Skip to content
This repository has been archived by the owner on Jun 16, 2022. It is now read-only.

Latest commit

 

History

History
355 lines (352 loc) · 60.6 KB

software_list_a.md

File metadata and controls

355 lines (352 loc) · 60.6 KB

List of software (un)affected by the log4shell CVEs

About this list

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Supplier Product Version (see Status) Status CVE-2021-4104 Status CVE-2021-44228 Status CVE-2021-45046 Status CVE-2021-45105 Notes Links
ABB Alarminsight Cloud Not vuln Not vuln Not vuln Not vuln source
ABB B&R Products Not vuln Not vuln Not vuln Not vuln source
ABB Remote Service Not vuln Fix Details are shared with customers with an active RAP subscription "source"
Abbott All Investigation source
Abnormal Security All Not vuln Not vuln Not vuln Not vuln Abnormal Blog
Accellence All Accellence Article
Accellence Technologies EBÜS All Not vuln Workaround EBÜS itself is not vulnerable to CVE-2021-44228. Although it includes several 3rd-partie software setups, which may be affected (see source for more info). source
Accellence Technologies vimacc All Not vuln Not vuln Not vuln Not vuln source
Accellion Kiteworks v7.6 release Not vuln Fix As a precaution, Kiteworks released a 7.6.1 Hotfix software update to address the vulnerability. This patch release adds the mitigation for CVE-2021-44228 contained in the Solr package as recommended by Apache Solr group. Specifically, it updates the Log4j library to a non-vulnerable version on CentOS 7 systems as well as adds the recommended option “$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true” to disable the possible attack vector on both CentOS 6 and CentOS 7. Kiteworks Statement
Accruent Analytics Not vuln Fix source
Accruent Asset Enterprise Not vuln Not vuln Not vuln Not vuln source
Accruent BigCenter Not vuln Fix source
Accruent EMS Not vuln Not vuln Not vuln Not vuln source
Accruent Evoco Not vuln Fix source
Accruent Expesite Not vuln Fix source
Accruent Famis 360 Not vuln Fix source
Accruent Lucernex Not vuln Fix source
Accruent Maintenance Connection Not vuln Not vuln Not vuln Not vuln source
Accruent Meridian Not vuln Fix source
Accruent Single Sign On (SSO, Central Auth) Not vuln Not vuln Not vuln Not vuln source
Accruent SiteFM3 Not vuln Fix source
Accruent SiteFM4 Not vuln Fix source
Accruent Siterra Not vuln Fix source
Accruent TMS Not vuln Not vuln Not vuln Not vuln source
Accruent VxField Not vuln Not vuln Not vuln Not vuln source
Accruent VxMaintain/VxObserve/VxSustain Not vuln Fix source
Acquia All Acquia Article
Acronis All Investigation See further information below source
Acronis Backup 11.7 Not vuln Not vuln Not vuln Not vuln source
Acronis Cyber Backup 12.5 Not vuln Not vuln Not vuln Not vuln source
Acronis Cyber Files 8.6.2 onwards Not vuln Not vuln Not vuln Not vuln source
Acronis Cyber Infrastructure 3.5 and 4.x Not vuln Not vuln Not vuln Not vuln source
Acronis Cyber Protect 15 Not vuln Not vuln Not vuln Not vuln source
Acronis Cyber Protection Home Office 2017 onwards Not vuln Not vuln Not vuln Not vuln source
Acronis DeviceLock DLP 9.0 Not vuln Not vuln Not vuln Not vuln source
Acronis Files Connect 10.7 onwards Not vuln Not vuln Not vuln Not vuln source
Acronis MassTransit 8.1 and 8.2 Not vuln Not vuln Not vuln Not vuln source
Acronis Snap Deploy 5 and 6 Not vuln Not vuln Not vuln Not vuln source
ActiveState All ActiveState Blog Post
Acunetix 360 All Not vuln source
Acunetix Agents All Not vuln source
Acunetix Application All Not vuln source
Acunetix IAST: ASP. NET All Not vuln source
Acunetix IAST: Java All Not vuln Workaround AcuSensor IAST module needs attention source
Acunetix IAST: NodeJS All Not vuln source
Acunetix IAST: PHP All Not vuln source
Adaptec All Adaptec Link
Addigy All Addigy Blog Post
Adeptia All Adeptia Article
Adeptia Connect 3.3 Workaround Workaround Workaround Advisory mentioned only log4j2 and not the CVE source
Adeptia Connect 3.4, 3.5 Workaround Workaround Workaround Advisory mentioned only log4j2 and not the CVE source
Adeptia Suite 6.9.10, 6.9.11 Workaround Workaround Workaround Advisory mentioned only log4j2 and not the CVE source
Adeptia Suite 6.9.9 Workaround Workaround Workaround Advisory mentioned only log4j2 and not the CVE source
Adobe Acrobat Reader Not vuln source
Adobe All Investigation source
Adobe Automated Forms Conversion Service Vulnerable source
Adobe ColdFusion All Not vuln Fix "<a href=""https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html"" rel=""nofollow"">Patched on Dec 17th" source
Adobe Experience Manager 6.3 Forms on JEE all versions from 6.3 GA to 6.3.3 Not vuln Workaround source
Adobe Experience Manager 6.4 Forms Designer Vulnerable source
Adobe Experience Manager 6.4 Forms on JEE all versions from 6.4 GA to 6.4.8 Not vuln Workaround source
Adobe Experience Manager 6.5 Forms Designer Not vuln Fix source
Adobe Experience Manager 6.5 Forms on JEE all versions from 6.5 GA to 6.5.11 Not vuln Workaround source
Adobe Experience Manager Forms on OSGi All Not vuln Not vuln Not vuln Not vuln source
Adobe Experience Manager Forms Workbench All Not vuln Not vuln Not vuln Not vuln source
Adobe ColdFusion All Adobe ColdFusion Link
ADP All Investigation Patching were needed, no signs of intrusion source
Advanced Systems Concepts (formally Jscape) Active MFT Not vuln Not vuln Not vuln Not vuln This advisory is available to customers only and has not been reviewed by CISA Log4J Vulnerabilty
Advanced Systems Concepts (formally Jscape) MFT Not vuln Not vuln Not vuln Not vuln This advisory is available to customers only and has not been reviewed by CISA Log4J Vulnerabilty
Advanced Systems Concepts (formally Jscape) MFT Gateway Not vuln Not vuln Not vuln Not vuln This advisory is available to customers only and has not been reviewed by CISA Log4J Vulnerabilty
Advanced Systems Concepts (formally Jscape) MFT Server Not vuln Not vuln Not vuln Not vuln This advisory is available to customers only and has not been reviewed by CISA Log4J Vulnerabilty
AFAS All Not vuln Not vuln Not vuln Not vuln source
AFAS Software All AFAS Software Link
AFHCAN Global LLC AFHCANcart 8.0.7 - 8.4.3 Not vuln Not vuln Not vuln Not vuln source
AFHCAN Global LLC AFHCANmobile 8.0.7 - 8.4.3 Not vuln Not vuln Not vuln Not vuln source
AFHCAN Global LLC AFHCANServer 8.0.7 - 8.4.3 Not vuln Not vuln Not vuln Not vuln source
AFHCAN Global LLC AFHCANsuite 8.0.7 - 8.4.3 Not vuln Not vuln Not vuln Not vuln source
AFHCAN Global LLC AFHCANupdate 8.0.7 - 8.4.3 Not vuln Not vuln Not vuln Not vuln source
AFHCAN Global LLC AFHCANweb 8.0.7 - 8.4.3 Not vuln Not vuln Not vuln Not vuln source
Agilysys All Agilysys Link
Ahsay Mobile version 1.6+ Not vuln Not vuln Not vuln Not vuln source
Ahsay Other products version 8.5.4.86 (and above) Not vuln Not vuln Not vuln Not vuln source
Ahsay PRD version 2.0 Not vuln Not vuln Not vuln Not vuln source
Aiden All All Not vuln Not vuln Not vuln Not vuln source
AIL All All Not vuln Not vuln Not vuln Not vuln source
Akamai Enterprise Application Access (EAA) connector Not vuln Not vuln Not vuln Not vuln
Akamai Siem Integration Connector <1.7.4 Not vuln Fix Fix Fix Akamai SIEM Integration Connector is vulnerable to CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105. source
Akamai Siem Splunk Connector =>1.4.10 Not vuln Not vuln Not vuln Not vuln v1.4.11 is the new recommendation for mitigation of log4j vulnerabilities. source
Akamai Siem Splunk Connector <1.4.10 Not vuln Workaround Akamai SIEM Integration Connector for Splunk is not vulnerable to CVE-2021-44228. Although it includes the vulnerable Log4J component, it is not used by the connector. source
Alcatel All Alcatel Link
Alertus Console 5.15.0 Not vuln Fix source
Alexion All Alexion Blog Post
Alexion Software Alexion CRM All Not vuln Not vuln Not vuln Not vuln source
Alfresco (Hyland) Alfresco All Not vuln Alfresco Blog Post
AlienVault All AlienVault Article Link
Alphatron AMiSconnect Not vuln source
Alphatron Custo diagnostics 5.4 to 5.6 Vulnerable Potentially vulnerable through the HL7 and DICOM communication interfaces source
Alphatron JiveX Not vuln source
Alphatron Zorgbericht Not vuln source
Alphatron Medical All Alphatron Medical Website
Amazon AMS Not vuln Fix Work in progress, portion of customers may still be vulnerable. Actively monitoring this issue, and are working on addressing it for any AMS services which use Log4j2 source
Amazon API Gateway Not vuln Fix source
Amazon Athena Not vuln Fix source
Amazon Athena JDBC driver Not vuln Not vuln Not vuln Not vuln All versions vended to customers were not affected source
Amazon AWS Linux 1,2 Not vuln Not vuln Not vuln Not vuln "Notes: Amazon Linux 1 had aws apitools which were Java based but these were deprecated in 2015 <a href=""https://forums.aws.amazon.com/thread.jspa?threadID=323611"" rel=""nofollow"">AWS Forum. AMIs used to inspect and verify (base spin ups) - amzn-ami-hvm-2018.03.0.20200318.1-x86_64-gp2 and amzn2-ami-kernel-5.10-hvm-2.0.20211201.0-x86_64-gp2"
Amazon AWS API Gateway All Not vuln Fix Amazon AWS Link
Amazon AWS AppFlow Not vuln Fix source
Amazon AWS AppSync Not vuln Fix Updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046 source
Amazon AWS AWS Certificate Manager Not vuln Fix source
Amazon AWS AWS Certificate Manager Private CA Not vuln Fix source
Amazon AWS AWS Service Catalog Not vuln Fix source
Amazon AWS CloudHSM 3.4.1 Not vuln Fix CloudHSM JCE SDK 3.4.1 or higher is not vulnerable source
Amazon AWS CodeBuild Not vuln Fix Updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046 source
Amazon AWS CodePipeline Not vuln Fix Updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046 source
Amazon AWS Connect All Not vuln Fix Vendors recommend evaluating components of the environment outside of the Amazon Connect service boundary, which may require separate/additional customer mitigation Vendor Link
Amazon AWS Directory Service Not vuln Fix source
Amazon AWS DynamoDB Not vuln Fix Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS EKS, ECS, Fargate Not vuln Fix "To help mitigate the impact of the open-source Apache “Log4j2"" utility (CVE-2021-44228 and CVE-2021-45046) security issues on customers’ containers, Amazon EKS, Amazon ECS, and AWS Fargate are deploying a Linux-based update (hot-patch). This hot-patch will require customer opt-in to use, and disables JNDI lookups from the Log4J2 library in customers’ containers. These updates are available as an Amazon Linux package for Amazon ECS customers, as a DaemonSet for Kubernetes users on AWS, and will be in supported AWS Fargate platform versions" Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS Elastic Beanstalk Not vuln Not vuln Not vuln Not vuln Default configuration of application's usage of Log4j versions is not vulnerable source
Amazon AWS ElastiCache Not vuln Fix Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS ELB Not vuln Fix Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS Fargate Not vuln Not vuln Not vuln Not vuln Opt-in hot-patch to mitigate the Log4j issue in JVM layer will be available as platform versions source hotpatch
Amazon AWS Glue Not vuln Fix Has been updated. Vulnerable only if ETL jobs load affected versions of Apache Log4j source
Amazon AWS Greengrass Not vuln Fix Updates for all Greengrass V2 components Stream Manager (2.0.14) and Secure Tunneling (1.0.6) are available. For Greengrass versions 1.10.x and 1.11.x, an update for the Stream Manager feature is included in Greengrass patch versions 1.10.5 and 1.11.5 source
Amazon AWS Inspector Not vuln Fix Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS IoT SiteWise Edge Not vuln Fix "Updates for all AWS IoT SiteWise Edge components that use Log4j were made available; OPC-UA collector (v2.0.3), Data processing pack (v2.0.14), and Publisher (v2.0.2)" source
Amazon AWS Kinesis Data Stream Not vuln Fix We are actively patching all sub-systems that use Log4j2 by applying updates. The Kinesis Client Library (KCL) version 2.X and the Kinesis Producer Library (KPL) are not impacted. For customers using KCL 1.x, we have released an updated version and we strongly recommend that all KCL version 1.x customers upgrade to KCL version 1.14.5 (or higher) Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS KMS Not vuln Fix source
Amazon AWS Lambda Not vuln Fix Vulnerable when using aws-lambda-java-log4j2 source
Amazon AWS Polly Not vuln Fix source
Amazon AWS QuickSight Not vuln Fix source
Amazon AWS RDS Not vuln Fix Amazon RDS and Amazon Aurora have been updated to mitigate the issues identified in CVE-2021-44228 Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS S3 Not vuln Fix Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS SDK Not vuln Not vuln Not vuln Not vuln source
Amazon AWS Secrets Manager Not vuln Fix source
Amazon AWS SNS Not vuln Fix Amazon SNS systems that serve customer traffic are patched against the Log4j2 issue. We are working to apply the Log4j2 patch to sub-systems that operate separately from SNS’s systems that serve customer traffic Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS SQS Not vuln Fix Update for Apache Log4j2 Issue (CVE-2021-44228)
Amazon AWS Systems Manager Not vuln Fix source
Amazon AWS Systems Manager Agent Not vuln Not vuln Not vuln Not vuln source
Amazon AWS Textract Not vuln Fix source
Amazon Chime Not vuln Fix Amazon Chime and Chime SDK services have been updated to mitigate the issues identified in CVE-2021-44228 and CVE-2021-45046 source
Amazon Cloud Directory Not vuln Fix source
Amazon CloudFront Not vuln Fix source
Amazon CloudWatch Not vuln Fix source
Amazon Cognito Not vuln Fix source
Amazon Connect Not vuln Fix source
Amazon Corretto Not vuln Not vuln Not vuln Not vuln 10/19 release distribution does not include Log4j. Vulnerable only if customer's applications use affected versions of Apache Log4j source
Amazon DocumentDB Not vuln Fix source
Amazon DynamoDB Not vuln Fix DynamoDB and DynamoDB Accelerator have been updated source
Amazon EC2 Not vuln Fix Packages for Amazon Linux 1 and 2 not affected, package for Amazon Linux 2022 is source fix
Amazon ECR Public Not vuln Fix Amazon-owned images published under a Verified Account on Amazon ECR Public are not affected by the Log4j issue source
Amazon ECS Not vuln Not vuln Not vuln Not vuln As an Amazon Linux package, opt-in hot-patch to mitigate the Log4j issue in JVM layer is available source hotpatch
Amazon EKS Not vuln Not vuln Not vuln Not vuln As a DaemonSet, opt-in hot-patch to mitigate the Log4j issue in JVM layer is available source hotpatch
Amazon Elastic Load Balancing Not vuln Fix Services have been updated. All Elastic Load Balancers, as well as Classic, Application, Network and Gateway, are not affected by this Log4j issue source
Amazon ElastiCache Not vuln Fix source
Amazon EMR Not vuln Fix Many customers are estimated to be vulnerable. Vulnerable only if affected EMR releases are used and untrusted sources are configured to be processed source
Amazon EventBridge Not vuln Fix source
Amazon Fraud Detector Not vuln Fix source
Amazon Inspector Not vuln Fix source
Amazon Inspector Classic Not vuln Fix source
Amazon Kafka (MSK) Not vuln Fix "Applying updates as required, portion of customers may still be vulnerable. Some MSK-specific service components use Log4j > 2.0.0 library and are being patched where needed" source
Amazon Kendra Not vuln Fix source
Amazon Keyspaces (for Apache Cassandra) Not vuln Fix source
Amazon Kinesis Not vuln Fix Update for Kinesis Agent is available source
Amazon Kinesis Data Analytics Not vuln Fix Updates are available. See source for more information source
Amazon Kinesis Data Streams Not vuln Fix KCL 2.x, KCL 1.14.5 or higher, and KPL are not vulnerable source
Amazon Lake Formation Not vuln Fix Update in progress, portion of customers may still be vulnerable. AWS Lake Formation service hosts are being updated to the latest version of Log4j source
Amazon Lex Not vuln Fix source
Amazon Linux 1 (AL1) Not vuln Not vuln Not vuln Not vuln By default not vulnerable. Opt-in hot-patch to mitigate the Log4j in JVM layer issue is available source hotpatch
Amazon Linux 2 (AL2) Not vuln Fix By default not vulnerable, and a new version of Amazon Kinesis Agent which is part of AL2 addresses the Log4j issue. Opt-in hot-patch to mitigate the Log4j issue in JVM layer is available source hotpatch
Amazon Lookout for Equipment Not vuln Fix source
Amazon Macie Not vuln Fix source
Amazon Macie Classic Not vuln Fix source
Amazon Managed Workflows for Apache Airflow (MWAA) Not vuln Fix source
Amazon MemoryDB for Redis Not vuln Fix source
Amazon Monitron Not vuln Fix source
Amazon MQ Not vuln Fix source
Amazon Neptune Not vuln Fix source
Amazon NICE Not vuln Fix Recommended to update EnginFrame or Log4j library source
Amazon OpenSearch R20211203-P2 Not vuln Fix Update released, customers need to update their clusters to the fixed release source
Amazon Pinpoint Not vuln Fix source
Amazon RDS Rolling update has completed Not vuln Fix source
Amazon RDS Aurora Rolling update has completed Not vuln Fix source
Amazon RDS for Oracle Not vuln Fix source
Amazon Redshift Not vuln Fix source
Amazon Rekognition Not vuln Fix source
Amazon Route53 Not vuln Fix source
Amazon S3 Not vuln Fix source
Amazon SageMaker Not vuln Fix Completed patching for the Apache Log4j2 issue (CVE-2021-44228). Vulnerable only if customer's applications use affected versions of Apache Log4j source
Amazon Simple Notification Service (SNS) Not vuln Fix Systems that serve customer traffic are patched against the Log4j2 issue. Working to apply the patch to sub-systems that operate separately from SNS’s systems that serve customer traffic. source
Amazon Simple Queue Service (SQS) Not vuln Fix source
Amazon Simple Workflow Service (SWF) Not vuln Fix source
Amazon Single Sign-On Not vuln Fix source
Amazon Step Functions Not vuln Fix source
Amazon Timestream Not vuln Fix source
Amazon Translate Not vuln Not vuln Not vuln Not vuln "Service not identified on <a href=""https://aws.amazon.com/security/security-bulletins/AWS-2021-006/"" rel=""nofollow"">AWS Log4j Security Bulletin" Amazon Translate
Amazon VPC Not vuln Fix source
Amazon WorkSpaces/AppStream 2.0 Not vuln Fix "Not affected with default configurations. WorkDocs Sync client versions 1.2.895.1 and older within Windows WorkSpaces, which contain the Log4j component, are vulnerable; For update instruction, see source for more info" source
AMD All Not vuln Not vuln Not vuln Not vuln Currently, no AMD products have been identified as affected. AMD is continuing its analysis. AMD Advisory Link
Anaconda All 4.10.3 Not vuln Not vuln Not vuln Not vuln source
AOMEI All Products Not vuln source
Apache ActiveMQ Artemis All Not vuln Not vuln Not vuln Not vuln "ActiveMQ Artemis does not use Log4j for logging. However, Log4j 1.2.17 is included in the Hawtio-based web console application archive (i.e. <a href=""/cisagov/log4j-affected-db/blob/develop/web/console.war/WEB-INF/lib"">web/console.war/WEB-INF/lib). Although this version of Log4j is not impacted by CVE-2021-44228 future versions of Artemis will be updated so that the Log4j jar is no longer included in the web console application archive. See <a href=""https://issues.apache.org/jira/browse/ARTEMIS-3612"" rel=""nofollow"">ARTEMIS-3612 for more information on that task." ApacheMQ - Update on CVE-2021-4428
Apache Airflow Not vuln Not vuln Not vuln Not vuln Airflow is written in Python Apache Airflow
Apache Archiva <2.2.6 Not vuln Fix Fixed in 2.2.6 source fix
Apache Camel All Not vuln Not vuln Not vuln Not vuln source
Apache Camel 2 Not vuln Not vuln Not vuln Not vuln APACHE CAMEL AND CVE-2021-44228 (LOG4J)
Apache Camel JBang <=3.1.4 Vulnerable APACHE CAMEL AND CVE-2021-44228 (LOG4J)
Apache Camel K Not vuln Not vuln Not vuln Not vuln APACHE CAMEL AND CVE-2021-44228 (LOG4J)
Apache Camel Karaf Vulnerable The Karaf team is aware of this and are working on a new Karaf 4.3.4 release with updated log4j. APACHE CAMEL AND CVE-2021-44228 (LOG4J)
Apache Camel Quarkus Not vuln Not vuln Not vuln Not vuln APACHE CAMEL AND CVE-2021-44228 (LOG4J)
Apache CamelKafka Connector Not vuln Not vuln Not vuln Not vuln APACHE CAMEL AND CVE-2021-44228 (LOG4J)
Apache Cassandra All Not vuln Not vuln Not vuln Not vuln source
Apache Druid 0.22.1 Not vuln Fix source
Apache Dubbo All Not vuln Fix source
Apache Flink 1.15.0, 1.14.2, 1.13.5, 1.12.7, 1.11.6 Not vuln Fix source
Apache Fortress < 2.0.7 Not vuln Fix Fixed in 2.0.7 source
Apache Geode 1.14.0 Not vuln Fix Fixed in 1.12.6, 1.13.5, 1.14.1 source
Apache Guacamole All Not vuln Not vuln Not vuln Not vuln source
Apache Hadoop Not vuln Not vuln Not vuln Not vuln "Uses log4j 1.x. Are <a href=""https://issues.apache.org/jira/plugins/servlet/mobile#issue/HADOOP-12956"" rel=""nofollow"">plans to migrate to log4j2 but never performed" source
Apache HBase Vulnerable Fix is committed, but not yet released source
Apache Hive 4.x Not vuln Fix Fix in 4.x source
Apache James 3.6.0 Vulnerable source
Apache Jena < 4.3.1 Not vuln Fix Fixed in 4.3.1 source
Apache JMeter Any Vulnerable Manual Bypass source
Apache JSPWiki 2.11.1 Not vuln Fix source
Apache Kafka All Workaround Not vuln Not vuln Not vuln Uses Log4j 1.2.17 source
Apache Karaf Vulnerable "Depends on <a href=""https://github.com/ops4j/org.ops4j.pax.logging/issues/414"">PAX logging which is affected" source
Apache Log4j < 2.15.0 Not vuln Fix Log4j – Apache Log4j Security Vulnerabilities
Apache Log4j 1.x All Workaround Not vuln Not vuln Not vuln source
Apache Log4j 2 2.3.1, 2.12.3, 2.17.0 Not vuln Fix Fix Fix source
Apache Maven All Not vuln source
Apache NiFi All Not vuln Fix Fixed in 1.15.1, 1.16.0 source
Apache OFBiz < 18.12.03 Not vuln Fix Fixed in 18.12.03 source
Apache Ozone < 1.2.1 Not vuln Fix Fixed in 1.2.1 source
Apache SkyWalking < 8.9.1 Not vuln Fix Fixed in 8.9.1 source
Apache SOLR 7.4.0 to 7.7.3, 8.0.0 to 8.11.0 Not vuln Fix Fixed in 8.11.1, Versions before 7.4 also vulnerable when using several configurations source
Apache Spark All Not vuln Not vuln Not vuln Not vuln Uses log4j 1.x source
Apache Struts 2.5.28 Vulnerable source
Apache Struts 2 Versions before 2.5.28.1 Not vuln Fix The Apache Struts group is pleased to announce that Struts 2.5.28.1 is available as a “General Availability” release. The GA designation is our highest quality grade. This release addresses Log4j vulnerability CVE-2021-45046 by using the latest Log4j 2.12.2 version (Java 1.7 compatible). Apache Struts Announcements
Apache Tapestry 5.7.3 Vulnerable Uses Log4j source
Apache Tika 2.0.0 and up Vulnerable source
Apache Tomcat Not vuln Not vuln Not vuln Not vuln source
Apache TrafficControl Vulnerable source
Apache Zookeeper Not vuln Not vuln Not vuln Not vuln Zookeeper uses Log4j 1.2 version source
APC by Schneider Electric Powerchute Business Edition v9.5, v10.0.1, v10.0.2, v10.0.3, v10.0.4 Not vuln Fix Mitigation instructions to remove the affected class. source
APC by Schneider Electric Powerchute Network Shutdown 4.2, 4.3, 4.4, 4.4.1 Not vuln Fix Mitigation instructions to remove the affected class. source
Apereo CAS 6.3.x & 6.4.x Not vuln Fix Other versions still in active maintainance might need manual inspection source
Apereo Opencast < 9.10, < 10.6 Not vuln Fix source
Apigee Edge and OPDK products All version Not vuln Not vuln Not vuln Not vuln source
Apollo All Apollo Community Link
Appdynamics All Appdynamics Advisory Link
Appeon PowerBuilder Appeon PowerBuilder 2017-2021 regardless of product edition Vulnerable
AppGate All AppGate Blog Post
Appian All Not vuln Fix source
Appian Platform All Not vuln Fix "KB-2204 Information about the Log4j2 security vulnerabilities (CVE-2021-44228 & CVE-2021-45046)"
Application Performance Ltd DBMarlin Not Affected
Application Performance Ltd DBMarlin Not vuln Not vuln Not vuln Not vuln Common Vulnerabilities Apache log4j Vulnerability CVE-2021-4428
APPSHEET All APPSHEET Community Link
Aptible All Search 5.x Not vuln Fix source
Aqua Security All Aqua Security Google Doc
Arbiter Systems All Not vuln Not vuln Not vuln Not vuln Arbiter Systems Advisory Link
Arca Noae All Arca Noae Link
Arcserve Backup All Not vuln Not vuln Not vuln Not vuln source
Arcserve Continuous Availability All Not vuln Not vuln Not vuln Not vuln source
Arcserve Email Archiving All Not vuln Not vuln Not vuln Not vuln source
Arcserve ShadowProtect All Not vuln Not vuln Not vuln Not vuln source
Arcserve ShadowXafe All Not vuln Not vuln Not vuln Not vuln source
Arcserve Solo All Not vuln Not vuln Not vuln Not vuln source
Arcserve StorageCraft OneXafe All Not vuln Not vuln Not vuln Not vuln source
Arcserve UDP 6.5-8.3 Not vuln Not vuln Not vuln Not vuln source
ArcticWolf All ArcticWolf Blog Post
Arduino IDE 1.8.17 Not vuln Fix source
Ariba All "Ariba Annoucement"
Arista All Arista Advisory Notice
Arista Networks Analytics Node for Converged Cloud Fabric (formerly Big Cloud Fabric) >7.0.0 Vulnerable source
Arista Networks Analytics Node for DANZ Monitoring Fabric (formerly Big Monitoring Fabric) >7.0.0 Vulnerable source
Arista Networks CloudVision Portal >2019.1.0 Vulnerable source
Arista Networks CloudVision Wi-Fi, virtual appliance or physical appliance >8.8 Vulnerable source
Arista Networks Embedded Analytics for Converged Cloud Fabric (formerly Big Cloud Fabric) >5.3.0 Vulnerable source
Aruba Networks All "Aruba Networks Notification"
Ataccama All Ataccama Link
Atera All Atera Link
Atlassian Bamboo Server & Data Center On prem Vulnerable Only vulnerable when using non-default config, cloud version fixed source
Atlassian BitBucket Server On prem Not vuln Workaround source
Atlassian Bitbucket Server & Data Center All Not vuln Fix This product is not vulnerable to remote code execution but may leak information due to the bundled Elasticsearch component being vulnerable. Multiple Products Security Advisory - Log4j Vulnerable To Remote Code Execution - CVE-2021-44228
Atlassian Confluence Server & Data Center On prem Vulnerable Only vulnerable when using non-default config, cloud version fixed source
Atlassian Confluence-CIS CSAT Pro v1.7.1 Vulnerable source
Atlassian Confluence-CIS WorkBench Not vuln source
Atlassian Confluence-CIS-CAT Lite v4.13.0 Vulnerable source
Atlassian Confluence-CIS-CAT Pro Assessor v3 Full and Dissolvable v3.0.77 Vulnerable source
Atlassian Confluence-CIS-CAT Pro Assessor v4 v4.13.0 Vulnerable source
Atlassian Confluence-CIS-CAT Pro Assessor v4 Service v1.13.0 Vulnerable source
Atlassian Confluence-CIS-CAT Pro Dashboard Not vuln source
Atlassian Confluence-CIS-Hosted CSAT Not vuln source
Atlassian Crowd Server & Data Center On prem Vulnerable Only vulnerable when using non-default config, cloud version fixed source
Atlassian Crucible On prem Vulnerable Only vulnerable when using non-default config, cloud version fixed source
Atlassian Fisheye On prem Vulnerable Only vulnerable when using non-default config, cloud version fixed source
Atlassian Jira Server & Data Center On prem Vulnerable Only vulnerable when using non-default config, cloud version fixed source
Attivo networks All Attivo Networks Advisory
AudioCodes All AudioCodes Link
Autodesk All Investigation source
Automation Anywhere Automation 360 Cloud Not vuln Fix source
Automation Anywhere Automation 360 On Premise Not vuln Workaround source
Automation Anywhere Automation Anywhere 11.3.x Not vuln Not vuln Not vuln Not vuln source
Automation Anywhere Automation Anywhere 11.x, <11.3.x Not vuln Workaround Workaround Workaround source
Automox All Automox Blog Post
Autopsy All Autopsy Link
Auvik All Auvik Status Link
Avantra SYSLINK All Avantra SYSLINK Article
Avaya All source
Avaya Analytics 3.5, 3.6, 3.6.1, 3.7, 4 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura for OneCloud Private Vulnerable Avaya is scanning and monitoring its OneCloud Private environments as part of its management activities. Avaya will continue to monitor this fluid situation and remediations will be made as patches become available, in accordance with appropriate change processes. Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Application Enablement Services 8.1.3.2, 8.1.3.3, 10.1 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Contact Center 7.0.2, 7.0.3, 7.1, 7.1.1, 7.1.2 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Device Services 8.0.1, 8.0.2, 8.1.3 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Device Services 8, 8.1, 8.1.4, 8.1.5 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Media Server 8.0.0, 8.0.1, 8.0.2 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Presence Services 10.1, 7.1.2, 8, 8.0.1, 8.0.2, 8.1, 8.1.1, 8.1.2, 8.1.3, 8.1.4 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Session Manager 10.1, 7.1.3, 8, 8.0.1, 8.1, 8.1.1, 8.1.2, 8.1.3 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® System Manager 10.1, 8.1.3 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Aura® Web Gateway 3.11[P], 3.8.1[P], 3.8[P], 3.9.1 [P], 3.9[P] Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Breeze™ 3.7, 3.8, 3.8.1 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Business Rules Engine 3.4, 3.5, 3.6, 3.7 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Callback Assist 5, 5.0.1 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Contact Center Select 7.0.2, 7.0.3, 7.1, 7.1.1, 7.1.2 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Control Manager 9.0.2, 9.0.2.1 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya CRM Connector - Connected Desktop 2.2 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Device Enablement Service 3.1.22 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Device Enrollment Service 3.1 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Equinox™ Conferencing 9.1.2 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Interaction Center 7.3.9 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya IP Office™ Platform 11.0.4, 11.1, 11.1.1, 11.1.2 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Meetings 9.1.10, 9.1.11, 9.1.12 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya one cloud private -UCaaS - Mid Market Aura 1 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya OneCloud-Private 2 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Proactive Outreach Manager 3.1.2, 3.1.3, 4, 4.0.1 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Session Border Controller for Enterprise 8.0.1, 8.1, 8.1.1, 8.1.2, 8.1.3 Not vuln Fix Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Social Media Hub Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
Avaya Workforce Engagement 5.3 Vulnerable Apache Log4J Vulnerability - Impact for Avaya products Avaya Product Security
AVEPOINT All AVEPOINT Notification
AVM All devices, firmware, software incl. MyFritz Service Not vuln source
AvTech RoomAlert All AvTech RoomAlert Article
AWS New All AWS New Security Bulletin
AXIS OS All Not vuln source
AXON All AXON Link
AXS Guard All AXS Guard Blog Post
Axways Applications All Axways Applications Link