diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js
index 4c1bffb39..d76b3131f 100644
--- a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js
+++ b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js
@@ -14,7 +14,8 @@ export function log4shellIssueReport(issue) {
className="badge badge-info" style={{margin: '2px'}}>{issue.ip_address}:{issue.port}) is vulnerable to the Log4Shell remote code execution attack.
- The attack was made possible due to an old version of Apache Log4j component.
+ The attack was made possible due to an old version of Apache Log4j component. CVE-2021-44228
>
);