![]()
| Amazon | AWS Lambda | Unknown | Affected | Yes | ( ) | | | | | Alertus | | | | | ( ) | | | -93,12 +98,19 This list was initially populated using information from the following sources: | Akamai | SIEM Splunk Connector| All | Affected |Yes | ( ) |v1.4.11 is the new recommendation for mitigation of log4j vulnerabilities| || ![]() |Advanced Systems Concepts (formally Jscape)|MFT||Not Affected|No|()|This advisory is available to customers only and has not been reviewed by CISA||| |Advanced Systems Concepts (formally Jscape)|MFT Gateway||Not Affected|No|()|This advisory is available to customers only and has not been reviewed by CISA||| |Advanced Systems Concepts (formally Jscape)|MFT Server||Not Affected|No|()|This advisory is available to customers only and has not been reviewed by CISA||| |Advanced Systems Concepts (formally Jscape)|Active MFT||Not Affected|No|()|This advisory is available to customers only and has not been reviewed by CISA||| Specifically, it updates the Log4j library to a non-vulnerable version on CentOS 7 systems as well as adds the recommended option “$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true” to disable the possible attack vector on both CentOS 6 and CentOS 7." | | -81,6 +82,10 This list was initially populated using information from the following sources: #Teradici pcoip firmware 4.1.2 upgrade path Patch#This patch release adds the mitigation for CVE-2021-44228 contained in the Solr package as recommended by Apache Solr group. #Teradici pcoip firmware 4.1.2 upgrade path update#| Accellion | Kiteworks | v7.6 release | Fixed | Yes | ( ) | "As a precaution, Kiteworks released a 7.6.1 Hotfix software update to address the vulnerability. | ABB | B &R Products | See Vendor Advisory | | | ( ) | | | | | ABB | AlarmInsight Cloud | AlarmInsight KPI Dashboards 1.0.0 | Under Investigation | | | | | | | ABB | AlarmInsight Cloud | AlarmInsight KPI Dashboards 1.0.0 | Under Investigation | Pending | | | | | | ABB | ABB Remote Service | ABB Remote Platform (RAP) | Affected | | Details are shared with active subscribers | | | | |3M Health Information Systems| CGS | | Affected | Unknown |() |This advisory is available to customer only and has not been reviewed by CISA.||| ![]() | 3M Health Information Systems | CGS | | Affected | Unknown |() |This advisory is available to customer only and has not been reviewed by CISA.||| | Status | Description -63,11 +64,11 This list was initially populated using information from the following sources: ![]() Report incidents promptly to CISA and/or the FBI ( ). Ensure that any alerts from a vulnerable device are immediately actioned. National Vulnerability Database (NVD) Information: ( )ĬISA urges organizations operating products marked as "Fixed" to -39,8 +42,6 implement alternate controls, including: Purposes only and is being assembled and updated by CISA -23,8 +23,11 or imply their endorsement, recommendation, or favoring by CISA. The information in this repository is provided "as is" for informational CISA encourages users andĪnd upgrade to Log4j 2.1 6.0 or apply the recommended mitigations immediately.Īnd upgrade to Log4j 2.1 5.0 or apply the recommended mitigations immediately. Regarding the Log4j vulnerability (CVE-2021-44228). ![]() 4,7 +4,7 This repository provides CISA's guidance and an overview of related software ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |