<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2327 Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2327 Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356</link><pubDate>Wed, 08 Jan 2025 18:43:09 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b9fd7f6-19d3-407f-95e0-6fd3367e3609</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356#comments</comments><description>Current Revision posted to Appian Knowledge Base by Ryan Good on 1/8/2025 6:43:09 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;On 08-Dec-2024, the U.S. Department of the Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to the Department&amp;rsquo;s systems by way of a compromised key. A flaw in BeyondTrust&amp;rsquo;s Remote Support product was later identified, with the accompanying CVE included in CISA&amp;rsquo;s Known &lt;a href="https://www.cisa.gov/news-events/alerts/2024/12/19/cisa-adds-one-known-exploited-vulnerability-catalog"&gt;Exploited Vulnerability Catalog&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian does not use any products by BeyondTrust and is not impacted by any related CVEs. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-12356&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.beyondtrust.com/trust-center/security-advisories/bt24-10"&gt;https://www.beyondtrust.com/trust-center/security-advisories/bt24-10&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html"&gt;https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-12356&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;January 3, 2025&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356/revision/6</link><pubDate>Mon, 06 Jan 2025 21:22:58 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b9fd7f6-19d3-407f-95e0-6fd3367e3609</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Ryan Good on 1/6/2025 9:22:58 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;On 08-Dec-2024, the U.S. Department of the Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to the Department&amp;rsquo;s systems by way of a compromised key. A flaw in BeyondTrust&amp;rsquo;s Remote Support product was later identified, with the accompanying CVE included in CISA&amp;rsquo;s Known &lt;a href="https://www.cisa.gov/news-events/alerts/2024/12/19/cisa-adds-one-known-exploited-vulnerability-catalog"&gt;Exploited Vulnerability Catalog&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian does not use any products by BeyondTrust and is not impacted by any related CVEs. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-12356&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.beyondtrust.com/trust-center/security-advisories/bt24-10"&gt;https://www.beyondtrust.com/trust-center/security-advisories/bt24-10&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html"&gt;https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-12356&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;January 3, 2025&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356/revision/5</link><pubDate>Mon, 06 Jan 2025 21:21:31 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b9fd7f6-19d3-407f-95e0-6fd3367e3609</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Ryan Good on 1/6/2025 9:21:31 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;On 08-Dec-2024, the U.S. Department of the Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to the Department&amp;rsquo;s systems by way of a compromised key. A flaw in BeyondTrust&amp;rsquo;s Remote Support product was later identified, with the accompanying CVE included in CISA&amp;rsquo;s Known &lt;a href="https://www.cisa.gov/news-events/alerts/2024/12/19/cisa-adds-one-known-exploited-vulnerability-catalog"&gt;Exploited Vulnerability Catalog&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian does not use any products by BeyondTrust and is not impacted by any related CVEs. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-12356&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.beyondtrust.com/trust-center/security-advisories/bt24-10"&gt;https://www.beyondtrust.com/trust-center/security-advisories/bt24-10&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html"&gt;https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-12356&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;January 3, 2025&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356/revision/4</link><pubDate>Mon, 06 Jan 2025 21:20:44 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b9fd7f6-19d3-407f-95e0-6fd3367e3609</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Ryan Good on 1/6/2025 9:20:44 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;On 08-Dec-2024, the U.S. Department of the Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to the Department&amp;rsquo;s systems by way of a compromised key. A flaw in BeyondTrust&amp;rsquo;s Remote Support product was later identified, with the accompanying CVE included in CISA&amp;rsquo;s Known &lt;a href="https://www.cisa.gov/news-events/alerts/2024/12/19/cisa-adds-one-known-exploited-vulnerability-catalog"&gt;Exploited Vulnerability Catalog&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian does not use any products by BeyondTrust and is not impacted by any related CVEs. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-12356&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.beyondtrust.com/trust-center/security-advisories/bt24-10"&gt;https://www.beyondtrust.com/trust-center/security-advisories/bt24-10&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html"&gt;https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-12356&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Jan 3, 2025&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356/revision/3</link><pubDate>Mon, 06 Jan 2025 21:17:53 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b9fd7f6-19d3-407f-95e0-6fd3367e3609</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Ryan Good on 1/6/2025 9:17:53 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;On 08-Dec-2024, the U.S. Department of the Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to the Department&amp;rsquo;s systems by way of a compromised key. A flaw in BeyondTrust&amp;rsquo;s Remote Support product was later identified, with the accompanying CVE included in CISA&amp;rsquo;s Known Exploited Vulnerability Catalog.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian does not use any products by BeyondTrust and is not impacted by any related CVEs. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-12356&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.beyondtrust.com/trust-center/security-advisories/bt24-10"&gt;https://www.beyondtrust.com/trust-center/security-advisories/bt24-10&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html"&gt;https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-12356&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Jan 3, 2025&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356/revision/2</link><pubDate>Mon, 06 Jan 2025 21:16:22 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b9fd7f6-19d3-407f-95e0-6fd3367e3609</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Ryan Good on 1/6/2025 9:16:22 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 08-Dec-2024, the U.S. Department of the Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to the Department&amp;rsquo;s systems by way of a compromised key. A flaw in BeyondTrust&amp;rsquo;s Remote Support product was later identified, with the accompanying CVE included in CISA&amp;rsquo;s Known Exploited Vulnerability Catalog.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian does not use any products by BeyondTrust and is not impacted by any related CVEs. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-12356&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.beyondtrust.com/trust-center/security-advisories/bt24-10"&gt;https://www.beyondtrust.com/trust-center/security-advisories/bt24-10&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html"&gt;https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-12356&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Jan 3, 2025&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)</title><link>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356/revision/1</link><pubDate>Mon, 06 Jan 2025 21:12:39 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:2b9fd7f6-19d3-407f-95e0-6fd3367e3609</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3615/kb-2327-information-about-the-beyondtrust-remote-support-vulnerability-cve-2024-12356#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Ryan Good on 1/6/2025 9:12:39 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;KB-XXXX Information about the BeyondTrust Remote Support Vulnerability (CVE-2024-12356)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 08-Dec-2024, the U.S. Department of the Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to the Department&amp;rsquo;s systems by way of a compromised key. A flaw in BeyondTrust&amp;rsquo;s Remote Support product was later identified, with the accompanying CVE included in CISA&amp;rsquo;s Known Exploited Vulnerability Catalog.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian does not use any products by BeyondTrust and is not impacted by any related CVEs. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-12356&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;https://www.beyondtrust.com/trust-center/security-advisories/bt24-10&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-12356&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Jan 3, 2025&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>