<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2258 Information about the Ivanti EPMM security advisory (CVE-2023-35078, CVE-2023-35081)</title><link>https://community.appian.com/support/w/kb/3232/kb-2258-information-about-the-ivanti-epmm-security-advisory-cve-2023-35078-cve-2023-35081</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2258 Information about the Ivanti EPMM security advisory (CVE-2023-35078, CVE-2023-35081)</title><link>https://community.appian.com/support/w/kb/3232/kb-2258-information-about-the-ivanti-epmm-security-advisory-cve-2023-35078-cve-2023-35081</link><pubDate>Tue, 22 Aug 2023 20:13:10 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:d6395d53-9f7c-462b-9007-6a2f8d7ebe18</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3232/kb-2258-information-about-the-ivanti-epmm-security-advisory-cve-2023-35078-cve-2023-35081#comments</comments><description>Current Revision posted to Appian Knowledge Base by Elly Meng on 8/22/2023 8:13:10 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 24-July-2023, Ivanti released a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Ivanti Endpoint Manager Mobile (EPMM) software, followed by a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;security advisory update&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; on 28-July-2023.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Ivanti security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35078"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-35078&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35081"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-35081&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: August 22, 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>INT-2258 Information about the Ivanti EPMM security advisory (CVE-2023-35078, CVE-2023-35081)</title><link>https://community.appian.com/support/w/kb/3232/kb-2258-information-about-the-ivanti-epmm-security-advisory-cve-2023-35078-cve-2023-35081/revision/2</link><pubDate>Tue, 22 Aug 2023 20:12:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:d6395d53-9f7c-462b-9007-6a2f8d7ebe18</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3232/kb-2258-information-about-the-ivanti-epmm-security-advisory-cve-2023-35078-cve-2023-35081#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Elly Meng on 8/22/2023 8:12:16 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 24-July-2023, Ivanti released a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Ivanti Endpoint Manager Mobile (EPMM) software, followed by a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;security advisory update&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; on 28-July-2023.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Ivanti security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35078"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-35078&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35081"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-35081&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: August 22, 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the Ivanti EPMM security advisory (CVE-2023-35078, CVE-2023-35081)</title><link>https://community.appian.com/support/w/kb/3232/kb-2258-information-about-the-ivanti-epmm-security-advisory-cve-2023-35078-cve-2023-35081/revision/1</link><pubDate>Tue, 22 Aug 2023 20:10:41 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:d6395d53-9f7c-462b-9007-6a2f8d7ebe18</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3232/kb-2258-information-about-the-ivanti-epmm-security-advisory-cve-2023-35078-cve-2023-35081#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Elly Meng on 8/22/2023 8:10:41 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 24-July-2023, Ivanti released a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Ivanti Endpoint Manager Mobile (EPMM) software, followed by a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;security advisory update&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; on 28-July-2023.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerability described in the Ivanti security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Additional Notes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35078"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-35078&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35081"&gt;&lt;span style="font-weight:400;"&gt;CVE-2023-35081&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/cve-2023-35081-new-ivanti-epmm-vulnerability&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: August 22, 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item></channel></rss>