<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2370 Information about the Cisco Adaptive Security Appliance vulnerability (CVE-2026-20127 and CVE-2022-20775)</title><link>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2370 Information about the Cisco Adaptive Security Appliance vulnerability (CVE-2026-20127 and CVE-2022-20775)</title><link>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775</link><pubDate>Wed, 04 Mar 2026 20:17:48 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5e3b4ae7-d770-4145-9e83-1df59060206b</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775#comments</comments><description>Current Revision posted to Appian Knowledge Base by pauline.delacruz on 3/4/2026 8:17:48 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 28 September 2022, Cisco released a &lt;/span&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; regarding a vulnerability within their software-defined wide-area-networking (SD-WAN) product causing potential privilege escalation. On 25 February 2026, Cisco updated their advisory, stating that they had witnessed attempted exploitation of the previous vulnerabilities, and on the same day, CISA released an &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"&gt;&lt;span style="font-weight:400;"&gt;Emergency Directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; requiring all federal agencies and contractors to identify and mitigate the vulnerabilities identified in the advisory.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated these vulnerabilities and services and determined that it is not impacted, as we do not use Cisco SD-WAN. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-20127"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-20127&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2022-20775"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-20775&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco SD-WAN Software Privilege Escalation Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"&gt;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;March 3, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2370 Information about the Cisco Adaptive Security Appliance vulnerability (CVE-2026-20127 and CVE-2022-20775)</title><link>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775/revision/3</link><pubDate>Wed, 04 Mar 2026 20:17:29 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5e3b4ae7-d770-4145-9e83-1df59060206b</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775#comments</comments><description>Revision 3 posted to Appian Knowledge Base by pauline.delacruz on 3/4/2026 8:17:29 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 28 September 2022, Cisco released a &lt;/span&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; regarding a vulnerability within their software-defined wide-area-networking (SD-WAN) product causing potential privilege escalation. On 25 February 2026, Cisco updated their advisory, stating that they had witnessed attempted exploitation of the previous vulnerabilities, and on the same day, CISA released an &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"&gt;&lt;span style="font-weight:400;"&gt;Emergency Directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; requiring all federal agencies and contractors to identify and mitigate the vulnerabilities identified in the advisory.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated these vulnerabilities and services and determined that it is not impacted, as we do not use Cisco SD-WAN. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-20127"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-20127&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2022-20775"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-20775&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco SD-WAN Software Privilege Escalation Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"&gt;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Mar 3, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-2370 Information about the Cisco Adaptive Security Appliance vulnerability (CVE-2026-20127 and CVE-2022-20775)</title><link>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775/revision/2</link><pubDate>Wed, 04 Mar 2026 20:17:21 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5e3b4ae7-d770-4145-9e83-1df59060206b</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775#comments</comments><description>Revision 2 posted to Appian Knowledge Base by pauline.delacruz on 3/4/2026 8:17:21 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 28 September 2022, Cisco released a &lt;/span&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; regarding a vulnerability within their software-defined wide-area-networking (SD-WAN) product causing potential privilege escalation. On 25 February 2026, Cisco updated their advisory, stating that they had witnessed attempted exploitation of the previous vulnerabilities, and on the same day, CISA released an &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"&gt;&lt;span style="font-weight:400;"&gt;Emergency Directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; requiring all federal agencies and contractors to identify and mitigate the vulnerabilities identified in the advisory.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated these vulnerabilities and services and determined that it is not impacted, as we do not use Cisco SD-WAN. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-20127"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-20127&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2022-20775"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-20775&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco SD-WAN Software Privilege Escalation Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Mar 3, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-2369 Information about the Cisco Adaptive Security Appliance vulnerability (CVE-2026-20127 and CVE-2022-20775)</title><link>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775/revision/1</link><pubDate>Wed, 04 Mar 2026 20:16:59 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5e3b4ae7-d770-4145-9e83-1df59060206b</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3779/kb-2370-information-about-the-cisco-adaptive-security-appliance-vulnerability-cve-2026-20127-and-cve-2022-20775#comments</comments><description>Revision 1 posted to Appian Knowledge Base by pauline.delacruz on 3/4/2026 8:16:59 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 28 September 2022, Cisco released a &lt;/span&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; regarding a vulnerability within their software-defined wide-area-networking (SD-WAN) product causing potential privilege escalation. On 25 February 2026, Cisco updated their advisory, stating that they had witnessed attempted exploitation of the previous vulnerabilities, and on the same day, CISA released an &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"&gt;&lt;span style="font-weight:400;"&gt;Emergency Directive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; requiring all federal agencies and contractors to identify and mitigate the vulnerabilities identified in the advisory.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian has investigated these vulnerabilities and services and determined that it is not impacted, as we do not use Cisco SD-WAN. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVEs were released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-20127"&gt;&lt;span style="font-weight:400;"&gt;CVE-2026-20127&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2022-20775"&gt;&lt;span style="font-weight:400;"&gt;CVE-2022-20775&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; - (Cisco SD-WAN Software Privilege Escalation Vulnerability)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Supporting Documentation&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a id="" href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html"&gt;https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sd-wan-priv-E6e8tEdF.html&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;Mar 3, 2026&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>