CVE-2021-44228

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
References
Link Resource
https://logging.apache.org/log4j/2.x/security.html Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2021/12/10/1 Mailing List Mitigation Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/12/10/2 Mailing List Mitigation Third Party Advisory
http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20211210-0007/ Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/12/10/3 Mailing List Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 Third Party Advisory
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/12/13/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/12/13/2 Mailing List Third Party Advisory
https://twitter.com/kurtseifried/status/1469345530182455296 Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html Mailing List Third Party Advisory
https://www.debian.org/security/2021/dsa-5020 Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf Third Party Advisory
http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2021/12/14/4 Mailing List Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html Third Party Advisory
https://www.kb.cert.org/vuls/id/930724 Third Party Advisory US Government Resource
http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2021/12/15/3 Mailing List Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf Third Party Advisory
https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Patch Third Party Advisory Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf Third Party Advisory
http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf Third Party Advisory
http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html Third Party Advisory VDB Entry
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ Third Party Advisory
https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md Product US Government Resource
http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujan2022.html Patch Third Party Advisory
https://github.com/cisagov/log4j-affected-db Third Party Advisory
https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 Third Party Advisory
https://support.apple.com/kb/HT213189 Third Party Advisory
http://seclists.org/fulldisclosure/2022/Mar/23 Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html Patch Third Party Advisory
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 Exploit Third Party Advisory
https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2022/Jul/11 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:siemens:logo\!_soft_comfort:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:4.70:sp7:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:4.70:-:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_control_pro:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:4.70:sp8:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_command:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*
cpe:2.3:a:siemens:head-end_system_universal_device_integration_system:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:gma-manager:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:8.5:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:8.6:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:8.7:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:9.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energy_engage:3.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:e-car_operation_center:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_info_center:5.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_info_center:5.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*
cpe:2.3:a:siemens:navigator:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:xpedition_package_integrator:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:xpedition_enterprise:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2019.1:sp1912:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2019.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2019.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:teamcenter:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:2.30:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:2.30:-:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:2.30:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:2020:sp2002:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:2020:-:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:2020:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_cam_pro:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_viewpoint:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_vantage:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sentron_powermanager:4.2:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sentron_powermanager:4.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:nx:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:mindsphere:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:industrial_edge_management_hub:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:industrial_edge_management:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:system_studio:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:data_center_manager:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:*

Configuration 9 (hide)

OR cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:packaged_contact_center_enterprise:11.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:data_center_network_manager:11.3\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:-:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release4:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:iot_operations_dashboard:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:intersight_virtual_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_spaces\:_connector:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_platform_infrastructure:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_platform_infrastructure:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_optimization_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_optimization_engine:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_controller:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_data_gateway:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_workload_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite_admin:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_cost_optimizer:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:nexus_insights:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:customer_experience_cloud_agent:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5:*:*:*:*:*:*
cpe:2.3:a:cisco:workload_optimization_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_network_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:fog_director:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_assurance_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_mobile_experiences:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_operations_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_sip_proxy:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\)su3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:session_management:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:-:*:*:*
cpe:2.3:a:cisco:paging_server:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:contact_center_management_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:contact_center_domain_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloud_connect:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
OR cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*

Configuration 11 (hide)

OR cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unity_connection:11.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_spaces_connector:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.002\(001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.002\(000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.000\(001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.000\(000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(2\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):es02:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):es01:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:11.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.5\(1\):su1:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.5\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:11.5\(1.22900.6\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.22900.28\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.21900.40\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.18900.97\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.18119.2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.17900.52\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:9.1\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:9.0\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:9.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:8.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:8.4\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:8.3\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:14.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:12.5\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es03:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es02:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es01:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.5\(1\):su2:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.5\(1\):su1:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:12.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:12.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:11.5\(4.66000.14\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:11.5\(4.65000.14\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:11.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_management_portal:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.6\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:006.008\(001.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1l\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1k\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1h\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1g\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1f\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1e\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1d\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1b\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller_supervisor:002.003\(002.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_network_controller:1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_assurance_engine:6.0\(2.1912\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_center:2.2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtual_topology_system:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:21.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(3\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.4\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.3\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.2\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.1\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(4.018\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(3.025\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(2.26\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(1.26\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_workforce_optimization:11.5\(1\):sr7:*:*:*:*:*:*
cpe:2.3:a:cisco:unity_connection:11.5\(1.10000.6\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.3\(0\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5\(0\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.4\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:003.002\(000.116\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:003.001\(000.518\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:003.000\(000.458\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:002.007\(000.356\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:002.006\(000.156\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:002.004\(000.914\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_insights_for_data_center:6.0\(2.1914\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cx_cloud_agent:001.012:*:*:*:*:*:*:*
cpe:2.3:a:cisco:mobility_services_engine:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:4.10\(0.15\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_spaces:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:7.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.003:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.001.001:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.002.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.001.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.000.001:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.004.000.003:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.010\(000.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.002\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.002\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.000\):*:*:*:*:*:*:*

Configuration 12 (hide)

OR cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:*
cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:*

Configuration 13 (hide)

OR cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:*
cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:*

Configuration 14 (hide)

cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:*

History

17 Aug 2022, 17:46

Type Values Removed Values Added
First Time Percussion rhythmyx
Percussion
CPE cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:*

09 Aug 2022, 13:17

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html - (MISC) http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/11 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/11 - Mailing List, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html - (MISC) http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html - Third Party Advisory, VDB Entry
CWE CWE-502 CWE-917

03 Aug 2022, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html -

22 Jul 2022, 18:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Jul/11 -
  • (MISC) http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html -

30 Jun 2022, 18:26

Type Values Removed Values Added
References (MISC) https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html - (MISC) https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html - Exploit, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
References (MISC) https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 - (MISC) https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 - Exploit, Third Party Advisory

05 May 2022, 23:15

Type Values Removed Values Added
References
  • (MISC) https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html -
  • (MISC) https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 -

20 Apr 2022, 00:16

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html -

18 Apr 2022, 13:45

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/23 - Third Party Advisory (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/23 - Mailing List, Third Party Advisory

12 Apr 2022, 18:14

Type Values Removed Values Added
First Time Bentley
Bentley synchro
Bentley synchro 4d
CPE cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:*
cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:*
References (CONFIRM) https://support.apple.com/kb/HT213189 - (CONFIRM) https://support.apple.com/kb/HT213189 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/23 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/23 - Third Party Advisory
References (MISC) https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 - (MISC) https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 - Third Party Advisory
References (MISC) https://github.com/cisagov/log4j-affected-db - (MISC) https://github.com/cisagov/log4j-affected-db - Third Party Advisory

15 Mar 2022, 06:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Mar/23 -

14 Mar 2022, 20:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213189 -

01 Mar 2022, 23:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/cisagov/log4j-affected-db -
  • (MISC) https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 -

19 Feb 2022, 04:23

Type Values Removed Values Added
References (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory

07 Feb 2022, 16:16

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpujan2022.html -

01 Feb 2022, 20:31

Type Values Removed Values Added
References (MISC) https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - (MISC) https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Product, US Government Resource
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - (MISC) http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Third Party Advisory, VDB Entry
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - (MISC) http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Third Party Advisory, VDB Entry
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Patch, Third Party Advisory (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Patch, Third Party Advisory, Vendor Advisory
CPE cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

24 Jan 2022, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html -

20 Jan 2022, 21:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html -

19 Jan 2022, 04:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md -

12 Jan 2022, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ -
  • (MISC) http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html -
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf -
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf -
Summary Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

28 Dec 2021, 19:32

Type Values Removed Values Added
References (MISC) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory (MISC) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory
References (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Third Party Advisory (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Patch, Third Party Advisory
CPE cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:*
cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:*

20 Dec 2021, 18:13

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory (MISC) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory
References (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Mitigation, Third Party Advisory (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Third Party Advisory
CPE cpe:2.3:a:cisco:sd-wan_vmanage:20.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_network_controller:1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:9.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(2\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:002.006\(000.156\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:8.4\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:003.001\(000.518\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es02:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(1.26\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.4\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:003.002\(000.116\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:unity_connection:11.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:12.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:002.007\(000.356\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller_supervisor:002.003\(002.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_center:2.2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.004.000.003:*:*:*:*:*:*:*
cpe:2.3:a:cisco:mobility_services_engine:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:11.5\(4.66000.14\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.001.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.000.001:*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:12.5\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):es02:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5\(0\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.2\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1f\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.18119.2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.5\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_management_portal:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(4.018\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.21900.40\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1l\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.18900.97\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:9.0\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:11.5\(4.65000.14\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_spaces:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es03:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.5\(1\):su1:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.001.001:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.002\(000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(3.025\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.000\(001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):es01:*:*:*:*:*:*
cpe:2.3:a:cisco:network_assurance_engine:6.0\(2.1912\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1g\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1k\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_spaces_connector:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:7.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1d\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cx_cloud_agent:001.012:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es01:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1e\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:8.3\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.17900.52\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.003:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtual_topology_system:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:11.5\(1.22900.6\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:003.000\(000.458\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.010\(000.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1.22900.28\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:14.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager_im_\&_presence_service:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.4\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_workforce_optimization:11.5\(1\):sr7:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:11.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:006.008\(001.000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:11.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.3\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.1\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1b\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:8.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:9.1\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.5\(1\):su2:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:12.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.002.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_insights_for_data_center:6.0\(2.1914\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unity_connection:11.5\(1.10000.6\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(001.002\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:7.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0\(1h\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.000\(000\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central_software:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:21.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:5.3\(0\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_manager:7.14\(2.26\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.5\(1\):su1:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_suite:4.10\(0.15\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:002.004\(000.914\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.000:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\(3\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.002\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:12.6\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_sip_proxy:010.002\(001\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:002.009\(000.000\):*:*:*:*:*:*:*

16 Dec 2021, 19:56

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:optical_network_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\)su3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release4:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*
cpe:2.3:a:siemens:head-end_system_universal_device_integration_system:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
cpe:2.3:a:cisco:packaged_contact_center_enterprise:11.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:siemens:teamcenter:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_cam_pro:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2019.1:sp1912:*:*:*:*:*:*
cpe:2.3:a:siemens:xpedition_enterprise:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:system_studio:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:contact_center_domain_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_optimization_engine:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4:*:*:*:*:*:*
cpe:2.3:a:siemens:sentron_powermanager:4.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:2020:-:*:*:*:*:*:*
cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_info_center:5.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:data_center_network_manager:11.3\(1\):*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_command:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:2.30:-:*:*:*:*:*:*
cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:xpedition_package_integrator:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_platform_infrastructure:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_platform_infrastructure:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:smart_phy:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:8.6:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:8.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_optimization_engine:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:iot_operations_dashboard:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:nexus_insights:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:paging_server:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:-:*:*:*
cpe:2.3:a:siemens:industrial_edge_management:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:4.70:-:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5:*:*:*:*:*:*
cpe:2.3:a:cisco:intersight_virtual_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_vantage:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_surveillance_operations_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:fog_director:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_sip_proxy:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:4.70:sp8:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:8.7:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_info_center:5.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2019.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:-:*:*:*:*:*
cpe:2.3:a:cisco:dna_spaces\:_connector:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:2.30:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_workload_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:2020:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_assurance_engine:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:*
cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_data_gateway:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip:9.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_control_pro:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:mindsphere:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:2.30:sp2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_4:4.70:sp7:*:*:*:*:*:*
cpe:2.3:a:siemens:vesys:2019.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:logo\!_soft_comfort:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:nx:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:connected_mobile_experiences:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:2020:sp2002:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_controller:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:cisco:cloudcenter_suite_admin:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:gma-manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:navigator:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloudcenter_cost_optimizer:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:workload_optimization_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*
cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:customer_experience_cloud_agent:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:12.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:contact_center_management_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloud_connect:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_harness_design:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:11.5\(1\):*:*:*:session_management:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2:*:*:*:*:*:*
cpe:2.3:a:siemens:industrial_edge_management_hub:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sentron_powermanager:4.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:siemens:energy_engage:3.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*
cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*
cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:e-car_operation_center:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:wan_automation_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:data_center_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_central:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*
cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:*
cpe:2.3:a:siemens:siveillance_viewpoint:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*
References (MISC) http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html - (MISC) http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html - Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/15/3 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/15/3 - Mailing List, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - (MISC) http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - Third Party Advisory, VDB Entry
References (MISC) https://twitter.com/kurtseifried/status/1469345530182455296 - (MISC) https://twitter.com/kurtseifried/status/1469345530182455296 - Exploit, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2021/dsa-5020 - (DEBIAN) https://www.debian.org/security/2021/dsa-5020 - Third Party Advisory
References (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ - Mitigation, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html - (MISC) http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/14/4 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/14/4 - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ - Third Party Advisory
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/1 - Mailing List, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html - (MISC) http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html - Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html - (MISC) http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html - Third Party Advisory, VDB Entry
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html - (MISC) http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html - Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/2 - Mailing List, Third Party Advisory
References (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html - (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html - Third Party Advisory
References (CERT-VN) https://www.kb.cert.org/vuls/id/930724 - (CERT-VN) https://www.kb.cert.org/vuls/id/930724 - Third Party Advisory, US Government Resource

16 Dec 2021, 17:15

Type Values Removed Values Added
References
  • (MS) https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ -

16 Dec 2021, 14:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf -

15 Dec 2021, 22:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/15/3 -

15 Dec 2021, 18:15

Type Values Removed Values Added
Summary Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2021/12/15/1', 'name': '[oss-security] 20211215 Re: CVE-2021-45046: Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack', 'tags': [], 'refsource': 'MLIST'}
  • (MISC) http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html -
  • (MISC) http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html -
  • (MISC) http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html -
  • (MISC) http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html -
  • (MISC) http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html -

15 Dec 2021, 16:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/15/1 -
Summary Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

15 Dec 2021, 04:15

Type Values Removed Values Added
References
  • (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html -
  • (CERT-VN) https://www.kb.cert.org/vuls/id/930724 -

14 Dec 2021, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/14/4 -

14 Dec 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html -
  • (MISC) http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html -
  • (MISC) http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html -

14 Dec 2021, 01:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf -

14 Dec 2021, 00:15

Type Values Removed Values Added
Summary Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against remote code execution by defaulting "com.sun.jndi.rmi.object.trustURLCodebase" and "com.sun.jndi.cosnaming.object.trustURLCodebase" to "false". Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).
References
  • (MISC) https://twitter.com/kurtseifried/status/1469345530182455296 -
  • (DEBIAN) https://www.debian.org/security/2021/dsa-5020 -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html -

13 Dec 2021, 22:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/1 -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/13/2 -

13 Dec 2021, 20:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ -

13 Dec 2021, 15:00

Type Values Removed Values Added
CPE cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
CWE CWE-502
References (CONFIRM) https://www.oracle.com/security-alerts/alert-cve-2021-44228.html - (CONFIRM) https://www.oracle.com/security-alerts/alert-cve-2021-44228.html - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/1 - Mailing List, Mitigation, Third Party Advisory
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory
References (MISC) https://logging.apache.org/log4j/2.x/security.html - (MISC) https://logging.apache.org/log4j/2.x/security.html - Release Notes, Vendor Advisory
References (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 - (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/2 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/2 - Mailing List, Mitigation, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/3 - (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/3 - Mailing List, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20211210-0007/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20211210-0007/ - Vendor Advisory
References (MISC) http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
CVSS v2 : unknown
v3 : unknown
v2 : 9.3
v3 : 10.0

13 Dec 2021, 12:15

Type Values Removed Values Added
Summary Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against remote code execution by defaulting "com.sun.jndi.rmi.object.trustURLCodebase" and "com.sun.jndi.cosnaming.object.trustURLCodebase" to "false".
References
  • (CONFIRM) https://www.oracle.com/security-alerts/alert-cve-2021-44228.html -

12 Dec 2021, 17:15

Type Values Removed Values Added
References
  • {'url': 'https://www.debian.org/security/2021/dsa-5020', 'name': 'DSA-5020', 'tags': [], 'refsource': 'DEBIAN'}
Summary Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against remote code execution by defaulting "com.sun.jndi.rmi.object.trustURLCodebase" and "com.sun.jndi.cosnaming.object.trustURLCodebase" to "false". Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).

12 Dec 2021, 11:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-5020 -

11 Dec 2021, 05:15

Type Values Removed Values Added
References
  • (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 -

10 Dec 2021, 22:15

Type Values Removed Values Added
References
  • (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/3 -

10 Dec 2021, 18:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20211210-0007/ -
  • (MISC) http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html -

10 Dec 2021, 13:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/1 -
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/12/10/2 -

10 Dec 2021, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-10 10:15

Updated : 2022-08-17 17:46


NVD link : CVE-2021-44228

Mitre link : CVE-2021-44228


JSON object : View

Products Affected

cisco

  • unified_sip_proxy
  • dna_center
  • iot_operations_dashboard
  • firepower_9300
  • virtualized_infrastructure_manager
  • contact_center_domain_manager
  • evolved_programmable_network_manager
  • network_services_orchestrator
  • firepower_2130
  • cloudcenter_suite_admin
  • optical_network_controller
  • automated_subsea_tuning
  • firepower_2140
  • wan_automation_engine
  • customer_experience_cloud_agent
  • cyber_vision
  • firepower_4110
  • data_center_network_manager
  • unified_communications_manager_im_and_presence_service
  • common_services_platform_collector
  • unified_contact_center_express
  • cyber_vision_sensor_management_extension
  • unified_workforce_optimization
  • firepower_4125
  • integrated_management_controller_supervisor
  • firepower_4150
  • network_dashboard_fabric_controller
  • dna_spaces_connector
  • mobility_services_engine
  • identity_services_engine
  • business_process_automation
  • crosswork_zero_touch_provisioning
  • unified_intelligence_center
  • finesse
  • unified_computing_system
  • firepower_4140
  • firepower_2120
  • firepower_1150
  • emergency_responder
  • fog_director
  • crosswork_platform_infrastructure
  • enterprise_chat_and_email
  • connected_analytics_for_network_deployment
  • nexus_dashboard
  • cloudcenter_cost_optimizer
  • unity_connection
  • video_surveillance_manager
  • firepower_4115
  • ucs_director
  • video_surveillance_operations_manager
  • dna_spaces\
  • ucs_central_software
  • network_assurance_engine
  • crosswork_optimization_engine
  • packaged_contact_center_enterprise
  • connected_mobile_experiences
  • crosswork_network_controller
  • firepower_1010
  • broadworks
  • sd-wan_vmanage
  • cloudcenter_suite
  • cx_cloud_agent
  • cloudcenter
  • prime_service_catalog
  • unified_contact_center_management_portal
  • webex_meetings_server
  • paging_server
  • crosswork_network_automation
  • cloud_connect
  • workload_optimization_manager
  • cloudcenter_workload_manager
  • virtual_topology_system
  • fxos
  • smart_phy
  • ucs_central
  • unified_contact_center_enterprise
  • intersight_virtual_appliance
  • firepower_4112
  • unified_communications_manager
  • crosswork_data_gateway
  • virtualized_voice_browser
  • dna_spaces
  • firepower_4120
  • firepower_4145
  • firepower_1120
  • advanced_malware_protection_virtual_private_cloud_appliance
  • contact_center_management_portal
  • firepower_2110
  • firepower_1140
  • network_insights_for_data_center
  • firepower_threat_defense
  • unified_communications_manager_im_\&_presence_service
  • nexus_insights
  • unified_customer_voice_portal

siemens

  • vesys
  • siveillance_identity
  • nx
  • industrial_edge_management
  • sppa-t3000_ses3000
  • spectrum_power_7
  • navigator
  • siveillance_command
  • energyip_prepay
  • siveillance_vantage
  • solid_edge_cam_pro
  • operation_scheduler
  • logo\!_soft_comfort
  • sipass_integrated
  • comos
  • desigo_cc_info_center
  • spectrum_power_4
  • siveillance_control_pro
  • opcenter_intelligence
  • energy_engage
  • e-car_operation_center
  • siveillance_viewpoint
  • head-end_system_universal_device_integration_system
  • teamcenter
  • sppa-t3000_ses3000_firmware
  • solid_edge_harness_design
  • desigo_cc_advanced_reports
  • mindsphere
  • energyip
  • captial
  • siguard_dsa
  • xpedition_package_integrator
  • xpedition_enterprise
  • gma-manager
  • mendix
  • industrial_edge_management_hub
  • sentron_powermanager

debian

  • debian_linux

bentley

  • synchro_4d
  • synchro

netapp

  • cloud_manager
  • cloud_secure_agent
  • snapcenter
  • ontap_tools
  • oncommand_insight
  • active_iq_unified_manager
  • cloud_insights

intel

  • sensor_solution_firmware_development_kit
  • system_debugger
  • system_studio
  • oneapi_sample_browser
  • audio_development_kit
  • computer_vision_annotation_tool
  • data_center_manager
  • secure_device_onboard
  • genomics_kernel_library

snowsoftware

  • vm_access_proxy
  • snow_commander

fedoraproject

  • fedora

apache

  • log4j

percussion

  • rhythmyx

sonicwall

  • email_security
CWE
CWE-917

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')