<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2295 Information about the ConnectWise ScreenConnect security advisory (CVE-2024-1708 &amp; CVE-2024-1709)</title><link>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2295 Information about the ConnectWise ScreenConnect security advisory (CVE-2024-1708 &amp; CVE-2024-1709)</title><link>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709</link><pubDate>Tue, 27 Feb 2024 22:11:56 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:8c523ceb-280b-4aa6-b2ee-96a42d98d950</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709#comments</comments><description>Current Revision posted to Appian Knowledge Base by Kevin Kleinegger on 2/27/2024 10:11:56 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 19-Feb-2024, ConnectWise released a security advisory for all organizations using their ScreenConnect software on-premises offering for versions 23.9.7 and prior for a remote code execution vulnerability. Additionally, one of the described vulnerabilities was added to CISA&amp;rsquo;s Known Exploited Vulnerability catalog on 22-Feb-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the ConnectWise security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1hnm9qht70"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1708&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;Improper Limitation of a Pathname to a Restricted Directory (&amp;#39;Path Traversal&amp;#39;)&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1709"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1709&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;ConnectWise ScreenConnect Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht71"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8&lt;/a&gt;&lt;a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht72"&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Feb 26, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2294 Information about the ConnectWise ScreenConnect security advisory (CVE-2024-1708 &amp; CVE-2024-1709)</title><link>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709/revision/3</link><pubDate>Tue, 27 Feb 2024 22:11:36 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:8c523ceb-280b-4aa6-b2ee-96a42d98d950</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Kevin Kleinegger on 2/27/2024 10:11:36 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 19-Feb-2024, ConnectWise released a security advisory for all organizations using their ScreenConnect software on-premises offering for versions 23.9.7 and prior for a remote code execution vulnerability. Additionally, one of the described vulnerabilities was added to CISA&amp;rsquo;s Known Exploited Vulnerability catalog on 22-Feb-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the ConnectWise security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1hnm9qht70"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1708&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;Improper Limitation of a Pathname to a Restricted Directory (&amp;#39;Path Traversal&amp;#39;)&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1709"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1709&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;ConnectWise ScreenConnect Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht71"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8&lt;/a&gt;&lt;a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht72"&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Feb 26, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>DRAFT KB-2294 Information about the ConnectWise ScreenConnect security advisory (CVE-2024-1708 &amp; CVE-2024-1709)</title><link>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709/revision/2</link><pubDate>Tue, 27 Feb 2024 22:10:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:8c523ceb-280b-4aa6-b2ee-96a42d98d950</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Kevin Kleinegger on 2/27/2024 10:10:15 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 19-Feb-2024, ConnectWise released a security advisory for all organizations using their ScreenConnect software on-premises offering for versions 23.9.7 and prior for a remote code execution vulnerability. Additionally, one of the described vulnerabilities was added to CISA&amp;rsquo;s Known Exploited Vulnerability catalog on 22-Feb-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the ConnectWise security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1hnm9qht70"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1708&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;Improper Limitation of a Pathname to a Restricted Directory (&amp;#39;Path Traversal&amp;#39;)&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1709"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1709&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;ConnectWise ScreenConnect Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht71"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8&lt;/a&gt;&lt;a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht72"&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Feb 26, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>DRAFT KB-2294 Information about the ConnectWise ScreenConnect security advisory (CVE-2024-1708 &amp; CVE-2024-1709)</title><link>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709/revision/1</link><pubDate>Tue, 27 Feb 2024 22:09:54 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:8c523ceb-280b-4aa6-b2ee-96a42d98d950</guid><dc:creator>Kevin Kleinegger</dc:creator><comments>https://community.appian.com/support/w/kb/3499/kb-2295-information-about-the-connectwise-screenconnect-security-advisory-cve-2024-1708-cve-2024-1709#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Kevin Kleinegger on 2/27/2024 10:09:54 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 19-Feb-2024, ConnectWise released a security advisory for all organizations using their ScreenConnect software on-premises offering for versions 23.9.7 and prior for a remote code execution vulnerability. Additionally, one of the described vulnerabilities was added to CISA&amp;rsquo;s Known Exploited Vulnerability catalog on 22-Feb-2024.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by the vulnerabilities described in the ConnectWise security advisory. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1hnm9qht70"&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1708&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;Improper Limitation of a Pathname to a Restricted Directory (&amp;#39;Path Traversal&amp;#39;)&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1709"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-1709&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; (&amp;ldquo;ConnectWise ScreenConnect Authentication Bypass Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht71"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8&lt;/a&gt;&lt;a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hnm9qht72"&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Feb 26, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>