Log in
Register
Cyber Forum
More options
Toggle width
Share this page
Share this page
Share
Share
Cyber Forum
Log in
Register
More options
Toggle width
Share this page
Share this page
Share
Share
Menu
Install the app
Install
Home
CyberWeekly Podcast
Breaking News! Podcast
Cyber Risk Rating
Forums
New posts
Forum list
Trending
Leaderboards
News Feeds
Resources
Latest reviews
Sophos X-Ops Intelix
Threat Reports
Members
Current visitors
My.CompTIA
Help Documents
Preference Center
Forums
Security
Active Exploits Discussion/Recommendations
Log4j Vulnerability Information
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Ron Culler" data-source="post: 2454" data-attributes="member: 12"><p>Firewall/Security Appliance vendors guidance on impacted and cleared products. Most have also released signatures that should enable detection and blocking of this attack but only if you are able to do SSL Inspection on the appliance.</p><p></p><p>Fortinet has identified the following list of products that are impacted and those under active review:</p><p>Advisory ID FG-IR-21-245</p><p>[URL unfurl="true"]https://www.fortiguard.com/psirt/FG-IR-21-245[/URL]</p><p></p><p>SonicWALL has identified the following product as impacted and those under active review:</p><p>Advisory ID SNWLID-2021-0032</p><p><a href="https://psirt.global.sonicwall.com/vuln-list" target="_blank">https://psirt.global.sonicwall.com/vuln-list</a> </p><p></p><p>Cisco has identified an extensive list of products impacted and those under active review: </p><p>Advisory ID cisco-sa-apache-log4j-qRuKNEbd</p><p>[URL unfurl="true"]https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-apache-log4j-qRuKNEbd.html?dtid=osscdc000283[/URL]</p><p></p><p>Sophos has identified a list of products impacted and those under active review:</p><p>[URL unfurl="true"]https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce[/URL]</p><p></p><p>Watchguard has identified a list of products impacted and those cleared:</p><p>[URL unfurl="true"]https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/[/URL]</p><p></p><p>PaloAlto has a list of cleared products</p><p>[URL unfurl="true"]https://security.paloaltonetworks.com/CVE-2021-44228[/URL]</p></blockquote><p></p>
[QUOTE="Ron Culler, post: 2454, member: 12"] Firewall/Security Appliance vendors guidance on impacted and cleared products. Most have also released signatures that should enable detection and blocking of this attack but only if you are able to do SSL Inspection on the appliance. Fortinet has identified the following list of products that are impacted and those under active review: Advisory ID FG-IR-21-245 [URL unfurl="true"]https://www.fortiguard.com/psirt/FG-IR-21-245[/URL] SonicWALL has identified the following product as impacted and those under active review: Advisory ID SNWLID-2021-0032 [URL]https://psirt.global.sonicwall.com/vuln-list[/URL] Cisco has identified an extensive list of products impacted and those under active review: Advisory ID cisco-sa-apache-log4j-qRuKNEbd [URL unfurl="true"]https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-apache-log4j-qRuKNEbd.html?dtid=osscdc000283[/URL] Sophos has identified a list of products impacted and those under active review: [URL unfurl="true"]https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce[/URL] Watchguard has identified a list of products impacted and those cleared: [URL unfurl="true"]https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/[/URL] PaloAlto has a list of cleared products [URL unfurl="true"]https://security.paloaltonetworks.com/CVE-2021-44228[/URL] [/QUOTE]
Name
Verification
Post reply
Forums
Security
Active Exploits Discussion/Recommendations
Log4j Vulnerability Information
Top
Bottom
Home
Forums
Threat Reports
My.CompTIA
Menu