<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>log4j &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/log4j/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Wed, 15 Dec 2021 02:11:23 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Synology CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/15/synology-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 02:11:23 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[Synology]]></category>
		<category><![CDATA[Synology CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12174</guid>

					<description><![CDATA[Synology所有產品均不受本次log4j(CVE-2021-44228)漏洞所影響，有使用相關設備的朋友們 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/15/synology-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Synology CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Synology所有產品均不受本次log4j(CVE-2021-44228)漏洞所影響，有使用相關設備的朋友們大可放心。</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Synology官方公告網頁訊息：</span><br />
<span style="font-size: 12pt; font-family: verdana, geneva;"><a href="https://www.synology.com/en-global/security/advisory/Synology_SA_21_30">https://www.synology.com/en-global/security/advisory/Synology_SA_21_30</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HP CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/15/hp-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 00:43:43 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12169</guid>

					<description><![CDATA[HP有部分HCI產品SimpliVity及3PAR磁碟陣列機被log4j(CVE-2021-44228)漏洞所 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/15/hp-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈HP CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">HP有部分HCI產品SimpliVity及3PAR磁碟陣列機被log4j(CVE-2021-44228)漏洞所影響，如您有使用這一類的HP設備，建議隨時注意HP相關的公告訊息，直到修補漏洞完畢。<span id="more-12169"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">HP 官方相關公告訊息網頁：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbgn04215en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbgn04215en_us</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVSS 3.0評定滿分的CVE-2021-44228漏洞</title>
		<link>https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:42:51 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[CVSS]]></category>
		<category><![CDATA[CVSS 3.0評定滿分的CVE-2021-44228漏洞]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12167</guid>

					<description><![CDATA[Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-442 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈CVSS 3.0評定滿分的CVE-2021-44228漏洞〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-44228漏洞，該漏洞會被評定為最高等級原因是該套件被應用的很廣泛，所多知名廠商都被影響到。<span id="more-12167"></span>漏洞流程說明：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img decoding="async" src="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability/_jcr_content/root/responsivegrid/image.img.png/1639460358616/log4j-01.png" alt="Log4j 漏洞圖" /></span><br />
<span style="font-size: 10pt; font-family: verdana, geneva;">圖片來自fortinet官方網頁：<a href="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability">https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Juniper 官方Blog有更詳細的攻擊過程說明：</span><br />
<span style="font-size: 12pt; font-family: verdana, geneva;"><a href="https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns">https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞影響程度：<br />
攻擊者透過Log4j的漏洞，將可以控制LDAP與其他JNDI有關的端點。</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞評分：<br />
</span>為10分，被評定最高危險等級。</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UniFi Network application CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/unifi-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:00:00 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[Unifi]]></category>
		<category><![CDATA[UniFi Network application]]></category>
		<category><![CDATA[UniFi Network application CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12162</guid>

					<description><![CDATA[UniFi公告了低於6.5.54的UniFi Network application具有log4j(CVE-2 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/unifi-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈UniFi Network application CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">UniFi公告了低於6.5.54的UniFi Network application具有log4j(CVE-2021-44228)漏洞，有使用該軟體的用戶，應盡快更新至6.5.54或更高版本確保資訊安全。<span id="more-12162"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">UniFi Network application相關CVE-2021-44228的官方訊息：<br />
<a href="https://community.ui.com/releases/Security-Advisory-Bulletin-023-023/808a1db0-5f8e-4b91-9097-9822f3f90207">https://community.ui.com/releases/Security-Advisory-Bulletin-023-023/808a1db0-5f8e-4b91-9097-9822f3f90207</a></p>
<p></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Extreme Networks CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/extreme-networks-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:49:59 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[Extreme]]></category>
		<category><![CDATA[Extreme Networks]]></category>
		<category><![CDATA[Extreme Networks CVE-2021-44228相關訊息]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12159</guid>

					<description><![CDATA[Extreme Networks官方公告的訊息中，絕大部份均無被log4j(CVE-2021-44228)漏洞 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/extreme-networks-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Extreme Networks CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Extreme Networks官方公告的訊息中，絕大部份均無被log4j(CVE-2021-44228)漏洞所影響，但有部份的產品尚在調查中，有使用該品牌的使用者依然得密切注意相關訊息。<span id="more-12159"></span></span></p>
<p>Extreme Networks官方CVE-2021-44228相關網頁訊息：<br />
<a href="https://extremeportal.force.com/ExtrArticleDetail?an=000100806&amp;_ga=2.8924661.1942628706.1639384902-1261081976.1634634957">https://extremeportal.force.com/ExtrArticleDetail?an=000100806&amp;_ga=2.8924661.1942628706.1639384902-1261081976.1634634957</a></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nutanix CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/nutanix-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:44:01 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[Nutanix]]></category>
		<category><![CDATA[Nutanix CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12156</guid>

					<description><![CDATA[Nutanix有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/nutanix-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Nutanix CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Nutanix有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修正釋出。<span id="more-12156"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Nutanix官方CVE-2021-44228相關訊息：<br />
<a href="https://download.nutanix.com/alerts/Security_Advisory_0023.pdf">https://download.nutanix.com/alerts/Security_Advisory_0023.pdf</a><br />
</span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fortinet CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/fortinet-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:34:51 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Fortinet CVE-2021-44228相關訊息]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12153</guid>

					<description><![CDATA[Fortinet有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/fortinet-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈Fortinet CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Fortinet有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修正釋出。<span id="more-12153"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Fortinet官方CVE-2021-44228相關公告：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://www.fortiguard.com/psirt/FG-IR-21-245?utm_source=blog&amp;utm_campaign=blog">https://www.fortiguard.com/psirt/FG-IR-21-245?utm_source=blog&amp;utm_campaign=blog</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>RuckusWireless CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/ruckuswireless-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:28:32 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[RuckusWireless]]></category>
		<category><![CDATA[RuckusWireless CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12150</guid>

					<description><![CDATA[RuckusWireless有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/ruckuswireless-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈RuckusWireless CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">RuckusWireless有部份產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修正釋出。<span id="more-12150"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">RuckusWireless官方CVE-2021-44228相關公告網頁：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://support.ruckuswireless.com/security_bulletins/313">https://support.ruckuswireless.com/security_bulletins/313</a></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SonicWall CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/sonicwall-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 13:06:33 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SonicWall CVE-2021-44228相關訊息]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12146</guid>

					<description><![CDATA[SonicWall相關產品絕大部份均不受log4j(CVE-2021-44228)漏洞所影響，但仍有部份產品還 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/sonicwall-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈SonicWall CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">SonicWall相關產品絕大部份均不受log4j(CVE-2021-44228)漏洞所影響，但仍有部份產品還在確認中，如果有在使用SonicWall相關產品的使用者，還是得多加注意。<span id="more-12146"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">SonicWall官方CVE-2021-4422相關公告：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>VMware CVE-2021-44228相關訊息</title>
		<link>https://ailog.tw/lifelog/2021/12/14/vmware-cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 12:22:25 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[log4j]]></category>
		<category><![CDATA[VMware]]></category>
		<category><![CDATA[VMware vCenter]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12143</guid>

					<description><![CDATA[VMware也有產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/vmware-cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈VMware CVE-2021-44228相關訊息〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">VMware也有產品被log4j(CVE-2021-44228)漏洞所影響，相關管理人員得多加注意，等待官方修正釋出。<span id="more-12143"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">官方相關公告：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://www.vmware.com/security/advisories/VMSA-2021-0028.html">https://www.vmware.com/security/advisories/VMSA-2021-0028.html</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">經常被使用的VMware vCenter Server也在受影響名單內，大家得提高警覺防範資安事件。</span></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
