<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CVE-2021-44228 &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/cve-2021-44228/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Wed, 15 Dec 2021 02:11:23 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Synology CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/15/synology-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 02:11:23 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[Synology]]></category>
		<category><![CDATA[Synology CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12174</guid>

					<description><![CDATA[Synology所有產品均不受本次log4j(CVE-2021-44228)漏洞所影響，有使用相關設備的朋友們 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/15/synology-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Synology CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Synology所有產品均不受本次log4j(CVE-2021-44228)漏洞所影響，有使用相關設備的朋友們大可放心。</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Synology官方公告網頁訊息：</span><br />
<span style="font-size: 12pt; font-family: verdana, geneva;"><a href="https://www.synology.com/en-global/security/advisory/Synology_SA_21_30">https://www.synology.com/en-global/security/advisory/Synology_SA_21_30</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HP CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/15/hp-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 00:43:43 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12169</guid>

					<description><![CDATA[HP有部分HCI產品SimpliVity及3PAR磁碟陣列機被log4j(CVE-2021-44228)漏洞所 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/15/hp-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈HP CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">HP有部分HCI產品SimpliVity及3PAR磁碟陣列機被log4j(CVE-2021-44228)漏洞所影響，如您有使用這一類的HP設備，建議隨時注意HP相關的公告訊息，直到修補漏洞完畢。<span id="more-12169"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">HP 官方相關公告訊息網頁：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbgn04215en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbgn04215en_us</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVSS 3.0評定滿分的CVE-2021-44228漏洞</title>
		<link>https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:42:51 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[CVSS]]></category>
		<category><![CDATA[CVSS 3.0評定滿分的CVE-2021-44228漏洞]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12167</guid>

					<description><![CDATA[Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-442 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈CVSS 3.0評定滿分的CVE-2021-44228漏洞〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-44228漏洞，該漏洞會被評定為最高等級原因是該套件被應用的很廣泛，所多知名廠商都被影響到。<span id="more-12167"></span>漏洞流程說明：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img decoding="async" src="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability/_jcr_content/root/responsivegrid/image.img.png/1639460358616/log4j-01.png" alt="Log4j 漏洞圖" /></span><br />
<span style="font-size: 10pt; font-family: verdana, geneva;">圖片來自fortinet官方網頁：<a href="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability">https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Juniper 官方Blog有更詳細的攻擊過程說明：</span><br />
<span style="font-size: 12pt; font-family: verdana, geneva;"><a href="https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns">https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞影響程度：<br />
攻擊者透過Log4j的漏洞，將可以控制LDAP與其他JNDI有關的端點。</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞評分：<br />
</span>為10分，被評定最高危險等級。</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dell CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/dell-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:17:26 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[dell]]></category>
		<category><![CDATA[Dell CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12165</guid>

					<description><![CDATA[Dell目前佔據伺服器設備絕大部份的市場，因此也有不少設備被log4j(CVE-2021-44228)漏洞所影 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/dell-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Dell CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Dell目前佔據伺服器設備絕大部份的市場，因此也有不少設備被log4j(CVE-2021-44228)漏洞所影響，如您有使用Dell的伺服器、儲存設備等相關產品，建議隨時注意Dell相關的公告訊息，直到修補漏洞完畢。<span id="more-12165"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Dell 官方相關公告訊息網頁：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://www.dell.com/support/kbdoc/zh-tw/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability">https://www.dell.com/support/kbdoc/zh-tw/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">值得注意的是，「Data Domain OS 」、「Dell EMC Avamar 」、「Dell EMC PowerFlex Appliance 」、「Dell EMC PowerFlex Rack 」、「Dell EMC PowerStore 」、「Dell EMC SRM vApp 」、「Dell EMC Unity 」、「Dell EMC VxRail  」、「OpenManage Enterprise 」、「Secure Connect Gateway (SCG) 5.0 Appliance」、「SupportAssist Enterprise 」等相關熱銷產品均有在影響名單內。</span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UniFi Network application CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/unifi-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:00:00 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[Unifi]]></category>
		<category><![CDATA[UniFi Network application]]></category>
		<category><![CDATA[UniFi Network application CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12162</guid>

					<description><![CDATA[UniFi公告了低於6.5.54的UniFi Network application具有log4j(CVE-2 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/unifi-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈UniFi Network application CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">UniFi公告了低於6.5.54的UniFi Network application具有log4j(CVE-2021-44228)漏洞，有使用該軟體的用戶，應盡快更新至6.5.54或更高版本確保資訊安全。<span id="more-12162"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">UniFi Network application相關CVE-2021-44228的官方訊息：<br />
<a href="https://community.ui.com/releases/Security-Advisory-Bulletin-023-023/808a1db0-5f8e-4b91-9097-9822f3f90207">https://community.ui.com/releases/Security-Advisory-Bulletin-023-023/808a1db0-5f8e-4b91-9097-9822f3f90207</a></p>
<p></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Extreme Networks CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/extreme-networks-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:49:59 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[Extreme]]></category>
		<category><![CDATA[Extreme Networks]]></category>
		<category><![CDATA[Extreme Networks CVE-2021-44228相關訊息]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12159</guid>

					<description><![CDATA[Extreme Networks官方公告的訊息中，絕大部份均無被log4j(CVE-2021-44228)漏洞 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/extreme-networks-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Extreme Networks CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Extreme Networks官方公告的訊息中，絕大部份均無被log4j(CVE-2021-44228)漏洞所影響，但有部份的產品尚在調查中，有使用該品牌的使用者依然得密切注意相關訊息。<span id="more-12159"></span></span></p>
<p>Extreme Networks官方CVE-2021-44228相關網頁訊息：<br />
<a href="https://extremeportal.force.com/ExtrArticleDetail?an=000100806&amp;_ga=2.8924661.1942628706.1639384902-1261081976.1634634957">https://extremeportal.force.com/ExtrArticleDetail?an=000100806&amp;_ga=2.8924661.1942628706.1639384902-1261081976.1634634957</a></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nutanix CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/nutanix-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:44:01 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[Nutanix]]></category>
		<category><![CDATA[Nutanix CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12156</guid>

					<description><![CDATA[Nutanix有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/nutanix-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Nutanix CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Nutanix有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修正釋出。<span id="more-12156"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Nutanix官方CVE-2021-44228相關訊息：<br />
<a href="https://download.nutanix.com/alerts/Security_Advisory_0023.pdf">https://download.nutanix.com/alerts/Security_Advisory_0023.pdf</a><br />
</span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fortinet CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/fortinet-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:34:51 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Fortinet CVE-2021-44228相關訊息]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12153</guid>

					<description><![CDATA[Fortinet有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/fortinet-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Fortinet CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Fortinet有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修正釋出。<span id="more-12153"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Fortinet官方CVE-2021-44228相關公告：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://www.fortiguard.com/psirt/FG-IR-21-245?utm_source=blog&amp;utm_campaign=blog">https://www.fortiguard.com/psirt/FG-IR-21-245?utm_source=blog&amp;utm_campaign=blog</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>RuckusWireless CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/ruckuswireless-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:28:32 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[RuckusWireless]]></category>
		<category><![CDATA[RuckusWireless CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12150</guid>

					<description><![CDATA[RuckusWireless有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/ruckuswireless-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈RuckusWireless CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">RuckusWireless有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修正釋出。<span id="more-12150"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">RuckusWireless官方CVE-2021-44228相關公告網頁：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://support.ruckuswireless.com/security_bulletins/313">https://support.ruckuswireless.com/security_bulletins/313</a></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SonicWall CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/sonicwall-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:06:33 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SonicWall CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12146</guid>

					<description><![CDATA[SonicWall相關產品絕大部份均不受log4j(CVE-2021-44228)漏洞所影響，但仍有部份產品還 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/sonicwall-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈SonicWall CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">SonicWall相關產品絕大部份均不受log4j(CVE-2021-44228)漏洞所影響，但仍有部份產品還在確認中，如果有在使用SonicWall相關產品的使用者，還是得多加注意。<span id="more-12146"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">SonicWall官方CVE-2021-4422相關公告：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
