{"id":2006792,"date":"2024-03-21T09:08:16","date_gmt":"2024-03-21T16:08:16","guid":{"rendered":"https:\/\/www.esri.com\/arcgis-blog\/?post_type=blog&#038;p=2006792"},"modified":"2024-05-13T13:35:26","modified_gmt":"2024-05-13T20:35:26","slug":"portal-for-arcgis-enterprise-sites-security-patch-is-now-available","status":"publish","type":"blog","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available","title":{"rendered":"Portal for ArcGIS Enterprise Sites 2023 Security Patch update"},"author":136891,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":""},"categories":[37501],"tags":[24081,759222,24071,241722],"industry":[],"product":[763582],"class_list":["post-2006792","blog","type-blog","status-publish","format-standard","hentry","category-administration","tag-ssamymlgp","tag-cve","tag-security","tag-ssamlymlgp","product-trust-arcgis"],"acf":{"authors":[{"ID":136891,"user_firstname":"Mark","user_lastname":"Bierman","nickname":"Mark Bierman","user_nicename":"mbierman","display_name":"Mark Bierman","user_email":"MBierman@esri.com","user_url":"","user_registered":"2020-12-08 21:10:04","user_description":"","user_avatar":"<img data-del=\"avatar\" src='https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/06\/softwaresecurity-213x200.png' class='avatar pp-user-avatar avatar-96 photo ' height='96' width='96'\/>"},{"ID":5311,"user_firstname":"Randall","user_lastname":"Williams","nickname":"Randall Williams","user_nicename":"randallwilliams","display_name":"Randall Williams","user_email":"randall_williams@esri.com","user_url":"https:\/\/trust.arcgis.com","user_registered":"2018-03-02 00:17:03","user_description":"","user_avatar":"<img data-del=\"avatar\" src='https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/08\/softwaresecurity.png' class='avatar pp-user-avatar avatar-96 photo ' height='96' width='96'\/>"},{"ID":3911,"user_firstname":"Michael","user_lastname":"Young","nickname":"Michael Young","user_nicename":"myoung1000","display_name":"Michael Young","user_email":"myoung@esri.com","user_url":"http:\/\/trust.arcgis.com","user_registered":"2018-03-02 00:15:29","user_description":"","user_avatar":"<img data-del=\"avatar\" src='https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2021\/12\/SSP-213x200.jpg' class='avatar pp-user-avatar avatar-96 photo ' height='96' width='96'\/>"}],"short_description":"An update regarding the ArcGIS Enterprise Sites Security Patch re-release.","flexible_content":[{"acf_fc_layout":"content","content":"<p><strong>Updated Portal for ArcGIS Enterprise Sites 2023 Security Patch and ArcGIS Validation and Repair tools released for versions 10.8.1, 10.9.1, and 11.1.<\/strong><\/p>\n<p>The release for version 10.8.1 concludes efforts to respond to the defective Portal for ArcGIS Enterprise Sites Security Patch.<\/p>\n<p><strong>March 21, 2024:\u00a0<\/strong>A new setup for the ArcGIS Enterprise 10.8.1 Windows version of the Portal for ArcGIS Enterprise Sites Security Patch is now available. This new setup addresses an issue related to a defective patch installation on Windows, as described in BUG-000161711. Before installing this new patch, first run the\u00a0<a href=\"https:\/\/support.esri.com\/content\/support\/en-us\/patches-updates\/2023\/portal-for-arcgis-validation-and-repair.html\">Portal for ArcGIS Validation and Repair<\/a>\u00a0tool. The tool will validate your ArcGIS Enterprise deployment and determine if the defective patch is installed. If the defective patch is detected, you will be directed to use the tool to repair your deployment before you can install Portal for ArcGIS patches released as of December 2023.<\/p>\n<p>The new setup, which replaces the defective patch, is named Portal for ArcGIS Enterprise Sites Security Patch. Note that the patch, when shown as available in the ArcGIS Enterprise Patch Notification tool, is listed as Portal for ArcGIS Enterprise Sites Security Patch (without the B suffix) with a release date of March 21, 2024; once installed, it is listed as Portal for ArcGIS Enterprise Sites Security Patch B.<\/p>\n<p>More details about the defective patch installation are available from this\u00a0<a href=\"https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/defective-arcgis-enterprise-patch\">Technical Support resource<\/a>.<\/p>\n<p><strong>Patch history:\u00a0<\/strong>Previous updates regarding this patch can be read in detail below the list of issues addressed with the patch.<strong>\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<table>\n<thead>\n<tr>\n<td><strong>\u00a0<\/strong><\/td>\n<td><strong>Windows<\/strong><\/td>\n<td><strong>Linux<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>11.1<\/td>\n<td>Available as of Dec 12, 2023. \u00a0 Portal for ArcGIS 11.1 Enterprise Sites Security Patch C<\/td>\n<td>Available as of Dec 12, 2023. Portal for ArcGIS 11.1 Enterprise Sites Security Patch C<\/td>\n<\/tr>\n<tr>\n<td>10.9.1<\/td>\n<td>Available as of February 12, 2024. Portal for ArcGIS 10.9.1 Enterprise Sites Security Patch B<\/td>\n<td>Available as of Dec 12, 2023. Portal for ArcGIS 10.9.1 Enterprise Sites Security Patch B<\/td>\n<\/tr>\n<tr>\n<td>10.8.1<\/td>\n<td>Available as of March 21, 2024. Portal for ArcGIS 10.8.1 Enterprise Sites Security Patch B<\/td>\n<td>Available as of Dec 12, 2023. Portal for ArcGIS 10.8.1 Enterprise Sites Security Patch B<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>The Portal for ArcGIS 10.8.1 Validation and Repair tool is also live on the support site. The URL is:<\/p>\n<p><a href=\"https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/portal-for-arcgis-validation-and-repair\">https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/portal-for-arcgis-validation-and-repair<\/a><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Esri announces the Portal for ArcGIS Validation and Repair tool. The Portal for ArcGIS Validation and Repair tool must be run on all 11.1, 10.9.1 and 10.8.1 machines with Portal for ArcGIS installed.\u00a0The Portal for ArcGIS Validation and Repair tool is specifically for deployments on Windows.<\/p>\n<p>The tool will validate your deployment and determine if the defective Portal for ArcGIS Enterprise Sites Security Patch is installed. If the defective patch is detected, you will be directed to use the tool to repair the deployment. The repair will remove the defective patch and all other Portal for ArcGIS patches on the deployment.\u00a0After completing the repair, Portal for ArcGIS patches will need to be reapplied either through the ArcGIS Enterprise Patch Notification tool or by downloading patches available from Esri.<\/p>\n<p>Esri recommends scheduling the repair, as well as the reinstallation of patches, during a planned maintenance timeframe. This is because the Enterprise portal will be inaccessible while the repair and patch reinstallation take place, which can be for several hours. The time needed for repair depends on the number of patches installed as well as hardware and machine resources. Note that repair time will be significantly longer for Portal for ArcGIS Enterprise 10.8.1 deployments than other versions. The Portal for ArcGIS Validation and Repair tool reports a progress status as each patch is removed. If the tool must be terminated during the repair, it is possible to re-run the tool and resume the repair, but only after the machine has been restarted. The tool creates a log file and details on how to use the log are found in the Additional details section.<\/p>\n<p>All Portal for ArcGIS patches released as of December 2023 will have a prerequisite requiring that the Portal for ArcGIS Validation and Repair tool is run successfully. Only following the successful validation of a deployment will it be possible to install new Portal for ArcGIS patches. Therefore, you will need to run the Portal for ArcGIS Validation and Repair tool prior to installing any Portal for ArcGIS patches released as of December 2023.<\/p>\n<p>The Portal for ArcGIS Validation and Repair tool is available for download from the table below or from the ArcGIS Enterprise Patch Notification Tool that is installed with your deployment.<\/p>\n<p><strong>March 21, 2024:\u00a0<\/strong>Portal for ArcGIS Validation and Repair tool is now available for version 10.8.1. Refer to this\u00a0<a href=\"https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/defective-arcgis-enterprise-patch\">Technical Support<\/a>\u00a0page for information about these bugs and Esri&#8217;s planned response.<\/p>\n<p><strong>March 21, 2024:<\/strong> A new setup is now available for the Portal for ArcGIS 10.9.1 Validation and Repair tool. This new version of the tool includes resolutions for a possible upgrade failure and issues running the tool with no available disk space. This version also enhances tool resiliency when it is terminated during a repair and provides more informative logging. There is no need to run this new tool if you already used the previous version of the tool to successfully validate your Enterprise portal.<\/p>\n<p>The new setup replaces the previous Portal for ArcGIS 10.9.1 Validation and Repair tool. When shown as available in the ArcGIS Enterprise Patch Notification tool, it is listed as Portal for ArcGIS 10.9.1 Validation and Repair (without the B suffix) with a release date of March 21, 2024; once installed, it is listed as Portal for ArcGIS Validation and Repair B. Note that the B version of the tool will run overtop of the previous version; there is no need to uninstall the previous version prior to running the new setup.<\/p>\n<p><strong>February 12, 2024<\/strong>: Portal for ArcGIS Validation and Repair tool is now available for version 10.9.1. Refer to this\u00a0<a href=\"https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/defective-arcgis-enterprise-patch\">Technical Support<\/a>\u00a0page for information about these bugs and Esri&#8217;s planned response.<\/p>\n<p><strong>December 12, 2023<\/strong>: Portal for ArcGIS Validation and Repair tool is currently only available for version 11.1 Refer to this\u00a0<a href=\"https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/defective-arcgis-enterprise-patch\">Technical Support<\/a>\u00a0page for information about these bugs and Esri&#8217;s planned response.<\/p>\n<p>********************************<\/p>\n<p><strong>January 29, 2024: <\/strong>A defect has been identified in the Portal for ArcGIS Enterprise Sites Security Patch for 10.8.1, 10.9.1, and 11.1. This patch was initially released in late June 2023 and has been disabled for download as of October 12, 2023 while this defect is investigated.<\/p>\n<p>The defect <a href=\"https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/defective-arcgis-enterprise-patch\">is described here<\/a>.<\/p>\n<p>The 11.1 version of this patch has been rereleased. Patches for previous versions are forthcoming. We have updated this advisory to provide guidance for those users who have not yet installed any version of the Portal for ArcGIS Enterprise Sites Security Patch and require interim mitigations to address the vulnerabilities fixed by those patches.<\/p>\n<p>**********************************<\/p>\n<p><b>Important note December 12, 2023:<\/b> A new setup for the ArcGIS Enterprise 11.1 Windows version of the Portal for ArcGIS Enterprise Sites Security Patch is now available<a href=\"https:\/\/support.esri.com\/en-us\/patches-updates\/2023\/portal-for-arcgis-enterprise-sites-security-patch\"> here<\/a>. This new setup addresses an issue related to a defective patch installation on Windows, as described in BUG-000163367. Before installing this new patch, first run the\u00a0<a href=\"https:\/\/support.esri.com\/content\/support\/en-us\/patches-updates\/2023\/portal-for-arcgis-validation-and-repair.html\" data-component-name=\"Core Text\" data-component-link=\"Portal for ArcGIS Validation and Repair\" data-component-link-type=\"internal\" data-event=\"track-component\" data-component-link-placement=\"2\">Portal for ArcGIS Validation and Repair<\/a>\u00a0tool. The tool will validate your ArcGIS Enterprise deployment and determine if any defective patches are installed. If defective patches are detected, you will be directed to use the tool to repair your deployment before you can install Portal for ArcGIS patches released as of December 2023. Windows 10.9.1 and 10.8.1 versions of this patch will be released at a future date.<\/p>\n<p>Linux is not impacted by BUG-000163367, BUG-000160895, and BUG-000161711, therefore all versions of the Linux patch are now available (11.1, 10.9.1 and 10.8.1) and do not require the Portal for ArcGIS Validation and Repair tool to be run.<\/p>\n<p>Customers working with versions prior to ArcGIS 11.1 who cannot patch at this time may mitigate all security issues addressed by the Portal for ArcGIS Enterprise Sites Security Patch.<\/p>\n<p><strong>Mitigation Options include:<\/strong><\/p>\n<p>Option 1: Upgrade your deployment to ArcGIS Enterprise 11.2\u00a0to completely remediate these vulnerabilities.<\/p>\n<ul>\n<li><strong>IMPORTANT NOTE<\/strong>: This option is ONLY VALID <strong>if you have not yet<\/strong> installed the problematic ArcGIS Enterprise Sites Security Patch.<\/li>\n<li>If you HAVE installed the problematic ArcGIS Enterprise Sites Security Patch, option 2 remains viable.<\/li>\n<li>Do not attempt to upgrade without first running the <a href=\"https:\/\/support.esri.com\/content\/support\/en-us\/patches-updates\/2023\/portal-for-arcgis-validation-and-repair.html\" data-component-name=\"Core Text\" data-component-link=\"Portal for ArcGIS Validation and Repair\" data-component-link-type=\"internal\" data-event=\"track-component\" data-component-link-placement=\"2\">Portal for ArcGIS Validation and Repair<\/a> tool on any version of ArcGIS Enterprise.<\/li>\n<\/ul>\n<p>Option 2: Remove members from ArcGIS Enterprise Sites <a href=\"https:\/\/enterprise.arcgis.com\/en\/sites\/latest\/team\/how-teams-work.htm\">Core Team groups<\/a>.<\/p>\n<p>In either case, ArcGIS Enterprise sites will remain accessible.<\/p>\n<p><b>Important note October 12, 2023:<\/b>\u00a0The download of this patch has been temporarily disabled while a problem with the install of this patch is investigated. Specific to the 11.1 version of this patch, installing the Portal for ArcGIS Enterprise Sites Security Patch into version 11.1 highly available Portal for ArcGIS environments will result in failures because a user configured file is not properly restored. An uninstall of the Portal for ArcGIS 11.1 Enterprise Sites Security Patch does not resolve the failures. A corrected version of this patch will be available soon. For those who have already installed this patch and encountered failures in a highly available environment, please refer to this\u00a0<a href=\"https:\/\/support.esri.com\/en-us\/knowledge-base\/bug-installing-the-11-1-version-of-the-portal-for-arcgi-000031314\" data-component-name=\"Core Text\" data-component-link=\"Esri Technical Article\" data-component-link-type=\"\" data-event=\"track-component\" data-component-link-placement=\"1\">Esri Technical Article<\/a>\u00a0for help.<\/p>\n<p><strong>Original Text: <\/strong>This patch contains fixes for one high security issue and multiple medium priority security issues. Esri highly recommends customers using Portal for ArcGIS 11.1 through 10.8.1 to install this patch. Users at version 10.7.1 should upgrade to 10.9.1 or 11.1 and install this patch. ArcGIS 10.7.1 is in mature support status and no longer receives patches. Users working with ArcGIS Enterprise 10.7.1 and below are encouraged to upgrade to versions 11.1 (preferred), 10.9.1 or 10.8.1 and install available security patches.<\/p>\n<p>This patch was originally released on June 28, 2023.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n"},{"acf_fc_layout":"sidebar","content":"<h3><strong>Key highlights<\/strong><\/h3>\n<ul>\n<li>Esri has released Security Patches for ArcGIS Enterprise Portal Sites.<\/li>\n<li>These patches should be applied to each Portal for ArcGIS machine (Windows or Linux) that participate in an ArcGIS Enterprise Site.<\/li>\n<li>Users and System administrators:\u00a0 Take the time to install these patches at your earliest opportunity to address these vulnerabilities.<\/li>\n<li>Mitigations for these issues exist and are provided in this advisory.<\/li>\n<li>Updated patched for Windows are bring released to address<\/li>\n<\/ul>\n","image_reference":false,"layout":"standard","image_reference_figure":"","snippet":"","spotlight_name":"","section_title":"","position":"Right","spotlight_image":false},{"acf_fc_layout":"content","content":"<p>We provide\u00a0Common Vulnerability Scoring System v.3.1 (CVSS)\u00a0scores to allow our customers to better assess risk of these vulnerabilities to their operations.\u00a0 Both base and modified temporal scores are provided to reflect the availability of an official patch.<\/p>\n<p>&nbsp;<\/p>\n<p>Vulnerabilities fixed by this patch<\/p>\n<p>&nbsp;<\/p>\n<p>There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 &#8211; 11.1 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser.\u00a0 The privileges required to execute this attack are high.\u00a0 The impact to Confidentiality, Integrity and Availability are High.<\/p>\n<p>&nbsp;<\/p>\n<p>CVE Details: CVE-2023-25835<\/p>\n<p>&nbsp;<\/p>\n<p>CWE-79 Improper Neutralization of Input During Web Page Generation (&#8216;Cross-site Scripting&#8217;)<\/p>\n<p>CVSSv3.1 Base Score:\u00a08.4 (High) CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:C\/C:H\/I:H\/A:H<\/p>\n<p>CVSSv3.1 Environmentally Modified Score: 8.0 (High) CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:C\/C:H\/I:H\/A:H\/RL:O<\/p>\n<p>This issue affects ArcGIS Enterprise Sites: from 10.8.1 through 11.1.<\/p>\n<p>&nbsp;<\/p>\n<p>ESRI Bug ID:\u00a0 [BUG-000153659 &#8211; A stored Cross Site Scripting (XSS) vulnerability in ArcGIS Enterprise Sites.]<\/p>\n<p>&nbsp;<\/p>\n<p>There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 &#8211; 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser.\u00a0 The privileges required to execute this attack are low.<\/p>\n<p>&nbsp;<\/p>\n<p>CVE Details: CVE-2023-25837<\/p>\n<p>&nbsp;<\/p>\n<p>CWE-79 Improper Neutralization of Input During Web Page Generation (&#8216;Cross-site Scripting&#8217;)<\/p>\n<p>CVSSv3.1 Base Score: 8.4 (High) CVSS:3.1\/AV:N\/AC:L\/PR:H\/UI:R\/S:C\/C:H\/I:H\/A:H<\/p>\n<p>CVSSv3.1 Environmentally Modified Score: 6.5 (Medium) CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p>This issue affects Portal sites: from 10.8.1 through 10.9.<\/p>\n<p>&nbsp;<\/p>\n<p>ESRI Bug ID: [BUG-000133088 &#8211; XSS in ArcGIS Enterprise sites.]CVE Details: CVE-2023-25836<\/p>\n<p>&nbsp;<\/p>\n<p>CWE-79 Improper Neutralization of Input During Web Page Generation (&#8216;Cross-site Scripting&#8217;)<\/p>\n<p>CVSSv3.1 Base Score: 5.4 (Medium) CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p>CVSSv3.1 Environmentally Modified Score: 5.2 (Medium) CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p>This issue affects Portal sites: from 10.8.1 through 10.9.<\/p>\n<p>&nbsp;<\/p>\n<p>ESRI Bug ID: [BUG-000135364 -There is a cross-site scripting (XSS) vulnerability in ArcGIS Enterprise Sites.]<\/p>\n<p>&nbsp;<\/p>\n<p>There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 &#8211; 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser.\u00a0 The privileges required to execute this attack are high.\u00a0 The impact to Confidentiality, Integrity and Availability are High.<\/p>\n"}],"related_articles":"","card_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2021\/07\/SA-Portal.gif","wide_image":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Portal for ArcGIS Enterprise Sites 2023 Security Patch update<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Portal for ArcGIS Enterprise Sites 2023 Security Patch update\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available\" \/>\n<meta property=\"og:site_name\" content=\"ArcGIS Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/esrigis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-13T20:35:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ESRI\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available\"},\"author\":{\"name\":\"Mark Bierman\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/928a9a9a1a21dc0cf370b54b135e73ed\"},\"headline\":\"Portal for ArcGIS Enterprise Sites 2023 Security Patch update\",\"datePublished\":\"2024-03-21T16:08:16+00:00\",\"dateModified\":\"2024-05-13T20:35:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"keywords\":[\"ArcGIS Trust Center\",\"CVE\",\"Security\",\"SSAMLYMLGP\"],\"articleSection\":[\"Administration\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available\",\"name\":\"Portal for ArcGIS Enterprise Sites 2023 Security Patch update\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\"},\"datePublished\":\"2024-03-21T16:08:16+00:00\",\"dateModified\":\"2024-05-13T20:35:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esri.com\/arcgis-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portal for ArcGIS Enterprise Sites 2023 Security Patch update\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"name\":\"ArcGIS Blog\",\"description\":\"Get insider info from Esri product teams\",\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\",\"name\":\"Esri\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"width\":400,\"height\":400,\"caption\":\"Esri\"},\"image\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/esrigis\/\",\"https:\/\/x.com\/ESRI\",\"https:\/\/www.linkedin.com\/company\/5311\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/928a9a9a1a21dc0cf370b54b135e73ed\",\"name\":\"Mark Bierman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/06\/softwaresecurity-213x200.png\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/06\/softwaresecurity-213x200.png\",\"caption\":\"Mark Bierman\"},\"url\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Portal for ArcGIS Enterprise Sites 2023 Security Patch update","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available","og_locale":"en_US","og_type":"article","og_title":"Portal for ArcGIS Enterprise Sites 2023 Security Patch update","og_url":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available","og_site_name":"ArcGIS Blog","article_publisher":"https:\/\/www.facebook.com\/esrigis\/","article_modified_time":"2024-05-13T20:35:26+00:00","twitter_card":"summary_large_image","twitter_site":"@ESRI","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available#article","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available"},"author":{"name":"Mark Bierman","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/928a9a9a1a21dc0cf370b54b135e73ed"},"headline":"Portal for ArcGIS Enterprise Sites 2023 Security Patch update","datePublished":"2024-03-21T16:08:16+00:00","dateModified":"2024-05-13T20:35:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available"},"wordCount":8,"publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"keywords":["ArcGIS Trust Center","CVE","Security","SSAMLYMLGP"],"articleSection":["Administration"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available","url":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available","name":"Portal for ArcGIS Enterprise Sites 2023 Security Patch update","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#website"},"datePublished":"2024-03-21T16:08:16+00:00","dateModified":"2024-05-13T20:35:26+00:00","breadcrumb":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esri.com\/arcgis-blog\/"},{"@type":"ListItem","position":2,"name":"Portal for ArcGIS Enterprise Sites 2023 Security Patch update"}]},{"@type":"WebSite","@id":"https:\/\/www.esri.com\/arcgis-blog\/#website","url":"https:\/\/www.esri.com\/arcgis-blog\/","name":"ArcGIS Blog","description":"Get insider info from Esri product teams","publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization","name":"Esri","url":"https:\/\/www.esri.com\/arcgis-blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","width":400,"height":400,"caption":"Esri"},"image":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/esrigis\/","https:\/\/x.com\/ESRI","https:\/\/www.linkedin.com\/company\/5311\/"]},{"@type":"Person","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/928a9a9a1a21dc0cf370b54b135e73ed","name":"Mark Bierman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/06\/softwaresecurity-213x200.png","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2023\/06\/softwaresecurity-213x200.png","caption":"Mark Bierman"},"url":""}]}},"text_date":"March 21, 2024","author_name":"Multiple Authors","author_page":"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/portal-for-arcgis-enterprise-sites-security-patch-is-now-available","custom_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2025\/08\/Newsroom-Keyart-Wide-1920-x-1080.jpg","primary_product":"ArcGIS Trust Center","tag_data":[{"term_id":24081,"name":"ArcGIS Trust Center","slug":"ssamymlgp","term_group":0,"term_taxonomy_id":24081,"taxonomy":"post_tag","description":"","parent":0,"count":96,"filter":"raw"},{"term_id":759222,"name":"CVE","slug":"cve","term_group":0,"term_taxonomy_id":759222,"taxonomy":"post_tag","description":"","parent":0,"count":32,"filter":"raw"},{"term_id":24071,"name":"Security","slug":"security","term_group":0,"term_taxonomy_id":24071,"taxonomy":"post_tag","description":"","parent":0,"count":126,"filter":"raw"},{"term_id":241722,"name":"SSAMLYMLGP","slug":"ssamlymlgp","term_group":0,"term_taxonomy_id":241722,"taxonomy":"post_tag","description":"","parent":0,"count":25,"filter":"raw"}],"category_data":[{"term_id":37501,"name":"Administration","slug":"administration","term_group":0,"term_taxonomy_id":37501,"taxonomy":"category","description":"","parent":0,"count":427,"filter":"raw"}],"product_data":[{"term_id":763582,"name":"ArcGIS Trust Center","slug":"trust-arcgis","term_group":0,"term_taxonomy_id":763582,"taxonomy":"product","description":"Reserved for articles authored by the ArcGIS Trust Center team","parent":36981,"count":89,"filter":"raw"}],"primary_product_link":"https:\/\/www.esri.com\/arcgis-blog\/?s=#&products=trust-arcgis","_links":{"self":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2006792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/users\/136891"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/comments?post=2006792"}],"version-history":[{"count":0,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2006792\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/media?parent=2006792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/categories?post=2006792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/tags?post=2006792"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/industry?post=2006792"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/product?post=2006792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}