U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CPE Summary

CPE Names

Version 2.3: cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:*

Version 2.2: cpe:/a:cisco:network_services_orchestrator:-

Read information about CPE Name encoding

CPE Name Components Select a component to search for similar CPEs

Part:
a
Vendor:
cisco
Product:
network_services_orchestrator
Version:
-

Quick Info

Created On:
12/20/2021
Last Modified On:
12/29/2023

Metadata

Titles:

Text Locale
Cisco Network Services Orchestrator (NSO) en_US

References:

Type Description URL
Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf
Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf
Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
Advisory https://github.com/cisagov/log4j-affected-db
Advisory https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228
Advisory https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html
Advisory https://lists.fedoraproject.org/archives/list/[email protected]/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/
Advisory https://lists.fedoraproject.org/archives/list/[email protected]/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/
Advisory https://logging.apache.org/log4j/2.x/security.html
Advisory https://msrc.microsoft.com/blog/2021/12/microsofts-response-to-cve-2021-44228-apache-log4j2/
Advisory https://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
Advisory https://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html
Advisory https://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html
Advisory https://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
Advisory https://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html
Advisory https://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html
Advisory https://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html
Advisory https://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html
Advisory https://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html
Advisory https://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html
Advisory https://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html
Advisory https://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html
Advisory https://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html
Advisory https://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html
Advisory https://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html
Advisory https://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html
Version https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
Advisory https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-info-disclosure-WdNvBTNq
Advisory https://seclists.org/fulldisclosure/2022/Dec/2
Advisory https://seclists.org/fulldisclosure/2022/Jul/11
Advisory https://seclists.org/fulldisclosure/2022/Mar/23
Advisory https://security.netapp.com/advisory/ntap-20211210-0007/
Advisory https://support.apple.com/en-us/HT213189
Advisory https://www.debian.org/security/2021/dsa-5020
Advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
Advisory https://www.kb.cert.org/vuls/id/930724
Advisory https://www.openwall.com/lists/oss-security/2021/12/10/1
Advisory https://www.openwall.com/lists/oss-security/2021/12/10/2
Advisory https://www.openwall.com/lists/oss-security/2021/12/10/3
Advisory https://www.openwall.com/lists/oss-security/2021/12/13/1
Advisory https://www.openwall.com/lists/oss-security/2021/12/13/2
Advisory https://www.openwall.com/lists/oss-security/2021/12/14/4
Advisory https://www.openwall.com/lists/oss-security/2021/12/15/3
Advisory https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
Advisory https://www.oracle.com/security-alerts/cpuapr2022.html
Advisory https://www.oracle.com/security-alerts/cpujan2022.html