Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE) for security responders.
We believe it is important to classify the vendors and products between:
- Internal risk - what you need to patch first to remove risk internally
- External risk - all third/fourth-party vendors that have custody of your data that might've been hacked that you will need to monitor and tackle once you're done patching
i.e. all vendors you should worry about if you have data in their environemnt or if they access to your environment
i.e. software components you might have used in building your products that you should worry if they cause you to be vulnerable
Compromised apps with confirmation
List of responses from various vendors, some affected and some not
Official list maintained by CISA - US Govt
Official list maintained by NCSC - NL govt, high update frequency
A fast and simple guide on what to do to respond to the log4j incident
General incident response guide in case you discover a 3rd party vendor of yours got hacked
We are happy to recieve contributions from the community. Contribution guidelines:
- Please make a PR editing the raw CSV files.
- Please be sure to include a reference source for each added row (claims without a validated link for source of claim will not be accepted)
This repo is maintained to simplify response for enterprises and organizations by separating between:
- Internal risk - Software components you need to search for and patch in your products / internal environment
- External risk - Third and fourth-party vendors/apps who might've been affected and you should to monitor if your data is in their custody
This list is a community project open for everyone to contribute to and is curated by: