-the-kace-sma-affected-by-cve-2021-44228 # R ## Red5Pro : https://www.red5pro.com/blog/red5-marked-safe-from-log4j-and-log4j2-zero-day/ ## RedHat : https://access.redhat.com/security/cve/cve-2021-44228 ## RunDeck by PagerDuty : https://docs.rundeck.com/docs/history/CVEs/ ## RSA : https://community.rsa.com/t5/general-security-advisories-and/rsa-customer-advisory-apache-vulnerability-log4j2-cve-2021-44228/ta-p/660501 @@ -166,6 +173,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # U ## Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 ## USSIGNAL MSP : https://ussignal.com/blog/apache-log4j-vulnerability # V ## Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md @@ -178,12 +186,15 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## WSO2 : https://github.com/wso2/security-tools/pull/169 # X ## XCP-ng : https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact # Y ## Yandex-Cloud : https://github.com/yandex-cloud/docs/blob/6ff6c676787756e7dd6101c53b051e4cd04b3e85/ru/overview/security-bulletins/index.md#10122021--cve-2021-44228--%D1%83%D0%B4%D0%B0%D0%BB%D0%B5%D0%BD%D0%BD%D0%BE%D0%B5-%D0%B2%D1%8B%D0%BF%D0%BE%D0%BB%D0%BD%D0%B5%D0%BD%D0%B8%D0%B5-%D0%BA%D0%BE%D0%B4%D0%B0-log4shell-apache-log4j # Z ## ZAMMAD : https://community.zammad.org/t/cve-2021-44228-elasticsearch-users-be-aware/8256 ## Zaproxy : https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/ ## Zesty : https://www.zesty.io/mindshare/company-announcements/log4j-exploit/ ## ZSCALER : https://www.zscaler.fr/blogs/security-research/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021 ## Errors, typos, something to say ? -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -125,7 +125,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) ## PaperCut : https://www.papercut.com/support/known-issues/#PO-684 ## Pega : https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability ## Positive Technologies : https://twitter.com/ptsecurity/status/1469398376978522116 ## Progress / IpSwitch : https://www.progress.com/security ## Pulse Secure : https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44933/?kA13Z000000L3dR ## Puppet : https://puppet.com/blog/puppet-response-to-remote-code-execution-vulnerability-cve-2021-44228/ ## Pure Storage : https://support.purestorage.com/Field_Bulletins/Interim_Security_Advisory_Regarding_CVE-2021-44228_(%22log4j%22) -
SwitHak revised this gist
Dec 12, 2021 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -21,7 +21,7 @@ Security Advisories / Bulletins linked to Log4Shell (CVE-2021-44228) # B ## BACKBLAZE : https://twitter.com/backblaze/status/1469477224277368838 ## BitNami By VMware : https://docs.bitnami.com/general/security/security-2021-12-10/ ## BMC Software : https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability ## Broadcom : https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 # C
NewerOlder