<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2255 Information about the Citrix NetScaler ADC security advisory (CVE-2023-3466, CVE-2023-3467, CVE 2023-3519)</title><link>https://community.appian.com/support/w/kb/3210/kb-2255-information-about-the-citrix-netscaler-adc-security-advisory-cve-2023-3466-cve-2023-3467-cve-2023-3519</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2255 Information about the Citrix NetScaler ADC security advisory (CVE-2023-3466, CVE-2023-3467, CVE 2023-3519)</title><link>https://community.appian.com/support/w/kb/3210/kb-2255-information-about-the-citrix-netscaler-adc-security-advisory-cve-2023-3466-cve-2023-3467-cve-2023-3519</link><pubDate>Tue, 25 Jul 2023 16:54:45 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:75e52e9d-6d1f-49ea-94c2-d262820049d2</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3210/kb-2255-information-about-the-citrix-netscaler-adc-security-advisory-cve-2023-3466-cve-2023-3467-cve-2023-3519#comments</comments><description>Current Revision posted to Appian Knowledge Base by Elly Meng on 7/25/2023 4:54:45 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 18-July-2023, Citrix released a &lt;/span&gt;&lt;a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467"&gt;&lt;span style="font-weight:400;"&gt;Critical security bulletin&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Citrix NetScaler ADC software.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Citrix security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3466"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-3466&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Reflected Cross-Site Scripting (XSS)&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3467"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-3467&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Privilege Escalation to root administrator (nsroot)&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3519"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-3519&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467"&gt;&lt;span style="font-weight:400;"&gt;https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: July 25, 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2255 Information about the Citrix NetScaler ADC security advisory (CVE-2023-3466, CVE-2023-3467, CVE 2023-3519)</title><link>https://community.appian.com/support/w/kb/3210/kb-2255-information-about-the-citrix-netscaler-adc-security-advisory-cve-2023-3466-cve-2023-3467-cve-2023-3519/revision/1</link><pubDate>Tue, 25 Jul 2023 16:54:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:75e52e9d-6d1f-49ea-94c2-d262820049d2</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3210/kb-2255-information-about-the-citrix-netscaler-adc-security-advisory-cve-2023-3466-cve-2023-3467-cve-2023-3519#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Elly Meng on 7/25/2023 4:54:15 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 18-July-2023, Citrix released a &lt;/span&gt;&lt;a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467"&gt;&lt;span style="font-weight:400;"&gt;Critical security bulletin&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Citrix NetScaler ADC software.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Citrix security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3466"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-3466&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Reflected Cross-Site Scripting (XSS)&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3467"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-3467&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Privilege Escalation to root administrator (nsroot)&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3519"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-3519&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467"&gt;&lt;span style="font-weight:400;"&gt;https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: July 25, 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>