<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2286 Information about the Ivanti Connect Secure and Ivanti Policy Secure security advisories (CVE-2024-46805, CVE-2024-21887, CVE-2024-21888, CVE-2024-21893)</title><link>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2286 Information about the Ivanti Connect Secure and Ivanti Policy Secure security advisories (CVE-2024-46805, CVE-2024-21887, CVE-2024-21888, CVE-2024-21893)</title><link>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893</link><pubDate>Tue, 06 Feb 2024 23:05:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:87727236-6cbe-4185-a38a-f603ac0237a6</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893#comments</comments><description>Current Revision posted to Appian Knowledge Base by Kevin Kleinegger on 2/6/2024 11:05:17 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 10-Jan-2024, Ivanti released a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Ivanti Connect Secure and Ivanti Policy Secure software. On 12-Jan-2024, CISA released a &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;, noting that the vulnerabilities identified in the vulnerable Ivanti products have been exploited in the wild. This was followed by a CISA &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;emergency directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; on 19-Jan-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the Ivanti security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Additional Notes&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46805"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-46805&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21887"&gt;&lt;span&gt;CVE-2024-21887&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21888"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-21888&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Ivanti Policy Secure privilege escalation vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21893"&gt;CVE-2024-21893&lt;/a&gt; (&amp;ldquo;Ivanti Connect Secure and Ivanti Policy Secure server-side request forgery vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: February 7, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2286 Information about the Ivanti Connect Secure and Ivanti Policy Secure security advisories (CVE-2024-46805, CVE-2024-21887, CVE-2024-21888, CVE-2024-21893)</title><link>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893/revision/3</link><pubDate>Tue, 06 Feb 2024 23:05:00 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:87727236-6cbe-4185-a38a-f603ac0237a6</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Kevin Kleinegger on 2/6/2024 11:05:00 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 10-Jan-2024, Ivanti released a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Ivanti Connect Secure and Ivanti Policy Secure software. On 12-Jan-2024, CISA released a &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;, noting that the vulnerabilities identified in the vulnerable Ivanti products have been exploited in the wild. This was followed by a CISA &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;emergency directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; on 19-Jan-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the Ivanti security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Additional Notes&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46805"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-46805&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21887"&gt;&lt;span&gt;CVE-2024-21887&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21888"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-21888&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Ivanti Policy Secure privilege escalation vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21893"&gt;CVE-2024-21893&lt;/a&gt; (&amp;ldquo;Ivanti Connect Secure and Ivanti Policy Secure server-side request forgery vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: January 22, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2286 Information about the Ivanti Connect Secure and Ivanti Policy Secure security advisories (CVE-2024-46805, CVE-2024-21887)</title><link>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893/revision/2</link><pubDate>Mon, 22 Jan 2024 23:27:16 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:87727236-6cbe-4185-a38a-f603ac0237a6</guid><dc:creator>Maggie Deppe-Walker</dc:creator><comments>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Maggie Deppe-Walker on 1/22/2024 11:27:16 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 10-Jan-2024, Ivanti released a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Ivanti Connect Secure and Ivanti Policy Secure software. On 12-Jan-2024, CISA released a &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;, noting that the vulnerabilities identified in the vulnerable Ivanti products have been exploited in the wild. This was followed by a CISA &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;emergency directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; on 19-Jan-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the Ivanti security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Additional Notes&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46805"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-46805&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21887"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-21887&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: January 22, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2286</title><link>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893/revision/1</link><pubDate>Mon, 22 Jan 2024 23:25:58 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:87727236-6cbe-4185-a38a-f603ac0237a6</guid><dc:creator>Maggie Deppe-Walker</dc:creator><comments>https://community.appian.com/support/w/kb/3454/kb-2286-information-about-the-ivanti-connect-secure-and-ivanti-policy-secure-security-advisories-cve-2024-46805-cve-2024-21887-cve-2024-21888-cve-2024-21893#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Maggie Deppe-Walker on 1/22/2024 11:25:58 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 10-Jan-2024, Ivanti released a &lt;/span&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; for all organizations using the Ivanti Connect Secure and Ivanti Policy Secure software. On 12-Jan-2024, CISA released a &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;, noting that the vulnerabilities identified in the vulnerable Ivanti products have been exploited in the wild. This was followed by a CISA &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;emergency directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; on 19-Jan-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the Ivanti security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Additional Notes&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-46805"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-46805&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-21887"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-21887&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;Ivanti Connect Secure and Policy Secure Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/01/10/ivanti-releases-security-update-connect-secure-and-policy-secure-gateways&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways"&gt;&lt;span style="font-weight:400;"&gt;https://www.ivanti.com/blog/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: January 22, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>