Log4j2 Java Security Exploit Slams Intel, NVIDIA And Microsoft But Spares AMD
The list of vulnerable programs doesn't stop at the boundary of "programs coded in Java," either. Thanks in part to Java's inherently-platform-agnostic nature, Log4j has been included in everything from client-facing applications like Minecraft to operating system-level packages from Microsoft. Unsurprisingly, Intel and NVIDIA also have their own vulnerable packages to watch out for.
Starting with MS, the company is quick to assure partners that it "has not identified any exploitation of [its] enterprise services" through the Log4shell exploit. However, there's a fair bundle of Microsoft services that have security updates to mitigate the vulnerability. Included in the list is Minecraft, of course, but beyond that are a number of Azure services as well as the company's SQL server software. You can check out the list on Microsoft's advisory page.

Over at NVIDIA, there seems to be a bit less cause for concern. In its advisory, Team Green immediately notes that its client-facing software—including the GeForce Experience app, its GeForce NOW client, the Jetson products, and the SHIELD TV—are all unaffected by the exploit. It does have some vulnerable packages elsewhere, though.
The CUDA Toolkit includes Log4j in both the Visual Profiler and Nsight Eclipse Edition, although apparently it is not used at all in the Visual Profiler and can simply be removed. Similarly, DGX OS doesn't include Log4j by default, but NVIDIA advises to check for it anyway, as it may have been included with third-party software. NVIDIA's NetQ and its VGPU software license server will both be affected and will require upgrading.
But what about team red? The house of Ryzen and Radeon put out a brief advisory about the Log4shell exploit, but amazingly, it simply says AMD hasn't identified any affected products. Hopefully that's because the company wasn't using Log4j, and not because it simply hasn't found any vulnerabilities.