<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2247 Information about the Progress Software MOVEit security advisory (CVE-2023-34362)</title><link>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2247 Information about the Progress Software MOVEit security advisory (CVE-2023-34362)</title><link>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362</link><pubDate>Thu, 08 Jun 2023 15:23:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:cba47777-32ed-4067-b997-8dc3f7ffc290</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362#comments</comments><description>Current Revision posted to Appian Knowledge Base by Elly Meng on 6/8/2023 3:23:40 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 31-May-2023, Progress Software released a &lt;/span&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;Critical Severity security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the MOVEit Transfer software.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Progress Software security advisory. We will continue to monitor the situation and provide any updates as appropriate.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2023-34362"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-34362&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;MOVEit Transfer Critical Vulnerability (May 2023)&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: June 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, Security&lt;/div&gt;
</description></item><item><title>KB-2247 Information about the Progress Software MOVEit security advisory (CVE-2023-34362)</title><link>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362/revision/3</link><pubDate>Tue, 06 Jun 2023 18:09:45 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:cba47777-32ed-4067-b997-8dc3f7ffc290</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Elly Meng on 6/6/2023 6:09:45 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 31-May-2023, Progress Software released a &lt;/span&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;Critical Severity security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the MOVEit Transfer software.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Progress Software security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2023-34362"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-34362&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;MOVEit Transfer Critical Vulnerability (May 2023)&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: June 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, Security&lt;/div&gt;
</description></item><item><title>KB-2247 Information about the Progress Software MOVEit security advisory (CVE-2023-34362)</title><link>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362/revision/2</link><pubDate>Tue, 06 Jun 2023 18:07:23 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:cba47777-32ed-4067-b997-8dc3f7ffc290</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Elly Meng on 6/6/2023 6:07:23 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 31-May-2023, Progress Software released a &lt;/span&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;Critical Severity security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the MOVEit Transfer software.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Progress Software security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2023-34362"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-34362&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;MOVEit Transfer Critical Vulnerability (May 2023)&amp;rdquo;)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: June 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, Security&lt;/div&gt;
</description></item><item><title>KB-2247 Information about the Progress Software MOVEit security advisory (CVE-2023-34362)</title><link>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362/revision/1</link><pubDate>Tue, 06 Jun 2023 18:05:44 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:cba47777-32ed-4067-b997-8dc3f7ffc290</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3179/kb-2247-information-about-the-progress-software-moveit-security-advisory-cve-2023-34362#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Elly Meng on 6/6/2023 6:05:44 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 31-May-2023, Progress Software released a &lt;/span&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;Critical Severity security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the MOVEit Transfer software.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Progress Software security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2023-34362"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-34362&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;MOVEit Transfer Critical Vulnerability (May 2023)&amp;rdquo;).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/06/01/progress-software-releases-security-advisory-moveit-transfer&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023"&gt;&lt;span style="font-weight:400;"&gt;https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: June 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: administration, Security&lt;/div&gt;
</description></item></channel></rss>