Running Apache, the following vulnerabilities have been found:
AutoComplete Attribute Not Disabled for Password in Form Based Authentication
EOL/Obsolete Software: Apache Log4j 1.X Detected
Apache Log4j 1.2 Remote Code Execution Vulnerability
Apache Log4j Denial of Service (DOS) Vulnerability (Log4Shell)
Apache Log4j Remote Code Execution (RCE) Vulnerability (CVE-2021-44832)
Apache Log4j Remote Code Execution (RCE) Vulnerability (CVE-2021-45046) (Log4Shell)
Apache Log4j Remote Code Execution (RCE) Vulnerability (Log4Shell)
Apache Struts2 Remote Code Execution (S2-066)
Fix the "AutoComplete Attribute Not Disabled for Password in Form Based Authentication" by adding autocomplete="off" in the input element of the forms (1).
The oldest supported version of latest CA Access Gateway (SPS), which is 12.8SP6a, runs Log4j 2.17.1 (2).
More, the CVE-2021-44832, and CVE-2021-45046 don't affect CA Access Gateway (SPS) (3).
The "Apache Log4j Denial of Service (DOS) Vulnerability (Log4Shell)" also doesn't affect the oldest supported version of CA Access Gateway (SPS) 12.8SP6a (4).
The "Apache Log4j Remote Code Execution (RCE) Vulnerability (Log4Shell)" also doesn't affect the oldest supported version of CA Access Gateway (SPS) 12.8sp6a (5).
Finally, about "Apache Struts2 Remote Code Execution (S2-066)", no struts2 files can be found in the installed files.