Vulnerabilites related to citrix - gateway
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7DF63BB-CCE6-4405-8E6D-6DF1BC975D3D", "versionEndExcluding": "10.2.7", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D1A5E7D-C3A7-48B8-BD6D-5973F8361DEC", "versionEndExcluding": "11.0.3d", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "0471F1F0-F804-47BA-98A1-7080E1C740E7", "versionEndExcluding": "11.1.1a", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download." }, { "lang": "es", "value": "Una inyecci\u00f3n de c\u00f3digo reflejado en Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18 y Citrix SDWAN WAN-OP versiones anteriores a 11.1.1a, 11.0.3d y 10.2.7, permite la modificaci\u00f3n de una descarga de archivo" } ], "id": "CVE-2020-8194", "lastModified": "2024-11-21T05:38:28.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-10T16:15:12.247", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C7337CF-B482-4272-8D5E-C6F18FC07E47", "versionEndExcluding": "12.1-65.35", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9853C6D-CA36-4018-80D9-4C196C1D6D56", "versionEndExcluding": "13.0-90.11", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A762510-82CB-4671-8D3C-A0C53E21FB9C", "versionEndExcluding": "13.1-45.61", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:fips:*:*:*", "matchCriteriaId": "EDEB8DA9-D2C2-40CA-8D37-B3878E41A596", "versionEndExcluding": "12.1-55.296", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "AD984EFC-389E-4660-A6AB-4FF4F1DB5D3C", "versionEndExcluding": "12.1-55.296", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:-:*:*:*", "matchCriteriaId": "196840B2-A87D-448C-8E9C-61C01188A8A7", "versionEndExcluding": "12.1-65.35", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BD72AC1-8939-41EE-81FD-F8612A36D539", "versionEndExcluding": "13.0-90.11", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5B13E9F-7572-428A-9E16-86146456A982", "versionEndExcluding": "13.1-45.61", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross site scripting vulnerability\u00a0in Citrix ADC and Citrix Gateway\u202f\u00a0in allows and attacker to perform cross site scripting" }, { "lang": "es", "value": "Los productos ADC y Gateway de Citrix son vulnerables a ataques de tipo Cross-Site Scripting (XSS)." } ], "id": "CVE-2023-24488", "lastModified": "2024-11-21T07:47:57.780", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "secure@citrix.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-10T21:15:10.707", "references": [ { "source": "secure@citrix.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | Exploit, Third Party Advisory, VDB Entry | |
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7DF63BB-CCE6-4405-8E6D-6DF1BC975D3D", "versionEndExcluding": "10.2.7", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D1A5E7D-C3A7-48B8-BD6D-5973F8361DEC", "versionEndExcluding": "11.0.3d", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "0471F1F0-F804-47BA-98A1-7080E1C740E7", "versionEndExcluding": "11.1.1a", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway_plug-in_for_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "25969217-EB50-466A-9F0F-5DEB1805B27D", "versionEndExcluding": "1.0.0.137", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18 y Citrix SDWAN WAN-OP versiones anteriores a 11.1.1a, 11.0.3d y 10.2.7, resulta en una divulgaci\u00f3n de informaci\u00f3n limitada para usuarios poco privilegiados" } ], "id": "CVE-2020-8195", "lastModified": "2025-02-07T13:15:30.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2020-07-10T16:15:12.327", "references": [ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" }, { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
citrix | application_delivery_controller | 12.1-64.16 | |
citrix | gateway | 12.1-64.16 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:12.1-64.16:*:*:*:*:*:*:*", "matchCriteriaId": "56E952DD-A388-4B8E-9F1C-77025A6FAA4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:12.1-64.16:*:*:*:*:*:*:*", "matchCriteriaId": "AF14B870-7BF9-46E0-85BD-0887C35FBF8F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthenticated denial of service" }, { "lang": "es", "value": "Denegaci\u00f3n de servicio no autenticada" } ], "id": "CVE-2022-27508", "lastModified": "2024-11-21T06:55:51.783", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-26T21:15:33.337", "references": [ { "source": "secure@citrix.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX297155 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX297155 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "871316FC-14DC-41BE-971B-61FBE11D5ABF", "versionEndExcluding": "12.1-61.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAA24333-CF47-45C2-81E3-C990095920D6", "versionEndExcluding": "13.0-76.29", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D77B2AD2-BAF1-4FD3-B7C5-88AC1B130971", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E178AA28-B24F-4565-A314-1E58AAC54648", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEBA65F-2FEA-45B2-9118-8781258BC28D", "versionEndExcluding": "12.1-61.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F78FBC6-84A1-4D99-8D70-BA5AF4B1F2BD", "versionEndExcluding": "13.0-76.29", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2E30C0C-32F2-4257-B946-600E3123A0D2", "versionEndExcluding": "10.2.9a", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "469E2490-71B8-48FB-A032-08922C75339A", "versionEndExcluding": "11.1.2c", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "56A52140-F4AE-4616-91E7-FF941EA26343", "versionEndExcluding": "11.2.3a", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "974341A5-6B06-4975-9406-CF41AB0E92F6", "versionEndExcluding": "11.3.2", "versionStartIncluding": "11.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance." }, { "lang": "es", "value": "Citrix ADC y Citrix/NetScaler Gateway versiones 13.0 anteriores a 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC versiones 12.1-FIPS anteriores a 12.1-55.238, y Citrix SD-WAN WANOP Edition versiones anteriores a 11.4.0, 11. 3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a, sufren un consumo no controlado de recursos mediante una denegaci\u00f3n de servicio basada en la red desde el mismo segmento de red de capa 2. Tome en cuenta que el atacante debe estar en el mismo segmento de red de capa 2 que el dispositivo vulnerable" } ], "id": "CVE-2020-8299", "lastModified": "2024-11-21T05:38:41.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-16T14:15:08.107", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:fips:*:*:*", "matchCriteriaId": "EDEB8DA9-D2C2-40CA-8D37-B3878E41A596", "versionEndExcluding": "12.1-55.296", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "AD984EFC-389E-4660-A6AB-4FF4F1DB5D3C", "versionEndExcluding": "12.1-55.296", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:-:*:*:*", "matchCriteriaId": "196840B2-A87D-448C-8E9C-61C01188A8A7", "versionEndExcluding": "12.1-65.35", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:-:*:*:*", "matchCriteriaId": "885DC06B-B95C-4D86-8702-2D54C38B467B", "versionEndExcluding": "13.0-90.11", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:fips:*:*:*", "matchCriteriaId": "523E9114-7624-4759-8F60-C1C5200BC438", "versionEndExcluding": "13.1-37.150", "versionStartIncluding": "13.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:-:*:*:*", "matchCriteriaId": "11CA79C0-C374-430E-B699-91D9BB7B728E", "versionEndExcluding": "13.1-45.61", "versionStartIncluding": "13.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C7337CF-B482-4272-8D5E-C6F18FC07E47", "versionEndExcluding": "12.1-65.35", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9853C6D-CA36-4018-80D9-4C196C1D6D56", "versionEndExcluding": "13.0-90.11", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A762510-82CB-4671-8D3C-A0C53E21FB9C", "versionEndExcluding": "13.1-45.61", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Arbitrary file read\u00a0in Citrix ADC and Citrix Gateway\u202f" } ], "id": "CVE-2023-24487", "lastModified": "2024-11-21T07:47:57.637", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "secure@citrix.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-10T21:15:10.650", "references": [ { "source": "secure@citrix.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-253" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX319135 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX319135 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92AEAC43-113D-456B-89C0-1872A67224AC", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC22F7-EA37-48D7-822D-B66EE2B25FE2", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1035921-397B-4E88-AF1A-DF581B75B4B2", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "4564E909-7F8E-40DF-B941-FFACC03B97B7", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB5357D6-4995-4966-8B63-11E636AD58BC", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE3B890B-5A0E-4B5A-A9E1-0C6DDF9524E6", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en Citrix ADC y Citrix Gateway versi\u00f3n 13.0-82.45, cuando es configurado el proveedor de servicios SAML que podr\u00eda permitir a un atacante secuestrar una sesi\u00f3n" } ], "id": "CVE-2021-22927", "lastModified": "2024-11-21T05:50:56.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-05T21:15:11.643", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "710A9915-E94D-4AB3-9077-904185CD835C", "versionEndExcluding": "12.1-65.21", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "21A12502-B9D9-4ED0-9E90-F27317338831", "versionEndExcluding": "13.0-88.12", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C237286-B459-4FF4-810A-13740D2207E3", "versionEndExcluding": "13.1-33.41", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "0DD814B7-CD70-4AAA-B8C5-AEF4DBD1055A", "versionEndExcluding": "12.1-65.21", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "51A18C6F-58A9-4924-AEBA-2AC1846055BA", "versionEndExcluding": "13.0-88.12", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "BBEEB7CC-13B3-49D9-9C1C-B31A8274943E", "versionEndExcluding": "13.1-33.47", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:fips:*:*:*", "matchCriteriaId": "9A9A7C22-9E06-45AF-8A7C-8BEB12FDDFE2", "versionEndExcluding": "12.1-55.289", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "78FC158E-7881-448B-A2BA-19CBC3BF646C", "versionEndExcluding": "12.1-55.289", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthorized access to Gateway user capabilities \n" }, { "lang": "es", "value": "Acceso no autorizado a las capacidades del usuario de Gateway" } ], "id": "CVE-2022-27510", "lastModified": "2024-11-21T06:55:52.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "secure@citrix.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-08T22:15:13.020", "references": [ { "source": "secure@citrix.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-288" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX330728 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX330728 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "609476CC-EB28-4FC2-8035-1C8A0F6F5573", "versionEndIncluding": "11.1-65.23", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C076C750-AC7C-48DD-86B2-EB69FA14467F", "versionEndExcluding": "12.1-63.22", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2F3ACE6-B0F6-4E27-9DD8-EFEC98A7ACB4", "versionEndExcluding": "13.0-83.27", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C7C2760-C923-4D70-B9BA-9905CBD7A72C", "versionEndExcluding": "11.1-65.23", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEC9E148-82D8-4032-9E30-3A40362FEF29", "versionEndExcluding": "12.1-63.22", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FA42F00-61CF-44DB-9C16-C3EDD3960548", "versionEndExcluding": "13.0-83.27", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A unauthenticated denial of service vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 when configured as a VPN (Gateway) or AAA virtual server could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de denegaci\u00f3n de servicio no autenticada en Citrix ADC versiones anteriores a 13.0-83.27, versiones anteriores a 12.1-63.22 y 11.1-65.23 que, cuando es configurado como servidor virtual VPN (Gateway) o AAA, podr\u00eda permitir a un atacante causar una interrupci\u00f3n temporal de la GUI de administraci\u00f3n, la API Nitro y la comunicaci\u00f3n RPC" } ], "id": "CVE-2021-22955", "lastModified": "2024-11-21T05:51:00.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-07T14:15:08.890", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX330728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX330728" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect file permissions in Citrix ADC and Citrix Gateway before versions 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows privilege escalation." }, { "lang": "es", "value": "Unos permisos de archivo incorrectos en Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18, permiten una escalada de privilegios" } ], "id": "CVE-2020-8190", "lastModified": "2024-11-21T05:38:28.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-10T16:15:12.013", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "710A9915-E94D-4AB3-9077-904185CD835C", "versionEndExcluding": "12.1-65.21", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "21A12502-B9D9-4ED0-9E90-F27317338831", "versionEndExcluding": "13.0-88.12", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C237286-B459-4FF4-810A-13740D2207E3", "versionEndExcluding": "13.1-33.41", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "0DD814B7-CD70-4AAA-B8C5-AEF4DBD1055A", "versionEndExcluding": "12.1-65.21", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "51A18C6F-58A9-4924-AEBA-2AC1846055BA", "versionEndExcluding": "13.0-88.12", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "BBEEB7CC-13B3-49D9-9C1C-B31A8274943E", "versionEndExcluding": "13.1-33.47", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:fips:*:*:*", "matchCriteriaId": "9A9A7C22-9E06-45AF-8A7C-8BEB12FDDFE2", "versionEndExcluding": "12.1-55.289", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "78FC158E-7881-448B-A2BA-19CBC3BF646C", "versionEndExcluding": "12.1-55.289", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Remote desktop takeover via phishing \n" }, { "lang": "es", "value": "Adquisici\u00f3n de escritorio remoto mediante phishing" } ], "id": "CVE-2022-27513", "lastModified": "2024-11-21T06:55:52.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 6.0, "source": "secure@citrix.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-08T22:15:13.313", "references": [ { "source": "secure@citrix.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E112D10-DA69-4574-A65A-7CD6426F598B", "versionEndExcluding": "12.1-64.17", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FFD486-A515-4B15-95D8-8D1D36D3011C", "versionEndExcluding": "13.0-85.19", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C3948D7-C0F8-4172-B57A-55D94AFB4EF3", "versionEndExcluding": "13.1-21.50", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:fips:*:*:*", "matchCriteriaId": "C0C9EA64-FDF6-4DA9-820B-F22F85701404", "versionEndExcluding": "12.1-55.278", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "E54AAEEA-4634-408C-8C95-92BE5D9F4D34", "versionEndExcluding": "12.1-55.278", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA72B1AC-24C8-4356-B0A1-A0D6A51F6EEA", "versionEndExcluding": "12.1-64.17", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C256B5-7FD8-47A5-A8EF-043360AB2C0E", "versionEndExcluding": "13.0-85.19", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2E6F02E-00E6-4200-81DA-E12AC67D635A", "versionEndExcluding": "13.1-21.50", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated denial of service" }, { "lang": "es", "value": "Denegaci\u00f3n de servicio autenticada" } ], "id": "CVE-2022-27507", "lastModified": "2024-11-21T06:55:51.663", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-26T21:15:33.080", "references": [ { "source": "secure@citrix.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
secure@citrix.com | https://support.citrix.com/article/CTX474995 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX474995 | Vendor Advisory |
{ "cisaActionDue": "2023-01-03", "cisaExploitAdd": "2022-12-13", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Citrix Application Delivery Controller (ADC) and Gateway Authentication Bypass Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:fips:*:*:*", "matchCriteriaId": "59CA6CB8-1B2C-4265-82ED-802D4D387EAD", "versionEndExcluding": "12.1-55.291", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "0FB77A6C-768D-4084-924B-5F0607FE6D83", "versionEndExcluding": "12.1-55.291", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D0B760B-B3B6-442A-8C54-AA8A6D63660B", "versionEndExcluding": "12.1-65.25", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EBF9BE3-E779-4621-8409-1A61DA07F6FF", "versionEndExcluding": "13.0-58.32", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB4301CB-EBF3-41D7-8A17-7E0B9E452780", "versionEndExcluding": "12.1-65.25", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD9F0308-2BD3-403F-B90E-EEB1B6845627", "versionEndExcluding": "13.0-58.32", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthenticated remote arbitrary code execution\n" }, { "lang": "es", "value": "Ejecuci\u00f3n remota de c\u00f3digo arbitrario no autenticado" } ], "id": "CVE-2022-27518", "lastModified": "2025-02-14T16:45:23.363", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "secure@citrix.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-13T17:15:14.350", "references": [ { "source": "secure@citrix.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX474995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX474995" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-664" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability on Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows a low privileged user with management access to execute arbitrary commands." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios en Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18, permite a un usuario poco privilegiado con acceso de administraci\u00f3n ejecutar comandos arbitrarios" } ], "id": "CVE-2020-8197", "lastModified": "2024-11-21T05:38:29.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-10T16:15:12.483", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX281474 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX281474 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A238E-72C4-4D74-B902-2EE8E602AAC1", "versionEndExcluding": "11.1-65.12", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C991579-B6B8-4F07-9AF9-739452F1F5AA", "versionEndExcluding": "12.1-58.15", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED09F4AE-DCC6-4C7D-BFA1-D22E16893C97", "versionEndExcluding": "13.0-64.35", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F98105E-37A4-46F4-BA82-A8E95372A370", "versionEndExcluding": "11.1-65.12", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "178C6CA9-0068-4225-A209-E13A880ED188", "versionEndExcluding": "13.0-64.35", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFAC08D1-1FE8-4910-9D50-F167537C7C91", "versionEndExcluding": "12.1-58.15", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b leads to an HTML Injection attack against the SSL VPN web portal." }, { "lang": "es", "value": "Una Comprobaci\u00f3n de Entrada inapropiada en Citrix ADC y Citrix Gateway versiones 13.0 anteriores a 13.0-64.35, Citrix ADC y NetScaler Gateway versiones 12.1 anteriores a 12.1-58.15, Citrix ADC versiones 12.1-FIPS anteriores a 12.1-55.187, Citrix ADC y NetScaler Gateway versi\u00f3n 12.0, Citrix ADC y NetScaler Gateway 11.1 antes 11.1-65.12, Citrix SD-WAN WANOP versiones 11.2 anteriores a 11.2.1a, Citrix SD-WAN WANOP versiones 11.1 anteriores a 11.1.2a, Citrix SD-WAN WANOP versiones 11.0 anteriores a 11.0.3f, Citrix SD-WAN WANOP versiones 10.2 anteriores a 10.2.7b, conlleva a un ataque de Inyecci\u00f3n HTML contra el portal web SSL VPN" } ], "id": "CVE-2020-8245", "lastModified": "2024-11-21T05:38:34.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-18T21:15:13.170", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX281474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX281474" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
citrix | application_delivery_controller_firmware | * | |
citrix | application_delivery_controller | - | |
citrix | gateway | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB78C7DE-C985-44CC-9917-7B7B40104D50", "versionEndExcluding": "13.0-58.30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF4ABEE-D1F0-408C-A80D-C204D0C164EF", "versionEndExcluding": "13.0-58.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In certain Citrix products, information disclosure can be achieved by an authenticated VPN user when there is a configured SSL VPN endpoint. This affects Citrix ADC and Citrix Gateway 13.0-58.30 and later releases before the CTX276688 update." }, { "lang": "es", "value": "En ciertos productos Citrix, un usuario de VPN autenticado puede lograr la divulgaci\u00f3n de informaci\u00f3n cuando hay un endpoint de VPN SSL configurado. Esto afecta a Citrix ADC y Citrix Gateway 13.0-58.30 y versiones posteriores antes de la actualizaci\u00f3n CTX276688." } ], "id": "CVE-2019-18177", "lastModified": "2024-11-21T04:32:46.273", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-26T21:15:10.380", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-appliance-security-update" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-appliance-security-update" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | Exploit, Third Party Advisory, VDB Entry | |
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Authorization Bypass Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7DF63BB-CCE6-4405-8E6D-6DF1BC975D3D", "versionEndExcluding": "10.2.7", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D1A5E7D-C3A7-48B8-BD6D-5973F8361DEC", "versionEndExcluding": "11.0.3d", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "0471F1F0-F804-47BA-98A1-7080E1C740E7", "versionEndExcluding": "11.1.1a", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints." }, { "lang": "es", "value": "Un control de acceso inapropiado en Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18 y Citrix SDWAN WAN-OP versiones anteriores a 11.1.1a, 11.0.3d y 10.2.7, permite un acceso no autenticado a determinados endpoints de URL" } ], "id": "CVE-2020-8193", "lastModified": "2025-02-07T13:15:30.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2020-07-10T16:15:12.157", "references": [ { "source": "support@hackerone.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" }, { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secure@citrix.com | https://support.citrix.com/article/CTX457836 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX457836 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "61981F03-ECC8-43E0-80E6-0A689F3D783F", "versionEndExcluding": "12.1-65.15", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2D911A3-F43F-448D-B861-CE1CA3DF2504", "versionEndExcluding": "13.0-86.17", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFE32178-CFBE-4F01-BB47-80C205BDA33F", "versionEndExcluding": "13.1-24.38", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF33AE6-08BD-46FF-8833-20D2849F09EE", "versionEndExcluding": "12.1-65.15", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7439391A-903B-488E-A402-65C6AA1CEA02", "versionEndExcluding": "13.0-86.17", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0699EDF2-D5F6-43B5-AE5C-2CC6630B0722", "versionEndExcluding": "13.1-24.38", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:fips:*:*:*", "matchCriteriaId": "56FEAF85-756E-4022-A9BF-E0E46AFA1936", "versionEndExcluding": "12.1-55.282", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "C75D1B42-41FB-4C4E-A7E1-79DF4C258C0F", "versionEndExcluding": "12.1-55.282", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthenticated redirection to a malicious website" }, { "lang": "es", "value": "Un redireccionamiento no autenticado a un sitio web malicioso" } ], "id": "CVE-2022-27509", "lastModified": "2024-11-21T06:55:51.903", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-28T14:15:08.380", "references": [ { "source": "secure@citrix.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX457836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX457836" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX281474 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX281474 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A238E-72C4-4D74-B902-2EE8E602AAC1", "versionEndExcluding": "11.1-65.12", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C991579-B6B8-4F07-9AF9-739452F1F5AA", "versionEndExcluding": "12.1-58.15", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED09F4AE-DCC6-4C7D-BFA1-D22E16893C97", "versionEndExcluding": "13.0-64.35", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F98105E-37A4-46F4-BA82-A8E95372A370", "versionEndExcluding": "11.1-65.12", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "178C6CA9-0068-4225-A209-E13A880ED188", "versionEndExcluding": "13.0-64.35", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFAC08D1-1FE8-4910-9D50-F167537C7C91", "versionEndExcluding": "12.1-58.15", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "D76AEFBD-225E-45D3-B604-CAF0032BA861", "versionEndExcluding": "10.2.7b", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "7296BF8E-186C-4279-AF08-C3D1282322F0", "versionEndExcluding": "11.0.3f", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "92806100-D243-43CC-ACA7-DF9E95E2740D", "versionEndExcluding": "11.1.2a", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FB67ED6-6586-4280-A521-E1EDA81C68BE", "versionEndExcluding": "11.2.1a", "versionStartIncluding": "11.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:sd-wan_wanop:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F0ACFD-9D48-43F6-A45C-D5F0313BB952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to escalation of privileges on the management interface." }, { "lang": "es", "value": "Citrix ADC y Citrix Gateway versiones 13.0 anteriores a 13.0-64.35, Citrix ADC y NetScaler Gateway versiones 12.1 anteriores a 12.1-58.15, Citrix ADC versiones 12.1-FIPS anteriores a 12.1-55.187, Citrix ADC y NetScaler Gateway versi\u00f3n 12.0, Citrix ADC y NetScaler Gateway versiones 11.1 anteriores a 11.1-65.12, Citrix SD-WAN WANOP versiones 11.2 anteriores a 11.2.1a, Citrix SD-WAN WANOP versiones 11.1 anteriores a 11.1.2a, Citrix SD-WAN WANOP versiones 11.0 anteriores a 11.0.3f, Citrix SD-WAN WANOP versiones 10.2 anteriores a 10.2.7b, son vulnerables a una escalada de privilegios en la interfaz de administraci\u00f3n" } ], "id": "CVE-2020-8247", "lastModified": "2024-11-21T05:38:35.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-18T21:15:13.327", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX281474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX281474" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX281474 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX281474 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD2A238E-72C4-4D74-B902-2EE8E602AAC1", "versionEndExcluding": "11.1-65.12", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C991579-B6B8-4F07-9AF9-739452F1F5AA", "versionEndExcluding": "12.1-58.15", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED09F4AE-DCC6-4C7D-BFA1-D22E16893C97", "versionEndExcluding": "13.0-64.35", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F98105E-37A4-46F4-BA82-A8E95372A370", "versionEndExcluding": "11.1-65.12", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "178C6CA9-0068-4225-A209-E13A880ED188", "versionEndExcluding": "13.0-64.35", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFAC08D1-1FE8-4910-9D50-F167537C7C91", "versionEndExcluding": "12.1-58.15", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "D76AEFBD-225E-45D3-B604-CAF0032BA861", "versionEndExcluding": "10.2.7b", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "7296BF8E-186C-4279-AF08-C3D1282322F0", "versionEndExcluding": "11.0.3f", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "92806100-D243-43CC-ACA7-DF9E95E2740D", "versionEndExcluding": "11.1.2a", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FB67ED6-6586-4280-A521-E1EDA81C68BE", "versionEndExcluding": "11.2.1a", "versionStartIncluding": "11.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:sd-wan_wanop:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F0ACFD-9D48-43F6-A45C-D5F0313BB952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to a denial of service attack originating from the management network." }, { "lang": "es", "value": "Citrix ADC y Citrix Gateway versiones 13.0 anteriores a 13.0-64.35, Citrix ADC y NetScaler Gateway versiones 12.1 anteriores a 12.1-58.15, Citrix ADC versiones 12.1-FIPS anteriores a 12.1-55.187, Citrix ADC y NetScaler Gateway versi\u00f3n 12.0, Citrix ADC y NetScaler Gateway versiones 11.1 anteriores a 11.1-65.12, Citrix SD-WAN WANOP versiones 11.2 anteriores a 11.2.1a, Citrix SD-WAN WANOP versiones 11.1 anteriores a 11.1.2a, Citrix SD-WAN WANOP versiones 11.0 anteriores a 11.0.3f, Citrix SD-WAN WANOP versiones 10.2 anteriores a 10.2.7b, son vulnerables a un ataque de denegaci\u00f3n de servicio que se origina en la red de administraci\u00f3n" } ], "id": "CVE-2020-8246", "lastModified": "2024-11-21T05:38:34.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-18T21:15:13.263", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX281474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX281474" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX319135 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX319135 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
citrix | application_delivery_management | 12.1-62.25 | |
citrix | application_delivery_management | 13.0-82.42 | |
citrix | gateway | 12.1-62.25 | |
citrix | gateway | 13.0-82.42 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:application_delivery_management:12.1-62.25:*:*:*:*:*:*:*", "matchCriteriaId": "DE311F5F-CD6A-4539-9941-B7F301BD29C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:application_delivery_management:13.0-82.42:*:*:*:*:*:*:*", "matchCriteriaId": "ECDB150A-DC10-4C05-A75A-5EA94E3AE84D", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:12.1-62.25:*:*:*:*:*:*:*", "matchCriteriaId": "20180A94-DDD7-4EC0-9636-158B935B0938", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:13.0-82.42:*:*:*:*:*:*:*", "matchCriteriaId": "3FF01A30-0E92-43CD-B1BE-B2051EF7B0A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad en Citrix ADC (antes conocido como NetScaler ADC) y Citrix Gateway (antes conocido como NetScaler Gateway), y en los modelos 4000-WO, 4100-WO, 5000-WO y 5100-WO de Citrix SD-WAN WANOP Edition. Estas vulnerabilidades, si son explotadas, podr\u00edan conllevar a un ataque de phishing mediante un secuestro de autenticaci\u00f3n SAML para robar una sesi\u00f3n de usuario v\u00e1lida" } ], "id": "CVE-2021-22920", "lastModified": "2024-11-21T05:50:55.027", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-05T21:15:11.083", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "D56F2AAF-4658-484C-9A3A-D8A52BA5B10C", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "8CE9E655-0D97-4DCF-AC2F-79DCD12770E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "49454F7D-77B5-46DF-B95C-312AF2E68EAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "201246D4-1E22-4F28-9683-D6A9FD0F7A6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3A50966-5554-4919-B6CE-BD8F6FF991D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E0FA8E2-3E8F-481E-8C39-FB00A9739DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "A5D73B9A-59AA-4A38-AEAF-7EAB0965CD7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9F3ED0E-7F3D-477B-B645-77DA5FC7F502", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "58349F8E-3177-413A-9CBE-BB454DCD31E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80EAFB1-82DA-49BE-815D-D248624B442C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Citrix Application Delivery Controller (ADC) and Gateway versiones 10.5, 11.1, 12.0, 12.1 y 13.0. Permiten un salto de directorio." } ], "id": "CVE-2019-19781", "lastModified": "2025-02-04T20:15:33.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-12-27T14:15:12.070", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://forms.gle/eDf3DXZAv96oosfj6" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX267027" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://twitter.com/bad_packets/status/1215431625766424576" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/619785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://forms.gle/eDf3DXZAv96oosfj6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX267027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://twitter.com/bad_packets/status/1215431625766424576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/619785" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX330728 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX330728 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFB94B59-4AA0-4144-B174-FFDD2EB9D2B4", "versionEndExcluding": "11.1-65.23", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C076C750-AC7C-48DD-86B2-EB69FA14467F", "versionEndExcluding": "12.1-63.22", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2F3ACE6-B0F6-4E27-9DD8-EFEC98A7ACB4", "versionEndExcluding": "13.0-83.27", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C7C2760-C923-4D70-B9BA-9905CBD7A72C", "versionEndExcluding": "11.1-65.23", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEC9E148-82D8-4032-9E30-3A40362FEF29", "versionEndExcluding": "12.1-63.22", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "1153F3C5-BEDB-4697-A57C-E0B5621ACC2A", "versionEndExcluding": "13.0-65.23", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:sd-wan:*:*:*:*:wanop:*:*:*", "matchCriteriaId": "00C0944E-937D-42CD-A117-BB4ECAE52B61", "versionEndExcluding": "10.2.9c", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:sd-wan:*:*:*:*:wanop:*:*:*", "matchCriteriaId": "72E4366D-5278-45B1-8A14-0A3F7CD5F398", "versionEndExcluding": "11.4.2", "versionStartIncluding": "11.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An uncontrolled resource consumption vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de consumo no controlado de recursos en Citrix ADC versiones anteriores a 13.0-83.27, versiones anteriores a 12.1-63.22 y 11.1-65.23 que podr\u00eda permitir a un atacante con acceso a NSIP o SNIP con acceso a la interfaz de administraci\u00f3n causar una interrupci\u00f3n temporal de la GUI de administraci\u00f3n, la API Nitro y la comunicaci\u00f3n RPC" } ], "id": "CVE-2021-22956", "lastModified": "2024-11-21T05:51:00.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-07T14:15:08.943", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX330728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX330728" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "710A9915-E94D-4AB3-9077-904185CD835C", "versionEndExcluding": "12.1-65.21", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "21A12502-B9D9-4ED0-9E90-F27317338831", "versionEndExcluding": "13.0-88.12", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF90FACB-1523-48D4-AAA5-22BFED45475E", "versionEndExcluding": "13.1-33.47", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "0DD814B7-CD70-4AAA-B8C5-AEF4DBD1055A", "versionEndExcluding": "12.1-65.21", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "51A18C6F-58A9-4924-AEBA-2AC1846055BA", "versionEndExcluding": "13.0-88.12", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:-:*:*:*", "matchCriteriaId": "BBEEB7CC-13B3-49D9-9C1C-B31A8274943E", "versionEndExcluding": "13.1-33.47", "versionStartIncluding": "13.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:fips:*:*:*", "matchCriteriaId": "9A9A7C22-9E06-45AF-8A7C-8BEB12FDDFE2", "versionEndExcluding": "12.1-55.289", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:ndcpp:*:*:*", "matchCriteriaId": "78FC158E-7881-448B-A2BA-19CBC3BF646C", "versionEndExcluding": "12.1-55.289", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "User login brute force protection functionality bypass \n" }, { "lang": "es", "value": "Omisi\u00f3n de la funcionalidad de protecci\u00f3n de fuerza bruta de inicio de sesi\u00f3n de usuario" } ], "id": "CVE-2022-27516", "lastModified": "2024-11-21T06:55:52.480", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secure@citrix.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-08T22:15:13.633", "references": [ { "source": "secure@citrix.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "sourceIdentifier": "secure@citrix.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "secure@citrix.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.citrix.com/article/CTX261055 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX261055 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "D56F2AAF-4658-484C-9A3A-D8A52BA5B10C", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "8CE9E655-0D97-4DCF-AC2F-79DCD12770E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "49454F7D-77B5-46DF-B95C-312AF2E68EAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "201246D4-1E22-4F28-9683-D6A9FD0F7A6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3A50966-5554-4919-B6CE-BD8F6FF991D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E0FA8E2-3E8F-481E-8C39-FB00A9739DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "A5D73B9A-59AA-4A38-AEAF-7EAB0965CD7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9F3ED0E-7F3D-477B-B645-77DA5FC7F502", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "58349F8E-3177-413A-9CBE-BB454DCD31E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80EAFB1-82DA-49BE-815D-D248624B442C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway before 10.5 build 70.8, 11.x before 11.1 build 63.9, 12.0 before build 62.10, 12.1 before build 54.16, and 13.0 before build 41.28. An attacker with management-interface access can bypass authentication to obtain appliance administrative access. These products formerly used the NetScaler brand name." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Citrix Application Delivery Controller (ADC) y Gateway versiones anteriores a 10.5 build 70.8, versiones 11.x anteriores a 11.1 build 63.9, versi\u00f3n 12.0 anterior a build 62.10, versi\u00f3n 12.1 anterior a build 54.16 y versi\u00f3n 13.0 anterior a build 41.28. Un atacante con acceso a la interfaz de administraci\u00f3n puede omitir la autenticaci\u00f3n para obtener acceso administrativo del dispositivo. Estos productos anteriormente usaron la marca NetScaler." } ], "id": "CVE-2019-18225", "lastModified": "2024-11-21T04:32:52.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-21T18:15:10.680", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX261055" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX261055" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7DF63BB-CCE6-4405-8E6D-6DF1BC975D3D", "versionEndExcluding": "10.2.7", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D1A5E7D-C3A7-48B8-BD6D-5973F8361DEC", "versionEndExcluding": "11.0.3d", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "0471F1F0-F804-47BA-98A1-7080E1C740E7", "versionEndExcluding": "11.1.1a", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS)." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en versiones de Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18 y Citrix SDWAN WAN-OP versiones anteriores a 11.1.1a, 11.0.3d y 10.2.7, permite un ataque de tipo Cross Site Scripting (XSS) reflejado" } ], "id": "CVE-2020-8191", "lastModified": "2024-11-21T05:38:28.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-10T16:15:12.077", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX297155 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX297155 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "003574BC-2C37-44D6-9F5E-E931F5ECE169", "versionEndExcluding": "12.1-62.23", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAE6C6C5-2C85-484E-A61A-C17096C4D9F7", "versionEndExcluding": "13.0-82.41", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D77B2AD2-BAF1-4FD3-B7C5-88AC1B130971", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E178AA28-B24F-4565-A314-1E58AAC54648", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "024F407E-F369-4B9C-BC3C-5CB0FF613526", "versionEndExcluding": "12.1-62.23", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5675439-B8C6-4ABD-8D53-F2D9BB49F33D", "versionEndExcluding": "13.0-82.41", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible." }, { "lang": "es", "value": "Citrix ADC y Citrix/NetScaler Gateway versiones anteriores a 13.0-82.41, 12.1-62.23, 11.1-65.20 y Citrix ADC 12.1-FIPS versiones anteriores a 12.1-55.238, sufren de un control de acceso inapropiado que permite el secuestro de la autenticaci\u00f3n SAML mediante un ataque de phishing para robar una sesi\u00f3n de usuario v\u00e1lida. Tome en cuenta que Citrix ADC o Citrix Gateway deben estar configurados como un SP SAML o un IdP SAML para que esto sea posible" } ], "id": "CVE-2020-8300", "lastModified": "2024-11-21T05:38:41.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-16T14:15:08.440", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | Third Party Advisory, VDB Entry | |
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7DF63BB-CCE6-4405-8E6D-6DF1BC975D3D", "versionEndExcluding": "10.2.7", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D1A5E7D-C3A7-48B8-BD6D-5973F8361DEC", "versionEndExcluding": "11.0.3d", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "0471F1F0-F804-47BA-98A1-7080E1C740E7", "versionEndExcluding": "11.1.1a", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users." }, { "lang": "es", "value": "Un control de acceso inapropiado en Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18 y Citrix SDWAN WAN-OP versiones anteriores a 11.1.1a, 11.0.3d y 10.2.7, resulta en una divulgaci\u00f3n de informaci\u00f3n limitada para usuarios poco privilegiados" } ], "id": "CVE-2020-8196", "lastModified": "2025-02-07T13:15:30.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2020-07-10T16:15:12.407", "references": [ { "source": "support@hackerone.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" }, { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX276688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX276688 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC8327D0-8B64-44AF-A230-AAE32F3526CF", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4807513-1157-4CE3-8998-9C5EB9BBDA3E", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "165076F2-014F-46F9-A1AB-2256D935A21B", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6AE49E6-A6B9-4E2B-9AFB-7F1808D052F6", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03868D24-B1C0-4245-AE28-0960CF2816C1", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA7AAC01-A7CB-48F4-A25D-4A29479CD0DA", "versionEndExcluding": "10.5-70.18", "versionStartIncluding": "10.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C33096-91FD-4387-8B90-C8981DB7F926", "versionEndExcluding": "11.1-64.14", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7605821F-21B0-4F9D-AAD1-F901CED00585", "versionEndExcluding": "12.0-63.21", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA8946F-75C2-4515-9EBE-E1884B35ECF1", "versionEndExcluding": "12.1-57.18", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D0CC10-FE91-40E4-BFFD-11BE41DD4269", "versionEndExcluding": "13.0-58.30", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EF98B43-71DB-4230-B7AC-76EC2B1F0533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7DF63BB-CCE6-4405-8E6D-6DF1BC975D3D", "versionEndExcluding": "10.2.7", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D1A5E7D-C3A7-48B8-BD6D-5973F8361DEC", "versionEndExcluding": "11.0.3d", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "0471F1F0-F804-47BA-98A1-7080E1C740E7", "versionEndExcluding": "11.1.1a", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in Stored Cross-Site Scripting (XSS)." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en Citrix ADC y Citrix Gateway versiones anteriores a 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 y 10.5-70.18 y Citrix SDWAN WAN-OP versiones anteriores a 11.1.1a, 11.0.3d y 10.2.7, resulta en una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado" } ], "id": "CVE-2020-8198", "lastModified": "2024-11-21T05:38:29.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-10T16:15:12.560", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX276688" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX319135 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX319135 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92AEAC43-113D-456B-89C0-1872A67224AC", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC22F7-EA37-48D7-822D-B66EE2B25FE2", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1035921-397B-4E88-AF1A-DF581B75B4B2", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "4564E909-7F8E-40DF-B941-FFACC03B97B7", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB5357D6-4995-4966-8B63-11E636AD58BC", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE3B890B-5A0E-4B5A-A9E1-0C6DDF9524E6", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B222CD-3235-4153-97B0-D8F6FF1FB7BE", "versionEndExcluding": "10.2.9.b", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "22226FCE-A3D3-4FAB-909A-7922AAC3035A", "versionEndExcluding": "11.2.3.b", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0A54438-E0DA-4134-87FE-D7BFE30A3BAA", "versionEndExcluding": "11.3.2.a", "versionStartIncluding": "11.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0A1FE7-9F5D-476E-A3E0-2B6260DE0366", "versionEndExcluding": "11.4.0.a", "versionStartIncluding": "11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad en Citrix ADC (conocido anteriormente como NetScaler ADC) y Citrix Gateway (conocido anteriormente como NetScaler Gateway), y en los modelos 4000-WO, 4100-WO, 5000-WO y 5100-WO de Citrix SD-WAN WANOP Edition. Estas vulnerabilidades, si son explotadas, podr\u00edan conllevar a el consumo total del limitado espacio de disco disponible en los dispositivos" } ], "id": "CVE-2021-22919", "lastModified": "2024-11-21T05:50:54.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-05T21:15:10.997", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-8299
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX297155 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP Edition |
Version: Fixed in Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0, Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1, Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1, Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS, Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4, Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3, Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3, Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2, Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1, Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX297155" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP Edition", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0, Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1, Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1, Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS, Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4, Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3, Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3, Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2, Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1, Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T13:08:22", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX297155" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8299", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP Edition", "version": { "version_data": [ { "version_value": "Fixed in Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0, Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1, Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1, Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS, Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4, Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3, Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3, Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2, Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1, Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX297155", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX297155" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8299", "datePublished": "2021-06-16T13:08:22", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8198
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in Stored Cross-Site Scripting (XSS)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site Scripting (XSS) - Stored (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T15:39:14", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8198", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in Stored Cross-Site Scripting (XSS)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site Scripting (XSS) - Stored (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8198", "datePublished": "2020-07-10T15:39:14", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8300
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX297155 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: Fixed in Citrix ADC and Citrix Gateway 13.0 before 13.0-82.41, Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX297155" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in Citrix ADC and Citrix Gateway 13.0 before 13.0-82.41, Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238" } ] } ], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control - Generic (CWE-284)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T13:08:16", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX297155" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "Fixed in Citrix ADC and Citrix Gateway 13.0 before 13.0-82.41, Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control - Generic (CWE-284)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX297155", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX297155" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8300", "datePublished": "2021-06-16T13:08:16", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22956
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX330728 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN |
Version: Citrix ADC 11.1,12.1,13.0,13.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:26.260Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX330728" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC 11.1,12.1,13.0,13.1" } ] } ], "descriptions": [ { "lang": "en", "value": "An uncontrolled resource consumption vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T13:12:38", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX330728" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22956", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN", "version": { "version_data": [ { "version_value": "Citrix ADC 11.1,12.1,13.0,13.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An uncontrolled resource consumption vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX330728", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX330728" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22956", "datePublished": "2021-12-07T13:12:38", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:26.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22927
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX319135 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Version: Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Version: Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Version: Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:26.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX319135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0" }, { "status": "affected", "version": "Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1" }, { "status": "affected", "version": "Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1" }, { "status": "affected", "version": "Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS" } ] } ], "descriptions": [ { "lang": "en", "value": "A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "Session Fixation (CWE-384)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-05T20:16:42", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX319135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0" }, { "version_value": "Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1" }, { "version_value": "Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1" }, { "version_value": "Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Session Fixation (CWE-384)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX319135", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX319135" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22927", "datePublished": "2021-08-05T20:16:42", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:26.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8197
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18" } ] } ], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability on Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows a low privileged user with management access to execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation (CAPEC-233)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T15:40:09", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8197", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability on Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows a low privileged user with management access to execute arbitrary commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation (CAPEC-233)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8197", "datePublished": "2020-07-10T15:40:09", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8194
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "Code Injection (CWE-94)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T15:38:54", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection (CWE-94)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8194", "datePublished": "2020-07-10T15:38:54", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-24488
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix ADC and Citrix Gateway |
Version: 13.1 Version: 13.0 Version: 12.1 Version: 12.1-FIPS Version: 13.1-FIPS Version: 12.1-NDcPP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:56:04.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24488", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T19:50:27.509927Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T19:51:19.071Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Citrix ADC and Citrix Gateway\u202f", "vendor": "Citrix", "versions": [ { "lessThan": "13.1-45.61 ", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "13.0-90.11\u202f", "status": "affected", "version": "13.0", "versionType": "patch" }, { "lessThan": "12.1-65.35", "status": "affected", "version": "12.1", "versionType": "patch" }, { "lessThan": "12.1-55.296", "status": "affected", "version": "12.1-FIPS ", "versionType": "patch" }, { "lessThan": "13.1-37.150 ", "status": "affected", "version": "13.1-FIPS ", "versionType": "patch" }, { "lessThan": "12.1-55.296", "status": "affected", "version": "12.1-NDcPP", "versionType": "patch" } ] } ], "datePublic": "2023-05-09T19:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCross site scripting vulnerability\u0026nbsp;\u003c/span\u003ein Citrix ADC and Citrix Gateway\u202f\u0026nbsp;in allows and attacker to perform cross site scripting" } ], "value": "Cross site scripting vulnerability\u00a0in Citrix ADC and Citrix Gateway\u202f\u00a0in allows and attacker to perform cross site scripting" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-10T20:41:53.469Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" } ], "source": { "discovery": "UNKNOWN" }, "title": "Cross site scripting", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2023-24488", "datePublished": "2023-07-10T20:41:31.248Z", "dateReserved": "2023-01-24T15:49:52.579Z", "dateUpdated": "2024-10-25T19:51:19.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8247
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX281474 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX281474" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b" } ] } ], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to escalation of privileges on the management interface." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "Improper Privilege Management (CWE-269)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-18T20:12:32", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX281474" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8247", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to escalation of privileges on the management interface." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management (CWE-269)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX281474", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX281474" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8247", "datePublished": "2020-09-18T20:12:32", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27513
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Citrix Gateway, Citrix ADC ", "vendor": "Citrix", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2022-11-08T13:32:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRemote desktop takeover via phishing \u003c/span\u003e \u003c/span\u003e\u003cbr\u003e" } ], "value": "Remote desktop takeover via phishing \n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Remote desktop takeover via phishing " } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345: Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-18T17:10:16.426Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "name": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "source": { "discovery": "UNKNOWN" }, "title": "Remote desktop takeover via phishing", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2022-27513", "datePublished": "2022-11-08T21:26:08.238599Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:59.251Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22920
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX319135 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Version: Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:25.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX319135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0" }, { "status": "affected", "version": "Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control - Generic (CWE-284)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-05T20:16:49", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX319135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22920", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0" }, { "version_value": "Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control - Generic (CWE-284)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX319135", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX319135" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22920", "datePublished": "2021-08-05T20:16:49", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:25.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27509
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX457836 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Citirx | Citrix Application Delivery Management (Citrix ADC) and Citrix Gateway |
Version: 13.1 < 24.38 Version: 13.0 < 86.17 Version: 12.1 < 65.15 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX457836" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix Application Delivery Management (Citrix ADC) and Citrix Gateway", "vendor": "Citirx", "versions": [ { "lessThan": "24.38", "status": "affected", "version": "13.1", "versionType": "custom" }, { "lessThan": "86.17", "status": "affected", "version": "13.0", "versionType": "custom" }, { "lessThan": "65.15", "status": "affected", "version": "12.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "James Kettle" } ], "datePublic": "2022-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Unauthenticated redirection to a malicious website" } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthenticated redirection to a malicious website", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-28T13:11:43", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX457836" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthenticated redirection to a malicious website", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@citrix.com", "DATE_PUBLIC": "2022-07-26T22:20:00.000Z", "ID": "CVE-2022-27509", "STATE": "PUBLIC", "TITLE": "Unauthenticated redirection to a malicious website" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix Application Delivery Management (Citrix ADC) and Citrix Gateway", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "13.1", "version_value": "24.38" }, { "version_affected": "\u003c", "version_name": "13.0", "version_value": "86.17" }, { "version_affected": "\u003c", "version_name": "12.1", "version_value": "65.15" } ] } } ] }, "vendor_name": "Citirx" } ] } }, "credit": [ { "lang": "eng", "value": "James Kettle" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unauthenticated redirection to a malicious website" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthenticated redirection to a malicious website" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX457836", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX457836" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2022-27509", "datePublished": "2022-07-28T13:11:43.072489Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-09-16T18:43:25.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8195
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC | |
http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-8195", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T12:33:54.819610Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-8195" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T12:35:46.830Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation (CWE-20)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T17:06:17.000Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation (CWE-20)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" }, { "name": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8195", "datePublished": "2020-07-10T15:39:35.000Z", "dateReserved": "2020-01-28T00:00:00.000Z", "dateUpdated": "2025-02-07T12:35:46.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22919
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX319135 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP |
Version: Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS Citrix SD-WAN WANOP Edition 11.4.0a and later releases of 11.4 Citrix SD-WAN WANOP Edition 11.3.2a and later releases of 11.3 Citrix SD-WAN WANOP Edition 11.2.3b and later releases of 11.2 Citrix SD-WAN WANOP Edition 10.2.9b and later releases of 10.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:25.542Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX319135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS Citrix SD-WAN WANOP Edition 11.4.0a and later releases of 11.4 Citrix SD-WAN WANOP Edition 11.3.2a and later releases of 11.3 Citrix SD-WAN WANOP Edition 11.2.3b and later releases of 11.2 Citrix SD-WAN WANOP Edition 10.2.9b and later releases of 10.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "Allocation of Resources Without Limits or Throttling (CWE-770)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-05T20:16:46", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX319135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS Citrix SD-WAN WANOP Edition 11.4.0a and later releases of 11.4 Citrix SD-WAN WANOP Edition 11.3.2a and later releases of 11.3 Citrix SD-WAN WANOP Edition 11.2.3b and later releases of 11.2 Citrix SD-WAN WANOP Edition 10.2.9b and later releases of 10.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling (CWE-770)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX319135", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX319135" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22919", "datePublished": "2021-08-05T20:16:46", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:25.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8190
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect file permissions in Citrix ADC and Citrix Gateway before versions 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation (CAPEC-233)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T15:32:34", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect file permissions in Citrix ADC and Citrix Gateway before versions 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation (CAPEC-233)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8190", "datePublished": "2020-07-10T15:32:34", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8245
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX281474 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX281474" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b leads to an HTML Injection attack against the SSL VPN web portal." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site Scripting (XSS) - Generic (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-18T20:12:07", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX281474" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8245", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b leads to an HTML Injection attack against the SSL VPN web portal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site Scripting (XSS) - Generic (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX281474", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX281474" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8245", "datePublished": "2020-09-18T20:12:07", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27507
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citirx | Citrix Application Delivery Controller (Citrix ADC) and Citrix Gateway |
Version: 13.1 < 13.1-21.50 Version: 13.0 < 13.0-85.19 Version: 12.1 < 12.1-64.17 Version: 12.1 FIPS < 12.1-55.278 Version: 12.1 NDcPP < 12.1-55.278 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:57.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix Application Delivery Controller (Citrix ADC) and Citrix Gateway", "vendor": "Citirx", "versions": [ { "lessThan": "13.1-21.50", "status": "affected", "version": "13.1", "versionType": "custom" }, { "lessThan": "13.0-85.19", "status": "affected", "version": "13.0", "versionType": "custom" }, { "lessThan": "12.1-64.17\u202f ", "status": "affected", "version": "12.1", "versionType": "custom" }, { "lessThan": "12.1-55.278", "status": "affected", "version": "12.1 FIPS", "versionType": "custom" }, { "lessThan": "12.1-55.278", "status": "affected", "version": "12.1 NDcPP", "versionType": "custom" } ] } ], "datePublic": "2022-05-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Authenticated denial of service" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-24T00:00:00", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated denial of service ", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2022-27507", "datePublished": "2023-01-24T00:00:00", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:57.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18225
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX261055 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:14.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX261055" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway before 10.5 build 70.8, 11.x before 11.1 build 63.9, 12.0 before build 62.10, 12.1 before build 54.16, and 13.0 before build 41.28. An attacker with management-interface access can bypass authentication to obtain appliance administrative access. These products formerly used the NetScaler brand name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-21T17:09:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX261055" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-18225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway before 10.5 build 70.8, 11.x before 11.1 build 63.9, 12.0 before build 62.10, 12.1 before build 54.16, and 13.0 before build 41.28. An attacker with management-interface access can bypass authentication to obtain appliance administrative access. These products formerly used the NetScaler brand name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX261055", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX261055" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18225", "datePublished": "2019-10-21T17:09:23", "dateReserved": "2019-10-21T00:00:00", "dateUpdated": "2024-08-05T01:47:14.102Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8196
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC | |
http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-8196", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T12:33:10.375429Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-8196" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-02-07T12:34:39.883Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control - Generic (CWE-284)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T17:06:17.000Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control - Generic (CWE-284)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" }, { "name": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8196", "datePublished": "2020-07-10T15:39:54.000Z", "dateReserved": "2020-01-28T00:00:00.000Z", "dateUpdated": "2025-02-07T12:34:39.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-24487
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix ADC and Citrix Gateway |
Version: 13.1 Version: 13.0 Version: 12.1 Version: 12.1-FIPS Version: 13.1-FIPS Version: 12.1-NDcPP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:56:04.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24487", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T19:50:23.444707Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T19:51:04.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Citrix ADC and Citrix Gateway\u202f", "vendor": "Citrix", "versions": [ { "lessThan": "13.1-45.61 ", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "13.0-90.11\u202f", "status": "affected", "version": "13.0", "versionType": "patch" }, { "lessThan": "12.1-65.35", "status": "affected", "version": "12.1", "versionType": "patch" }, { "lessThan": "12.1-55.296", "status": "affected", "version": "12.1-FIPS ", "versionType": "patch" }, { "lessThan": "13.1-37.150 ", "status": "affected", "version": "13.1-FIPS ", "versionType": "patch" }, { "lessThan": "12.1-55.296", "status": "affected", "version": "12.1-NDcPP", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eArbitrary file read\u0026nbsp;\u003c/span\u003ein Citrix ADC and Citrix Gateway\u202f" } ], "value": "Arbitrary file read\u00a0in Citrix ADC and Citrix Gateway\u202f" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-253", "description": "CWE-253: Incorrect Check of Function Return Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-10T20:51:59.630Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary file read", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2023-24487", "datePublished": "2023-07-10T20:51:59.630Z", "dateReserved": "2023-01-24T15:49:52.579Z", "dateUpdated": "2024-10-25T19:51:04.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8191
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Cross-site Scripting (XSS) - Reflected (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T15:38:10", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8191", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site Scripting (XSS) - Reflected (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8191", "datePublished": "2020-07-10T15:38:10", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27516
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Citrix Gateway, Citrix ADC ", "vendor": "Citrix", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2022-11-08T13:32:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUser login brute force protection functionality bypass \u003c/span\u003e \u003c/span\u003e \u003c/span\u003e\u003cbr\u003e" } ], "value": "User login brute force protection functionality bypass \n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "User login brute force protection functionality bypass " } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693: Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-18T17:32:37.759Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "name": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "source": { "discovery": "UNKNOWN" }, "title": "User login brute force protection functionality bypass ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2022-27516", "datePublished": "2022-11-08T21:26:12.642212Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:59.301Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8246
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX281474 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX281474" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP ", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b" } ] } ], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to a denial of service attack originating from the management network." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-18T20:12:26", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX281474" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8246", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP ", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to a denial of service attack originating from the management network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX281474", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX281474" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8246", "datePublished": "2020-09-18T20:12:26", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27510
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Citrix Gateway, Citrix ADC ", "vendor": "Citrix", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2022-11-08T13:32:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUnauthorized access to Gateway user capabilities \u003c/span\u003e\u003cbr\u003e" } ], "value": "Unauthorized access to Gateway user capabilities \n" } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-288", "description": "CWE-288: Authentication Bypass Using an Alternate Path or Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-18T16:48:59.139Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "name": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", "url": "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthorized access to Gateway user capabilities ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2022-27510", "datePublished": "2022-11-08T21:26:10.688499Z", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:59.200Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27518
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 12.1 Version: 13.0 Version: 12.1 FIPs, NDcPP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://support.citrix.com/article/CTX474995", "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX474995" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-27518", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-11-20T20:56:29.075511Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-12-13", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-27518" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-01-28T16:20:38.276Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Citrix Gateway, Citrix ADC ", "vendor": "Citrix", "versions": [ { "status": "affected", "version": "12.1" }, { "status": "affected", "version": "13.0" }, { "status": "affected", "version": "12.1 FIPs, NDcPP" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUnauthenticated remote arbitrary code execution\u003c/span\u003e\u003cbr\u003e" } ], "value": "Unauthenticated remote arbitrary code execution\n" } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-664", "description": "CWE-664: Improper Control of a Resource Through its Lifetime ", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-18T17:34:17.110Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "name": "https://support.citrix.com/article/CTX474995", "url": "https://support.citrix.com/article/CTX474995" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthenticated remote arbitrary code execution", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2022-27518", "datePublished": "2022-12-13T00:00:00.000Z", "dateReserved": "2022-03-21T00:00:00.000Z", "dateUpdated": "2025-01-28T16:20:38.276Z", "serial": 1, "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22955
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX330728 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: Citrix ADC 111.1, 2.1, 13.0,13.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:25.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX330728" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC 111.1, 2.1, 13.0,13.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A unauthenticated denial of service vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 when configured as a VPN (Gateway) or AAA virtual server could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T13:12:33", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX330728" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22955", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "Citrix ADC 111.1, 2.1, 13.0,13.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A unauthenticated denial of service vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 when configured as a VPN (Gateway) or AAA virtual server could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX330728", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX330728" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22955", "datePublished": "2021-12-07T13:12:33", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:25.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-18177
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:13.604Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-appliance-security-update" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In certain Citrix products, information disclosure can be achieved by an authenticated VPN user when there is a configured SSL VPN endpoint. This affects Citrix ADC and Citrix Gateway 13.0-58.30 and later releases before the CTX276688 update." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.citrix.com/article/CTX276688/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-appliance-security-update" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-18177", "datePublished": "2022-12-26T00:00:00", "dateReserved": "2019-10-17T00:00:00", "dateUpdated": "2024-08-05T01:47:13.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27508
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Citirx | Citrix Application Delivery Controller (Citrix ADC) and Citrix Gateway |
Version: 12.1-64.16 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix Application Delivery Controller (Citrix ADC) and Citrix Gateway", "vendor": "Citirx", "versions": [ { "status": "affected", "version": "12.1-64.16" } ] } ], "datePublic": "2022-05-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Unauthenticated denial of service" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-24T00:00:00", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthenticated denial of service ", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2022-27508", "datePublished": "2023-01-24T00:00:00", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:59.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19781
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX267027" }, { "name": "VU#619785", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/619785" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/bad_packets/status/1215431625766424576" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://forms.gle/eDf3DXZAv96oosfj6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-19781", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T20:02:18.414185Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-19781" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T20:04:50.278Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-16T18:06:17.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX267027" }, { "name": "VU#619785", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/619785" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/bad_packets/status/1215431625766424576" }, { "tags": [ "x_refsource_MISC" ], "url": "https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://forms.gle/eDf3DXZAv96oosfj6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19781", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX267027", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX267027" }, { "name": "VU#619785", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/619785" }, { "name": "https://twitter.com/bad_packets/status/1215431625766424576", "refsource": "MISC", "url": "https://twitter.com/bad_packets/status/1215431625766424576" }, { "name": "https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/", "refsource": "MISC", "url": "https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/" }, { "name": "https://forms.gle/eDf3DXZAv96oosfj6", "refsource": "MISC", "url": "https://forms.gle/eDf3DXZAv96oosfj6" }, { "name": "http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html" }, { "name": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19781", "datePublished": "2019-12-27T13:06:46.000Z", "dateReserved": "2019-12-13T00:00:00.000Z", "dateUpdated": "2025-02-04T20:04:50.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8193
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX276688 | x_refsource_MISC | |
http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP |
Version: Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX276688" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-8193", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T12:35:04.938931Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-8193" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-02-07T12:36:20.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control - Generic (CWE-284)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T17:06:16.000Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX276688" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8193", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SDWAN WAN-OP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP 11.1.1a, 11.0.3d and 10.2.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control - Generic (CWE-284)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX276688", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX276688" }, { "name": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8193", "datePublished": "2020-07-10T15:38:28.000Z", "dateReserved": "2020-01-28T00:00:00.000Z", "dateUpdated": "2025-02-07T12:36:20.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202003-0210
Vulnerability from variot
Citrix Gateway 11.1, 12.0, and 12.1 allows Information Exposure Through Caching. NOTE: Citrix disputes this as not a vulnerability. There is no sensitive information disclosure through the cache headers on Citrix ADC. The "Via" header lists cache protocols and recipients between the start and end points for a request or a response. The "Age" header provides the age of the cached response in seconds. Both headers are commonly used for proxy cache and the information is not sensitive. Citrix Gateway Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. An attacker could exploit this vulnerability to disclose information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0210", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "12.0" }, { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "12.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "db": "NVD", "id": "CVE-2020-10110" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002525" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Micha Borrmann", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-248" } ], "trust": 0.6 }, "cve": "CVE-2020-10110", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-10110", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-002525", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-162556", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2020-10110", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2020-002525", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-10110", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-002525", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202003-248", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-162556", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-162556" }, { "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "db": "CNNVD", "id": "CNNVD-202003-248" }, { "db": "NVD", "id": "CVE-2020-10110" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix Gateway 11.1, 12.0, and 12.1 allows Information Exposure Through Caching. NOTE: Citrix disputes this as not a vulnerability. There is no sensitive information disclosure through the cache headers on Citrix ADC. The \"Via\" header lists cache protocols and recipients between the start and end points for a request or a response. The \"Age\" header provides the age of the cached response in seconds. Both headers are commonly used for proxy cache and the information is not sensitive. Citrix Gateway Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. An attacker could exploit this vulnerability to disclose information", "sources": [ { "db": "NVD", "id": "CVE-2020-10110" }, { "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "db": "VULHUB", "id": "VHN-162556" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "PACKETSTORM", "id": "156656", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2020-10110", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-002525", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202003-248", "trust": 0.7 }, { "db": "NSFOCUS", "id": "46103", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-162556", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-162556" }, { "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "db": "CNNVD", "id": "CNNVD-202003-248" }, { "db": "NVD", "id": "CVE-2020-10110" } ] }, "id": "VAR-202003-0210", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-162556" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:36:04.486000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Support Knowledge Center", "trust": 0.8, "url": "https://support.citrix.com/search#/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002525" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-668", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-162556" }, { "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "db": "NVD", "id": "CVE-2020-10110" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://packetstormsecurity.com/files/156656/citrix-gateway-11.1-12.0-12.1-information-disclosure.html" }, { "trust": 1.7, "url": "https://seclists.org/fulldisclosure/2020/mar/7" }, { "trust": 1.7, "url": "https://support.citrix.com/search" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10110" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10110" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/46103" } ], "sources": [ { "db": "VULHUB", "id": "VHN-162556" }, { "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "db": "CNNVD", "id": "CNNVD-202003-248" }, { "db": "NVD", "id": "CVE-2020-10110" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-162556" }, { "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "db": "CNNVD", "id": "CNNVD-202003-248" }, { "db": "NVD", "id": "CVE-2020-10110" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-06T00:00:00", "db": "VULHUB", "id": "VHN-162556" }, { "date": "2020-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "date": "2020-03-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-248" }, { "date": "2020-03-06T21:15:15.060000", "db": "NVD", "id": "CVE-2020-10110" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-01T00:00:00", "db": "VULHUB", "id": "VHN-162556" }, { "date": "2020-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002525" }, { "date": "2022-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-248" }, { "date": "2024-11-21T04:54:50.223000", "db": "NVD", "id": "CVE-2020-10110" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-248" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix Gateway Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002525" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-248" } ], "trust": 0.6 } }
var-202205-1913
Vulnerability from variot
Unauthenticated denial of service. Citrix Application Delivery Controller and Citrix Gateway Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Both Citrix Gateway (Citrix Systems NetScaler Gateway) and Citrix ADC are products of Citrix Systems (Citrix). Citrix Gateway is a secure remote access solution. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. Citrix ADC is one of the most comprehensive application delivery and load balancing solutions. Used for application security, overall visibility and availability. A security vulnerability exists in Citrix ADC and Citrix Gateway versions 12.1-64.16
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1913", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "12.1-64.16" }, { "model": "application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "12.1-64.16" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "NVD", "id": "CVE-2022-27508" } ] }, "cve": "CVE-2022-27508", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-27508", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-27508", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-27508", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-27508", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202205-4147", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "CNNVD", "id": "CNNVD-202205-4147" }, { "db": "NVD", "id": "CVE-2022-27508" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unauthenticated denial of service. Citrix Application Delivery Controller and Citrix Gateway Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Both Citrix Gateway (Citrix Systems NetScaler Gateway) and Citrix ADC are products of Citrix Systems (Citrix). Citrix Gateway is a secure remote access solution. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. Citrix ADC is one of the most comprehensive application delivery and load balancing solutions. Used for application security, overall visibility and availability. A security vulnerability exists in Citrix ADC and Citrix Gateway versions 12.1-64.16", "sources": [ { "db": "NVD", "id": "CVE-2022-27508" }, { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "VULHUB", "id": "VHN-418142" }, { "db": "VULMON", "id": "CVE-2022-27508" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-27508", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-006657", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-4147", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.2571", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418142", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-27508", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418142" }, { "db": "VULMON", "id": "CVE-2022-27508" }, { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "CNNVD", "id": "CNNVD-202205-4147" }, { "db": "NVD", "id": "CVE-2022-27508" } ] }, "id": "VAR-202205-1913", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418142" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:11.216000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX457048", "trust": 0.8, "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" }, { "title": "Multiple Citrix Systems Product resource management error vulnerability fixes", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=223464" }, { "title": "Citrix Security Bulletins: Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27507 and CVE-2022-27508", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=72c36bceaf4968fb4025839fb3ab9ded" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-27508" }, { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "CNNVD", "id": "CNNVD-202205-4147" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418142" }, { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "NVD", "id": "CVE-2022-27508" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://support.citrix.com/article/ctx457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27508" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2571" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-27508/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://support.citrix.com/article/ctx457048" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418142" }, { "db": "VULMON", "id": "CVE-2022-27508" }, { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "CNNVD", "id": "CNNVD-202205-4147" }, { "db": "NVD", "id": "CVE-2022-27508" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418142" }, { "db": "VULMON", "id": "CVE-2022-27508" }, { "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "db": "CNNVD", "id": "CNNVD-202205-4147" }, { "db": "NVD", "id": "CVE-2022-27508" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-26T00:00:00", "db": "VULHUB", "id": "VHN-418142" }, { "date": "2023-01-26T00:00:00", "db": "VULMON", "id": "CVE-2022-27508" }, { "date": "2023-07-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "date": "2022-05-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-4147" }, { "date": "2023-01-26T21:15:33.337000", "db": "NVD", "id": "CVE-2022-27508" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-01T00:00:00", "db": "VULHUB", "id": "VHN-418142" }, { "date": "2023-01-27T00:00:00", "db": "VULMON", "id": "CVE-2022-27508" }, { "date": "2023-07-07T06:32:00", "db": "JVNDB", "id": "JVNDB-2022-006657" }, { "date": "2023-02-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-4147" }, { "date": "2023-02-01T20:38:43.577000", "db": "NVD", "id": "CVE-2022-27508" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-4147" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0 and \u00a0Citrix\u00a0Gateway\u00a0 Resource exhaustion vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006657" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-4147" } ], "trust": 0.6 } }
var-202211-0767
Vulnerability from variot
Unauthorized access to Gateway user capabilities . of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller An authentication vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.21" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-33.47" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-33.41" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-88.12" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-88.12" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.289" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.21" }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "db": "NVD", "id": "CVE-2022-27510" } ] }, "cve": "CVE-2022-27510", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-27510", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-27510", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-27510", "trust": 1.0, "value": "CRITICAL" }, { "author": "secure@citrix.com", "id": "CVE-2022-27510", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-27510", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202211-2372", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "db": "CNNVD", "id": "CNNVD-202211-2372" }, { "db": "NVD", "id": "CVE-2022-27510" }, { "db": "NVD", "id": "CVE-2022-27510" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unauthorized access to Gateway user capabilities \n. of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller An authentication vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-27510" }, { "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "db": "VULHUB", "id": "VHN-418144" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-27510", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020612", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2372", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418144", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418144" }, { "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "db": "CNNVD", "id": "CNNVD-202211-2372" }, { "db": "NVD", "id": "CVE-2022-27510" } ] }, "id": "VAR-202211-0767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418144" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:49:30.708000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Citrix Gateway and Citrix ADC Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213780" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2372" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "CWE-288", "trust": 1.0 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418144" }, { "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "db": "NVD", "id": "CVE-2022-27510" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://support.citrix.com/article/ctx463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27510" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-27510/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418144" }, { "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "db": "CNNVD", "id": "CNNVD-202211-2372" }, { "db": "NVD", "id": "CVE-2022-27510" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418144" }, { "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "db": "CNNVD", "id": "CNNVD-202211-2372" }, { "db": "NVD", "id": "CVE-2022-27510" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-08T00:00:00", "db": "VULHUB", "id": "VHN-418144" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "date": "2022-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2372" }, { "date": "2022-11-08T22:15:13.020000", "db": "NVD", "id": "CVE-2022-27510" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-418144" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020612" }, { "date": "2022-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2372" }, { "date": "2023-10-18T17:15:08.340000", "db": "NVD", "id": "CVE-2022-27510" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2372" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of Citrix Systems \u00a0Citrix\u00a0Gateway\u00a0 and \u00a0Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0 Authentication vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020612" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2372" } ], "trust": 0.6 } }
var-202108-0266
Vulnerability from variot
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0266", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.22" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.45" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.45" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.27" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.27" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.238" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.22" }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "db": "NVD", "id": "CVE-2021-22927" } ] }, "cve": "CVE-2021-22927", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22927", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-381401", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-22927", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22927", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22927", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22927", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202107-1473", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-381401", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-381401" }, { "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "db": "CNNVD", "id": "CNNVD-202107-1473" }, { "db": "NVD", "id": "CVE-2021-22927" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session", "sources": [ { "db": "NVD", "id": "CVE-2021-22927" }, { "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "db": "VULHUB", "id": "VHN-381401" }, { "db": "VULMON", "id": "CVE-2021-22927" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22927", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009767", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.2434", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202107-1473", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381401", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22927", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381401" }, { "db": "VULMON", "id": "CVE-2021-22927" }, { "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "db": "CNNVD", "id": "CNNVD-202107-1473" }, { "db": "NVD", "id": "CVE-2021-22927" } ] }, "id": "VAR-202108-0266", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-381401" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:26.061000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX319135", "trust": 0.8, "url": "https://support.citrix.com/article/CTX319135" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009767" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-384", "trust": 1.1 }, { "problemtype": "Session immobilization (CWE-384) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381401" }, { "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "db": "NVD", "id": "CVE-2021-22927" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://support.citrix.com/article/ctx319135" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22927" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2434" } ], "sources": [ { "db": "VULHUB", "id": "VHN-381401" }, { "db": "VULMON", "id": "CVE-2021-22927" }, { "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "db": "CNNVD", "id": "CNNVD-202107-1473" }, { "db": "NVD", "id": "CVE-2021-22927" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-381401" }, { "db": "VULMON", "id": "CVE-2021-22927" }, { "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "db": "CNNVD", "id": "CNNVD-202107-1473" }, { "db": "NVD", "id": "CVE-2021-22927" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-05T00:00:00", "db": "VULHUB", "id": "VHN-381401" }, { "date": "2022-05-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "date": "2021-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1473" }, { "date": "2021-08-05T21:15:11.643000", "db": "NVD", "id": "CVE-2021-22927" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-16T00:00:00", "db": "VULHUB", "id": "VHN-381401" }, { "date": "2022-05-19T08:10:00", "db": "JVNDB", "id": "JVNDB-2021-009767" }, { "date": "2021-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1473" }, { "date": "2021-08-16T20:14:39.867000", "db": "NVD", "id": "CVE-2021-22927" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1473" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix\u00a0ADC\u00a0 and \u00a0Gateway\u00a0 Session immobilization vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009767" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1473" } ], "trust": 0.6 } }
var-202112-0297
Vulnerability from variot
A unauthenticated denial of service vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 when configured as a VPN (Gateway) or AAA virtual server could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Citrix ADC Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0297", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-83.27" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-83.27" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-63.22" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.23" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-63.22" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "lte", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.23" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix application delivery controller firmware 12.1-63.22" }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix gateway plugin" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix application delivery controller firmware 11.1-65.23" }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix application delivery controller firmware 13.0-83.27" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "db": "NVD", "id": "CVE-2021-22955" } ] }, "cve": "CVE-2021-22955", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-22955", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-381429", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22955", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22955", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22955", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22955", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-970", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-381429", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-381429" }, { "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "db": "CNNVD", "id": "CNNVD-202111-970" }, { "db": "NVD", "id": "CVE-2021-22955" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A unauthenticated denial of service vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 when configured as a VPN (Gateway) or AAA virtual server could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Citrix ADC Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22955" }, { "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "db": "VULHUB", "id": "VHN-381429" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22955", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016060", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.3830", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-970", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381429", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381429" }, { "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "db": "CNNVD", "id": "CNNVD-202111-970" }, { "db": "NVD", "id": "CVE-2021-22955" } ] }, "id": "VAR-202112-0297", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-381429" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:48.748000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX330728", "trust": 0.8, "url": "https://support.citrix.com/article/CTX330728/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-edition-appliance-security-update" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016060" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381429" }, { "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "db": "NVD", "id": "CVE-2021-22955" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.citrix.com/article/ctx330728" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22955" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3830" } ], "sources": [ { "db": "VULHUB", "id": "VHN-381429" }, { "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "db": "CNNVD", "id": "CNNVD-202111-970" }, { "db": "NVD", "id": "CVE-2021-22955" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-381429" }, { "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "db": "CNNVD", "id": "CNNVD-202111-970" }, { "db": "NVD", "id": "CVE-2021-22955" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-381429" }, { "date": "2022-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "date": "2021-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-970" }, { "date": "2021-12-07T14:15:08.890000", "db": "NVD", "id": "CVE-2021-22955" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-381429" }, { "date": "2022-12-06T01:46:00", "db": "JVNDB", "id": "JVNDB-2021-016060" }, { "date": "2021-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-970" }, { "date": "2021-12-08T19:43:41.437000", "db": "NVD", "id": "CVE-2021-22955" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-970" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix\u00a0ADC\u00a0 Resource exhaustion vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016060" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-970" } ], "trust": 0.6 } }
var-202211-0882
Vulnerability from variot
User login brute force protection functionality bypass
. of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller A vulnerability exists in firmware that improperly limits excessive authentication attempts.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0882", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.21" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-33.47" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-33.47" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-88.12" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-88.12" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.289" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.21" }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "db": "NVD", "id": "CVE-2022-27516" } ] }, "cve": "CVE-2022-27516", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-27516", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "secure@citrix.com", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-27516", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-27516", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-27516", "trust": 1.0, "value": "CRITICAL" }, { "author": "secure@citrix.com", "id": "CVE-2022-27516", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-27516", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202211-2370", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "db": "CNNVD", "id": "CNNVD-202211-2370" }, { "db": "NVD", "id": "CVE-2022-27516" }, { "db": "NVD", "id": "CVE-2022-27516" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "User login brute force protection functionality bypass \n. of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller A vulnerability exists in firmware that improperly limits excessive authentication attempts.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-27516" }, { "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "db": "VULHUB", "id": "VHN-418150" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-27516", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020610", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2370", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418150", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418150" }, { "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "db": "CNNVD", "id": "CNNVD-202211-2370" }, { "db": "NVD", "id": "CVE-2022-27516" } ] }, "id": "VAR-202211-0882", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418150" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:42:17.021000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Citrix Gateway and Citrix ADC Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213778" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2370" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-307", "trust": 1.1 }, { "problemtype": "CWE-693", "trust": 1.0 }, { "problemtype": "Inappropriate limitation of excessive authentication attempts (CWE-307) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418150" }, { "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "db": "NVD", "id": "CVE-2022-27516" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://support.citrix.com/article/ctx463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27516" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-27516/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418150" }, { "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "db": "CNNVD", "id": "CNNVD-202211-2370" }, { "db": "NVD", "id": "CVE-2022-27516" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418150" }, { "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "db": "CNNVD", "id": "CNNVD-202211-2370" }, { "db": "NVD", "id": "CVE-2022-27516" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-08T00:00:00", "db": "VULHUB", "id": "VHN-418150" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "date": "2022-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2370" }, { "date": "2022-11-08T22:15:13.633000", "db": "NVD", "id": "CVE-2022-27516" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-418150" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020610" }, { "date": "2022-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2370" }, { "date": "2023-10-18T18:15:08.840000", "db": "NVD", "id": "CVE-2022-27516" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2370" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of Citrix Systems \u00a0Citrix\u00a0Gateway\u00a0 and \u00a0Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0 Firmware Improperly Limiting Excessive Authentication Attempts Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020610" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2370" } ], "trust": 0.6 } }
var-202207-2009
Vulnerability from variot
Unauthenticated redirection to a malicious website. of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller An open redirect vulnerability exists in firmware.Information may be obtained and information may be tampered with. Used for application security, overall visibility and availability. Prior to 86.17 and Citrix Gateway 13.0, Citrix ADC 12.1-65.15 and prior to Citrix Gateway 12.1, Citrix ADC 12.1-FIPS prior, Citrix ADC 12.1-NDcPP prior to 12.1-55.282
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-2009", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.15" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-86.17" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.15" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-24.38" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-24.38" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.282" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-86.17" }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "db": "NVD", "id": "CVE-2022-27509" } ] }, "cve": "CVE-2022-27509", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2022-27509", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-27509", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-27509", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-27509", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202207-2610", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "db": "CNNVD", "id": "CNNVD-202207-2610" }, { "db": "NVD", "id": "CVE-2022-27509" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unauthenticated redirection to a malicious website. of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller An open redirect vulnerability exists in firmware.Information may be obtained and information may be tampered with. Used for application security, overall visibility and availability. Prior to 86.17 and Citrix Gateway 13.0, Citrix ADC 12.1-65.15 and prior to Citrix Gateway 12.1, Citrix ADC 12.1-FIPS prior, Citrix ADC 12.1-NDcPP prior to 12.1-55.282", "sources": [ { "db": "NVD", "id": "CVE-2022-27509" }, { "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "db": "VULHUB", "id": "VHN-418143" }, { "db": "VULMON", "id": "CVE-2022-27509" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-27509", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014127", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-2610", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-418143", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-27509", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418143" }, { "db": "VULMON", "id": "CVE-2022-27509" }, { "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "db": "CNNVD", "id": "CNNVD-202207-2610" }, { "db": "NVD", "id": "CVE-2022-27509" } ] }, "id": "VAR-202207-2009", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418143" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:42:17.238000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Citrix ADC and Citrix Gateway Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203341" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2610" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-601", "trust": 1.1 }, { "problemtype": "Open redirect (CWE-601) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418143" }, { "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "db": "NVD", "id": "CVE-2022-27509" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://support.citrix.com/article/ctx457836" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27509" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-27509/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418143" }, { "db": "VULMON", "id": "CVE-2022-27509" }, { "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "db": "CNNVD", "id": "CNNVD-202207-2610" }, { "db": "NVD", "id": "CVE-2022-27509" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418143" }, { "db": "VULMON", "id": "CVE-2022-27509" }, { "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "db": "CNNVD", "id": "CNNVD-202207-2610" }, { "db": "NVD", "id": "CVE-2022-27509" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-28T00:00:00", "db": "VULHUB", "id": "VHN-418143" }, { "date": "2022-07-28T00:00:00", "db": "VULMON", "id": "CVE-2022-27509" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "date": "2022-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2610" }, { "date": "2022-07-28T14:15:08.380000", "db": "NVD", "id": "CVE-2022-27509" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-05T00:00:00", "db": "VULHUB", "id": "VHN-418143" }, { "date": "2022-07-28T00:00:00", "db": "VULMON", "id": "CVE-2022-27509" }, { "date": "2023-09-14T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-014127" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2610" }, { "date": "2022-08-05T15:01:51.680000", "db": "NVD", "id": "CVE-2022-27509" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2610" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of Citrix Systems \u00a0Citrix\u00a0Gateway\u00a0 and \u00a0Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0 Open redirect vulnerability in firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014127" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2610" } ], "trust": 0.6 } }
var-202003-0211
Vulnerability from variot
Citrix Gateway 11.1, 12.0, and 12.1 has an Inconsistent Interpretation of HTTP Requests. NOTE: Citrix disputes the reported behavior as not a security issue. Citrix ADC only caches HTTP/1.1 traffic for performance optimization. Citrix Systems Gateway (Citrix Systems NetScaler Gateway) is a set of secure remote access solutions from Citrix Systems. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. An attacker could exploit this vulnerability to bypass the caching system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0211", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "12.0" }, { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "12.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "db": "NVD", "id": "CVE-2020-10111" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002526" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Micha Borrmann", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-250" } ], "trust": 0.6 }, "cve": "CVE-2020-10111", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-10111", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-002526", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-162557", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-10111", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-002526", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-10111", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-002526", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202003-250", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-162557", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-162557" }, { "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "db": "CNNVD", "id": "CNNVD-202003-250" }, { "db": "NVD", "id": "CVE-2020-10111" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix Gateway 11.1, 12.0, and 12.1 has an Inconsistent Interpretation of HTTP Requests. NOTE: Citrix disputes the reported behavior as not a security issue. Citrix ADC only caches HTTP/1.1 traffic for performance optimization. Citrix Systems Gateway (Citrix Systems NetScaler Gateway) is a set of secure remote access solutions from Citrix Systems. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. An attacker could exploit this vulnerability to bypass the caching system", "sources": [ { "db": "NVD", "id": "CVE-2020-10111" }, { "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "db": "VULHUB", "id": "VHN-162557" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "PACKETSTORM", "id": "156661", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2020-10111", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-002526", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202003-250", "trust": 0.7 }, { "db": "NSFOCUS", "id": "46102", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-16679", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-162557", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-162557" }, { "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "db": "CNNVD", "id": "CNNVD-202003-250" }, { "db": "NVD", "id": "CVE-2020-10111" } ] }, "id": "VAR-202003-0211", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-162557" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:33:34.916000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Support Knowledge Center", "trust": 0.8, "url": "https://support.citrix.com/search#/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-444", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-162557" }, { "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "db": "NVD", "id": "CVE-2020-10111" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/156661/citrix-gateway-11.1-12.0-12.1-cache-bypass.html" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/mar/11" }, { "trust": 1.7, "url": "https://support.citrix.com/search" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10111" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10111" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/46102" } ], "sources": [ { "db": "VULHUB", "id": "VHN-162557" }, { "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "db": "CNNVD", "id": "CNNVD-202003-250" }, { "db": "NVD", "id": "CVE-2020-10111" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-162557" }, { "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "db": "CNNVD", "id": "CNNVD-202003-250" }, { "db": "NVD", "id": "CVE-2020-10111" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-06T00:00:00", "db": "VULHUB", "id": "VHN-162557" }, { "date": "2020-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "date": "2020-03-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-250" }, { "date": "2020-03-06T21:15:15.187000", "db": "NVD", "id": "CVE-2020-10111" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-18T00:00:00", "db": "VULHUB", "id": "VHN-162557" }, { "date": "2020-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002526" }, { "date": "2020-03-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-250" }, { "date": "2024-11-21T04:54:50.380000", "db": "NVD", "id": "CVE-2020-10111" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-250" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix Gateway In HTTP Request Smagling Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002526" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "environmental issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-250" } ], "trust": 0.6 } }
var-202009-1268
Vulnerability from variot
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b leads to an HTML Injection attack against the SSL VPN web portal. plural Citrix The product contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Many Citrix Systems products have injection vulnerabilities, which can be used by attackers to attack SSL VPN website portals
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-1268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.12" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-64.35" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-64.35" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.12" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-58.15" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-58.15" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "NVD", "id": "CVE-2020-8245" } ] }, "cve": "CVE-2020-8245", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-8245", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-186370", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2020-8245", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2020-8245", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-8245", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-8245", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202009-1054", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-186370", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186370" }, { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "CNNVD", "id": "CNNVD-202009-1054" }, { "db": "NVD", "id": "CVE-2020-8245" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b leads to an HTML Injection attack against the SSL VPN web portal. plural Citrix The product contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Many Citrix Systems products have injection vulnerabilities, which can be used by attackers to attack SSL VPN website portals", "sources": [ { "db": "NVD", "id": "CVE-2020-8245" }, { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "VULHUB", "id": "VHN-186370" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8245", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-011866", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202009-1054", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3198", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186370", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186370" }, { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "CNNVD", "id": "CNNVD-202009-1054" }, { "db": "NVD", "id": "CVE-2020-8245" } ] }, "id": "VAR-202009-1268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186370" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:59:01.288000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX281474", "trust": 0.8, "url": "https://support.citrix.com/article/CTX281474" }, { "title": "Citrix Systems Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=128761" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "CNNVD", "id": "CNNVD-202009-1054" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.1 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186370" }, { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "NVD", "id": "CVE-2020-8245" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.citrix.com/article/ctx281474" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8245" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3198/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186370" }, { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "CNNVD", "id": "CNNVD-202009-1054" }, { "db": "NVD", "id": "CVE-2020-8245" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186370" }, { "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "db": "CNNVD", "id": "CNNVD-202009-1054" }, { "db": "NVD", "id": "CVE-2020-8245" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-18T00:00:00", "db": "VULHUB", "id": "VHN-186370" }, { "date": "2021-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "date": "2020-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1054" }, { "date": "2020-09-18T21:15:13.170000", "db": "NVD", "id": "CVE-2020-8245" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-07T00:00:00", "db": "VULHUB", "id": "VHN-186370" }, { "date": "2021-04-19T02:17:00", "db": "JVNDB", "id": "JVNDB-2020-011866" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1054" }, { "date": "2024-11-21T05:38:34.877000", "db": "NVD", "id": "CVE-2020-8245" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1054" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Citrix\u00a0 Cross-site scripting vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011866" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1054" } ], "trust": 0.6 } }
var-202106-0490
Vulnerability from variot
Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance. plural Citrix The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state. Citrix Application Delivery Controller (ADC) is an application delivery controller. Nim, etc. are all products of the Nim (Nim) community. Nim is a statically typed programming language. There are resource management error vulnerabilities in many Citix products. This vulnerability originates from improper management of system resources by network systems or products. Attackers can use this vulnerability to cause denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0490", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-61.18" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.2.9a" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.20" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.2.3a" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.3.2" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.238" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-76.29" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1.2c" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-61.18" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.3" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.20" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.2" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "10.2" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-76.29" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix sdwan wan-op", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "NVD", "id": "CVE-2020-8299" } ] }, "cve": "CVE-2020-8299", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2020-8299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-186424", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-8299", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-8299", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-8299", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-8299", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202106-722", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-186424", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186424" }, { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "CNNVD", "id": "CNNVD-202106-722" }, { "db": "NVD", "id": "CVE-2020-8299" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance. plural Citrix The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state. Citrix Application Delivery Controller (ADC) is an application delivery controller. Nim, etc. are all products of the Nim (Nim) community. Nim is a statically typed programming language. There are resource management error vulnerabilities in many Citix products. This vulnerability originates from improper management of system resources by network systems or products. Attackers can use this vulnerability to cause denial of service", "sources": [ { "db": "NVD", "id": "CVE-2020-8299" }, { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "VULHUB", "id": "VHN-186424" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8299", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-008429", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.1992", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202106-722", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186424", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186424" }, { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "CNNVD", "id": "CNNVD-202106-722" }, { "db": "NVD", "id": "CVE-2020-8299" } ] }, "id": "VAR-202106-0490", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186424" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:32.791000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX297155", "trust": 0.8, "url": "https://support.citrix.com/article/CTX297155" }, { "title": "Citrix Systems NetScaler Gateway Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155265" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "CNNVD", "id": "CNNVD-202106-722" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186424" }, { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "NVD", "id": "CVE-2020-8299" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.citrix.com/article/ctx297155" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8299" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1992" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186424" }, { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "CNNVD", "id": "CNNVD-202106-722" }, { "db": "NVD", "id": "CVE-2020-8299" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186424" }, { "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "db": "CNNVD", "id": "CNNVD-202106-722" }, { "db": "NVD", "id": "CVE-2020-8299" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-16T00:00:00", "db": "VULHUB", "id": "VHN-186424" }, { "date": "2022-03-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "date": "2021-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-722" }, { "date": "2021-06-16T14:15:08.107000", "db": "NVD", "id": "CVE-2020-8299" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-24T00:00:00", "db": "VULHUB", "id": "VHN-186424" }, { "date": "2022-03-16T07:24:00", "db": "JVNDB", "id": "JVNDB-2021-008429" }, { "date": "2021-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-722" }, { "date": "2021-06-24T20:23:38.283000", "db": "NVD", "id": "CVE-2020-8299" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-722" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Citrix\u00a0 Resource depletion vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008429" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-722" } ], "trust": 0.6 } }
var-202211-0998
Vulnerability from variot
Remote desktop takeover via phishing
. of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller Firmware contains insufficient validation of data authenticity.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0998", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.21" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-33.47" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-33.41" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-88.12" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-88.12" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.289" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-65.21" }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "db": "NVD", "id": "CVE-2022-27513" } ] }, "cve": "CVE-2022-27513", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-27513", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "secure@citrix.com", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.6, "id": "CVE-2022-27513", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.6, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-27513", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-27513", "trust": 1.0, "value": "CRITICAL" }, { "author": "secure@citrix.com", "id": "CVE-2022-27513", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-27513", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202211-2371", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "db": "CNNVD", "id": "CNNVD-202211-2371" }, { "db": "NVD", "id": "CVE-2022-27513" }, { "db": "NVD", "id": "CVE-2022-27513" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Remote desktop takeover via phishing \n. of Citrix Systems Citrix Gateway and Citrix Application Delivery Controller Firmware contains insufficient validation of data authenticity.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-27513" }, { "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "db": "VULHUB", "id": "VHN-418147" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-27513", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020611", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2371", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418147", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418147" }, { "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "db": "CNNVD", "id": "CNNVD-202211-2371" }, { "db": "NVD", "id": "CVE-2022-27513" } ] }, "id": "VAR-202211-0998", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418147" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:43:39.210000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Citrix Gateway and Citrix ADC Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=213779" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2371" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418147" }, { "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "db": "NVD", "id": "CVE-2022-27513" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://support.citrix.com/article/ctx463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27513" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-27513/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418147" }, { "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "db": "CNNVD", "id": "CNNVD-202211-2371" }, { "db": "NVD", "id": "CVE-2022-27513" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418147" }, { "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "db": "CNNVD", "id": "CNNVD-202211-2371" }, { "db": "NVD", "id": "CVE-2022-27513" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-08T00:00:00", "db": "VULHUB", "id": "VHN-418147" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "date": "2022-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2371" }, { "date": "2022-11-08T22:15:13.313000", "db": "NVD", "id": "CVE-2022-27513" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-418147" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020611" }, { "date": "2022-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2371" }, { "date": "2023-10-18T18:15:08.757000", "db": "NVD", "id": "CVE-2022-27513" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2371" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "of Citrix Systems \u00a0Citrix\u00a0Gateway\u00a0 and \u00a0Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0 Insufficient validation of data authenticity in firmware vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020611" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2371" } ], "trust": 0.6 } }
var-202009-1270
Vulnerability from variot
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to escalation of privileges on the management interface. plural Citrix The product contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Several Citrix Systems products contain security vulnerabilities that could allow attackers to escalate privileges on the management interface
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-1270", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.12" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-64.35" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.2.1a" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.0.3f" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-58.15" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-64.35" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1.2a" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-58.15" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.0" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "10.2" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.2.7b" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.12" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.2" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix sdwan wan-op", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "NVD", "id": "CVE-2020-8247" } ] }, "cve": "CVE-2020-8247", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2020-8247", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-186372", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-8247", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-8247", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-8247", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-8247", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202009-1056", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-186372", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186372" }, { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "CNNVD", "id": "CNNVD-202009-1056" }, { "db": "NVD", "id": "CVE-2020-8247" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to escalation of privileges on the management interface. plural Citrix The product contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Several Citrix Systems products contain security vulnerabilities that could allow attackers to escalate privileges on the management interface", "sources": [ { "db": "NVD", "id": "CVE-2020-8247" }, { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "VULHUB", "id": "VHN-186372" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8247", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-011868", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202009-1056", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3198", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186372", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186372" }, { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "CNNVD", "id": "CNNVD-202009-1056" }, { "db": "NVD", "id": "CVE-2020-8247" } ] }, "id": "VAR-202009-1270", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186372" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:59:01.313000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX281474", "trust": 0.8, "url": "https://support.citrix.com/article/CTX281474" }, { "title": "Citrix Systems Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=128763" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "CNNVD", "id": "CNNVD-202009-1056" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186372" }, { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "NVD", "id": "CVE-2020-8247" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.citrix.com/article/ctx281474" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8247" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3198/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186372" }, { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "CNNVD", "id": "CNNVD-202009-1056" }, { "db": "NVD", "id": "CVE-2020-8247" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186372" }, { "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "db": "CNNVD", "id": "CNNVD-202009-1056" }, { "db": "NVD", "id": "CVE-2020-8247" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-18T00:00:00", "db": "VULHUB", "id": "VHN-186372" }, { "date": "2021-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "date": "2020-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1056" }, { "date": "2020-09-18T21:15:13.327000", "db": "NVD", "id": "CVE-2020-8247" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-07T00:00:00", "db": "VULHUB", "id": "VHN-186372" }, { "date": "2021-04-19T02:17:00", "db": "JVNDB", "id": "JVNDB-2020-011868" }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1056" }, { "date": "2024-11-21T05:38:35.100000", "db": "NVD", "id": "CVE-2020-8247" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1056" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Citrix\u00a0 Product permission management vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011868" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1056" } ], "trust": 0.6 } }
var-202003-0212
Vulnerability from variot
Citrix Gateway 11.1, 12.0, and 12.1 allows Cache Poisoning. NOTE: Citrix disputes this as not a vulnerability. By default, Citrix ADC only caches static content served under certain URL paths for Citrix Gateway usage. No dynamic content is served under these paths, which implies that those cached pages would not change based on parameter values. All other data traffic going through Citrix Gateway are NOT cached by default. Citrix Gateway To HTTP There is a vulnerability related to Request Smagling.Information may be obtained and tampered with. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0212", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "12.0" }, { "model": "gateway", "scope": "eq", "trust": 1.8, "vendor": "citrix", "version": "12.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "db": "NVD", "id": "CVE-2020-10112" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002527" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Micha Borrmann", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-252" } ], "trust": 0.6 }, "cve": "CVE-2020-10112", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-10112", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-002527", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-162558", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2020-10112", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2020-002527", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-10112", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-002527", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202003-252", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-162558", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-162558" }, { "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "db": "CNNVD", "id": "CNNVD-202003-252" }, { "db": "NVD", "id": "CVE-2020-10112" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix Gateway 11.1, 12.0, and 12.1 allows Cache Poisoning. NOTE: Citrix disputes this as not a vulnerability. By default, Citrix ADC only caches static content served under certain URL paths for Citrix Gateway usage. No dynamic content is served under these paths, which implies that those cached pages would not change based on parameter values. All other data traffic going through Citrix Gateway are NOT cached by default. Citrix Gateway To HTTP There is a vulnerability related to Request Smagling.Information may be obtained and tampered with. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location", "sources": [ { "db": "NVD", "id": "CVE-2020-10112" }, { "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "db": "VULHUB", "id": "VHN-162558" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-10112", "trust": 2.5 }, { "db": "PACKETSTORM", "id": "156660", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-002527", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202003-252", "trust": 0.7 }, { "db": "NSFOCUS", "id": "46104", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-16678", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-162558", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-162558" }, { "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "db": "CNNVD", "id": "CNNVD-202003-252" }, { "db": "NVD", "id": "CVE-2020-10112" } ] }, "id": "VAR-202003-0212", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-162558" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:55:16.835000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Support Knowledge Center", "trust": 0.8, "url": "https://support.citrix.com/search#/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002527" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-444", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-162558" }, { "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "db": "NVD", "id": "CVE-2020-10112" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/156660/citrix-gateway-11.1-12.0-12.1-cache-poisoning.html" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/mar/8" }, { "trust": 1.7, "url": "https://support.citrix.com/search" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10112" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10112" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/46104" } ], "sources": [ { "db": "VULHUB", "id": "VHN-162558" }, { "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "db": "CNNVD", "id": "CNNVD-202003-252" }, { "db": "NVD", "id": "CVE-2020-10112" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-162558" }, { "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "db": "CNNVD", "id": "CNNVD-202003-252" }, { "db": "NVD", "id": "CVE-2020-10112" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-06T00:00:00", "db": "VULHUB", "id": "VHN-162558" }, { "date": "2020-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "date": "2020-03-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-252" }, { "date": "2020-03-06T21:15:15.280000", "db": "NVD", "id": "CVE-2020-10112" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-18T00:00:00", "db": "VULHUB", "id": "VHN-162558" }, { "date": "2020-03-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002527" }, { "date": "2020-03-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-252" }, { "date": "2024-11-21T04:54:50.527000", "db": "NVD", "id": "CVE-2020-10112" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-252" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix Gateway In HTTP Request Smagling Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002527" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "environmental issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-252" } ], "trust": 0.6 } }
var-202205-1914
Vulnerability from variot
Authenticated denial of service. Citrix Application Delivery Controller and Citrix Gateway Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Both Citrix Gateway (Citrix Systems NetScaler Gateway) and Citrix ADC are products of Citrix Systems (Citrix). Citrix Gateway is a secure remote access solution. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. Citrix ADC is one of the most comprehensive application delivery and load balancing solutions. Used for application security, overall visibility and availability. The following products and versions are affected: Citrix ADC and Citrix Gateway 13.1 prior to 13.1-21.50, Citrix ADC and Citrix Gateway 13.0-85.19 prior to 13.0, Citrix ADC and Citrix Gateway 12.1 prior to 12.1-64.17, Citrix-ADC 12.1 FIPS 12.1-55.278 prior, Citrix ADC 12.1-NDcPP prior 12.1-55.278
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1914", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-85.19" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-64.17" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-85.19" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-21.50" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-64.17" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.278" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.1-21.50" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "NVD", "id": "CVE-2022-27507" } ] }, "cve": "CVE-2022-27507", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2022-27507", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-27507", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-27507", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-27507", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202205-4146", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "CNNVD", "id": "CNNVD-202205-4146" }, { "db": "NVD", "id": "CVE-2022-27507" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Authenticated denial of service. Citrix Application Delivery Controller and Citrix Gateway Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. Both Citrix Gateway (Citrix Systems NetScaler Gateway) and Citrix ADC are products of Citrix Systems (Citrix). Citrix Gateway is a secure remote access solution. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. Citrix ADC is one of the most comprehensive application delivery and load balancing solutions. Used for application security, overall visibility and availability. The following products and versions are affected: Citrix ADC and Citrix Gateway 13.1 prior to 13.1-21.50, Citrix ADC and Citrix Gateway 13.0-85.19 prior to 13.0, Citrix ADC and Citrix Gateway 12.1 prior to 12.1-64.17, Citrix-ADC 12.1 FIPS 12.1-55.278 prior, Citrix ADC 12.1-NDcPP prior 12.1-55.278", "sources": [ { "db": "NVD", "id": "CVE-2022-27507" }, { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "VULHUB", "id": "VHN-418141" }, { "db": "VULMON", "id": "CVE-2022-27507" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-27507", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-006658", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-4146", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.2571", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418141", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-27507", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418141" }, { "db": "VULMON", "id": "CVE-2022-27507" }, { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "CNNVD", "id": "CNNVD-202205-4146" }, { "db": "NVD", "id": "CVE-2022-27507" } ] }, "id": "VAR-202205-1914", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418141" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:31:11.187000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX457048", "trust": 0.8, "url": "https://support.citrix.com/article/CTX457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" }, { "title": "Multiple Citrix Systems Product resource management error vulnerability fixes", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=223463" }, { "title": "Citrix Security Bulletins: Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27507 and CVE-2022-27508", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=72c36bceaf4968fb4025839fb3ab9ded" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-27507" }, { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "CNNVD", "id": "CNNVD-202205-4146" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418141" }, { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "NVD", "id": "CVE-2022-27507" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://support.citrix.com/article/ctx457048/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227507-and-cve202227508" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-27507" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2571" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-27507/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://support.citrix.com/article/ctx457048" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418141" }, { "db": "VULMON", "id": "CVE-2022-27507" }, { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "CNNVD", "id": "CNNVD-202205-4146" }, { "db": "NVD", "id": "CVE-2022-27507" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418141" }, { "db": "VULMON", "id": "CVE-2022-27507" }, { "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "db": "CNNVD", "id": "CNNVD-202205-4146" }, { "db": "NVD", "id": "CVE-2022-27507" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-26T00:00:00", "db": "VULHUB", "id": "VHN-418141" }, { "date": "2023-01-26T00:00:00", "db": "VULMON", "id": "CVE-2022-27507" }, { "date": "2023-07-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "date": "2022-05-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-4146" }, { "date": "2023-01-26T21:15:33.080000", "db": "NVD", "id": "CVE-2022-27507" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-01T00:00:00", "db": "VULHUB", "id": "VHN-418141" }, { "date": "2023-01-27T00:00:00", "db": "VULMON", "id": "CVE-2022-27507" }, { "date": "2023-07-07T06:36:00", "db": "JVNDB", "id": "JVNDB-2022-006658" }, { "date": "2023-02-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-4146" }, { "date": "2023-02-01T20:38:16.680000", "db": "NVD", "id": "CVE-2022-27507" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-4146" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix\u00a0Application\u00a0Delivery\u00a0Controller\u00a0 and \u00a0Citrix\u00a0Gateway\u00a0 Resource exhaustion vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006658" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-4146" } ], "trust": 0.6 } }
var-202007-1175
Vulnerability from variot
Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users. are all products of Citrix Systems (Citrix Systems) in the United States. Citrix Application Delivery Controller is an application delivery controller. Citrix Systems Gateway (Citrix Systems NetScaler Gateway) is a secure remote access solution. Citrix System SDWAN WAN-OP is an SD-WAN (Virtual Software Defined Wide Area Network) appliance. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-1175", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-58.30" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.0-63.21" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.0" }, { "model": "gateway plug-in for linux", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "1.0.0.137" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "10.5" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-64.14" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.0" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.0" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.2.7" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-57.18" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-58.30" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "10.5" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.5-70.18" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1.1a" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "10.2" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.0-63.21" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.0.3d" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-64.14" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.5-70.18" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-57.18" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "gateway plug-in for linux", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "gateway", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "sdwan wan-op", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "NVD", "id": "CVE-2020-8195" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:application_delivery_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/a:citrix:gateway_plug-in_for_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:gateway_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:sd-wan_wanop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007580" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maarten Boone (@staatsgeheim), Donny Maasland (@donnymaasland), Ltd and Viktor Dragomiretskyy, Albert Shi of Univision Network (Shanghai) Co.,Laurent Geyer of Akamai, Muris Kurgas of Digital 14 (Xen1thLabs)", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-365" } ], "trust": 0.6 }, "cve": "CVE-2020-8195", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2020-8195", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-007580", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-186320", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-8195", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-007580", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-8195", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-007580", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202007-365", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-186320", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-8195", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186320" }, { "db": "VULMON", "id": "CVE-2020-8195" }, { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "CNNVD", "id": "CNNVD-202007-365" }, { "db": "NVD", "id": "CVE-2020-8195" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users. are all products of Citrix Systems (Citrix Systems) in the United States. Citrix Application Delivery Controller is an application delivery controller. Citrix Systems Gateway (Citrix Systems NetScaler Gateway) is a secure remote access solution. Citrix System SDWAN WAN-OP is an SD-WAN (Virtual Software Defined Wide Area Network) appliance. The vulnerability stems from the failure of the network system or product to properly validate the input data", "sources": [ { "db": "NVD", "id": "CVE-2020-8195" }, { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "VULHUB", "id": "VHN-186320" }, { "db": "VULMON", "id": "CVE-2020-8195" } ], "trust": 1.8 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-186320", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186320" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8195", "trust": 2.6 }, { "db": "PACKETSTORM", "id": "160047", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2020-007580", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.2310", "trust": 0.6 }, { "db": "NSFOCUS", "id": "48223", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202007-365", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-41191", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-186320", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-8195", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186320" }, { "db": "VULMON", "id": "CVE-2020-8195" }, { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "CNNVD", "id": "CNNVD-202007-365" }, { "db": "NVD", "id": "CVE-2020-8195" } ] }, "id": "VAR-202007-1175", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186320" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:35:29.937000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX276688", "trust": 0.8, "url": "https://support.citrix.com/article/CTX276688" }, { "title": "Multiple Citrix Systems Product input verification error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123536" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2020/07/09/citrix_bugs_proof_of_concept_exploits/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2020/07/08/citrix_eleven_patches/" }, { "title": "Citrix Security Bulletins: Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=9d4ed4236f0cd8feb68799f8037f447d" }, { "title": "Citrix Security Bulletins: Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=ad9a7bb846592c7191f2b16aa8f47742" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2020-8195 " }, { "title": "CVE-2020-8193-Citrix-Scanner", "trust": 0.1, "url": "https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner " }, { "title": "citrix_adc_netscaler_lfi", "trust": 0.1, "url": "https://github.com/Zeop-CyberSec/citrix_adc_netscaler_lfi " }, { "title": "", "trust": 0.1, "url": "https://github.com/ipcis/Citrix_ADC_Gateway_Check " }, { "title": "2020-Read-article", "trust": 0.1, "url": "https://github.com/EvilAnne/2020-Read-article " }, { "title": "content", "trust": 0.1, "url": "https://github.com/dnif/content " }, { "title": "nist-cve-search-tool", "trust": 0.1, "url": "https://github.com/stratosphereips/nist-cve-search-tool " }, { "title": "", "trust": 0.1, "url": "https://github.com/triw0lf/Security-Matters-22 " }, { "title": "supplier", "trust": 0.1, "url": "https://github.com/r0eXpeR/supplier " }, { "title": "SecBooks", "trust": 0.1, "url": "https://github.com/SexyBeast233/SecBooks " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/bug-nsa-china-backed-cyberattacks/160421/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8195" }, { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "CNNVD", "id": "CNNVD-202007-365" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 }, { "problemtype": "CWE-22", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186320" }, { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "NVD", "id": "CVE-2020-8195" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://packetstormsecurity.com/files/160047/citrix-adc-netscaler-local-file-inclusion.html" }, { "trust": 1.9, "url": "https://support.citrix.com/article/ctx276688" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8195" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8195" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/48223" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2310/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2020-8195" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/pr3r00t/cve-2020-8193-citrix-scanner" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186320" }, { "db": "VULMON", "id": "CVE-2020-8195" }, { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "CNNVD", "id": "CNNVD-202007-365" }, { "db": "NVD", "id": "CVE-2020-8195" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186320" }, { "db": "VULMON", "id": "CVE-2020-8195" }, { "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "db": "CNNVD", "id": "CNNVD-202007-365" }, { "db": "NVD", "id": "CVE-2020-8195" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-10T00:00:00", "db": "VULHUB", "id": "VHN-186320" }, { "date": "2020-07-10T00:00:00", "db": "VULMON", "id": "CVE-2020-8195" }, { "date": "2020-08-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "date": "2020-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-365" }, { "date": "2020-07-10T16:15:12.327000", "db": "NVD", "id": "CVE-2020-8195" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-186320" }, { "date": "2022-09-20T00:00:00", "db": "VULMON", "id": "CVE-2020-8195" }, { "date": "2020-08-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-007580" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-365" }, { "date": "2024-11-21T05:38:28.767000", "db": "NVD", "id": "CVE-2020-8195" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-365" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix ADC and Gateway Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-007580" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-365" } ], "trust": 0.6 } }
var-202112-0296
Vulnerability from variot
An uncontrolled resource consumption vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Citrix ADC Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0296", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "sd-wan", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.2.9c" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-83.27" }, { "model": "sd-wan", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.4.0" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-63.22" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.23" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-63.22" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.23" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "sd-wan", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.4.2" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-65.23" }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix sd-wan" }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix application delivery controller firmware 12.1-63.22" }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix gateway plugin" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix application delivery controller firmware 11.1-65.23" }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": "citrix application delivery controller firmware 13.0-83.27" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "db": "NVD", "id": "CVE-2021-22956" } ] }, "cve": "CVE-2021-22956", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2021-22956", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-381430", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22956", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22956", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22956", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22956", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202111-971", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-381430", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-381430" }, { "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "db": "CNNVD", "id": "CNNVD-202111-971" }, { "db": "NVD", "id": "CVE-2021-22956" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An uncontrolled resource consumption vulnerability exists in Citrix ADC \u003c13.0-83.27, \u003c12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Citrix ADC Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22956" }, { "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "db": "VULHUB", "id": "VHN-381430" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22956", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016059", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.3830", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-971", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381430", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381430" }, { "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "db": "CNNVD", "id": "CNNVD-202111-971" }, { "db": "NVD", "id": "CVE-2021-22956" } ] }, "id": "VAR-202112-0296", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-381430" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:37:48.723000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX330728", "trust": 0.8, "url": "https://support.citrix.com/article/CTX330728/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-edition-appliance-security-update" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016059" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381430" }, { "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "db": "NVD", "id": "CVE-2021-22956" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.citrix.com/article/ctx330728" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22956" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3830" } ], "sources": [ { "db": "VULHUB", "id": "VHN-381430" }, { "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "db": "CNNVD", "id": "CNNVD-202111-971" }, { "db": "NVD", "id": "CVE-2021-22956" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-381430" }, { "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "db": "CNNVD", "id": "CNNVD-202111-971" }, { "db": "NVD", "id": "CVE-2021-22956" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-381430" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "date": "2021-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-971" }, { "date": "2021-12-07T14:15:08.943000", "db": "NVD", "id": "CVE-2021-22956" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-381430" }, { "date": "2022-12-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-016059" }, { "date": "2021-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-971" }, { "date": "2021-12-08T19:01:17.300000", "db": "NVD", "id": "CVE-2021-22956" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-971" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix\u00a0ADC\u00a0 Resource exhaustion vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016059" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-971" } ], "trust": 0.6 } }
var-202009-1269
Vulnerability from variot
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to a denial of service attack originating from the management network. plural Citrix The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Many Citrix Systems products have resource management vulnerabilities, which originate from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-1269", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.12" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-64.35" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.2.1a" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.0.3f" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-58.15" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-64.35" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1.2a" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-58.15" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.0" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "10.2" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.2.7b" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.12" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.2" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix sdwan wan-op", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "NVD", "id": "CVE-2020-8246" } ] }, "cve": "CVE-2020-8246", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-8246", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-186371", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-8246", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-8246", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-8246", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-8246", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202009-1055", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-186371", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186371" }, { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "CNNVD", "id": "CNNVD-202009-1055" }, { "db": "NVD", "id": "CVE-2020-8246" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to a denial of service attack originating from the management network. plural Citrix The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Many Citrix Systems products have resource management vulnerabilities, which originate from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products", "sources": [ { "db": "NVD", "id": "CVE-2020-8246" }, { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "VULHUB", "id": "VHN-186371" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8246", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-011867", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202009-1055", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3198", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186371", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186371" }, { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "CNNVD", "id": "CNNVD-202009-1055" }, { "db": "NVD", "id": "CVE-2020-8246" } ] }, "id": "VAR-202009-1269", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186371" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:59:01.263000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX281474", "trust": 0.8, "url": "https://support.citrix.com/article/CTX281474" }, { "title": "Citrix Systems Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=128762" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "CNNVD", "id": "CNNVD-202009-1055" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186371" }, { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "NVD", "id": "CVE-2020-8246" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.citrix.com/article/ctx281474" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8246" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3198/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186371" }, { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "CNNVD", "id": "CNNVD-202009-1055" }, { "db": "NVD", "id": "CVE-2020-8246" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186371" }, { "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "db": "CNNVD", "id": "CNNVD-202009-1055" }, { "db": "NVD", "id": "CVE-2020-8246" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-18T00:00:00", "db": "VULHUB", "id": "VHN-186371" }, { "date": "2021-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "date": "2020-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1055" }, { "date": "2020-09-18T21:15:13.263000", "db": "NVD", "id": "CVE-2020-8246" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-07T00:00:00", "db": "VULHUB", "id": "VHN-186371" }, { "date": "2021-04-19T02:17:00", "db": "JVNDB", "id": "JVNDB-2020-011867" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-1055" }, { "date": "2024-11-21T05:38:34.983000", "db": "NVD", "id": "CVE-2020-8246" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1055" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Citrix\u00a0 Resource depletion vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-011867" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-1055" } ], "trust": 0.6 } }
var-202108-0265
Vulnerability from variot
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0265", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery management", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.25" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.42" }, { "model": "application delivery management", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.42" }, { "model": "gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.25" }, { "model": "citrix application delivery management", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "db": "NVD", "id": "CVE-2021-22920" } ] }, "cve": "CVE-2021-22920", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22920", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-381394", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-22920", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22920", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22920", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-22920", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202107-1475", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-381394", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-381394" }, { "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "db": "CNNVD", "id": "CNNVD-202107-1475" }, { "db": "NVD", "id": "CVE-2021-22920" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session", "sources": [ { "db": "NVD", "id": "CVE-2021-22920" }, { "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "db": "VULHUB", "id": "VHN-381394" }, { "db": "VULMON", "id": "CVE-2021-22920" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22920", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009626", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.2434", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202107-1475", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381394", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22920", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381394" }, { "db": "VULMON", "id": "CVE-2021-22920" }, { "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "db": "CNNVD", "id": "CNNVD-202107-1475" }, { "db": "NVD", "id": "CVE-2021-22920" } ] }, "id": "VAR-202108-0265", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-381394" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:26.350000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX319135", "trust": 0.8, "url": "https://support.citrix.com/article/CTX319135" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009626" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "db": "NVD", "id": "CVE-2021-22920" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://support.citrix.com/article/ctx319135" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22920" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2434" } ], "sources": [ { "db": "VULHUB", "id": "VHN-381394" }, { "db": "VULMON", "id": "CVE-2021-22920" }, { "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "db": "CNNVD", "id": "CNNVD-202107-1475" }, { "db": "NVD", "id": "CVE-2021-22920" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-381394" }, { "db": "VULMON", "id": "CVE-2021-22920" }, { "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "db": "CNNVD", "id": "CNNVD-202107-1475" }, { "db": "NVD", "id": "CVE-2021-22920" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-05T00:00:00", "db": "VULHUB", "id": "VHN-381394" }, { "date": "2022-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "date": "2021-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1475" }, { "date": "2021-08-05T21:15:11.083000", "db": "NVD", "id": "CVE-2021-22920" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-13T00:00:00", "db": "VULHUB", "id": "VHN-381394" }, { "date": "2022-05-13T09:24:00", "db": "JVNDB", "id": "JVNDB-2021-009626" }, { "date": "2021-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1475" }, { "date": "2021-08-13T14:26:49.893000", "db": "NVD", "id": "CVE-2021-22920" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1475" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Citrix\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009626" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1475" } ], "trust": 0.6 } }
var-202106-0491
Vulnerability from variot
Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0491", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.41" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.20" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.41" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.20" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.23" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.238" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.23" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "NVD", "id": "CVE-2020-8300" } ] }, "cve": "CVE-2020-8300", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-8300", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-186425", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-8300", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-8300", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-8300", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-8300", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202106-723", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-186425", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-8300", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186425" }, { "db": "VULMON", "id": "CVE-2020-8300" }, { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "CNNVD", "id": "CNNVD-202106-723" }, { "db": "NVD", "id": "CVE-2020-8300" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible", "sources": [ { "db": "NVD", "id": "CVE-2020-8300" }, { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "VULHUB", "id": "VHN-186425" }, { "db": "VULMON", "id": "CVE-2020-8300" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8300", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-008430", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.1992", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202106-723", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186425", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-8300", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186425" }, { "db": "VULMON", "id": "CVE-2020-8300" }, { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "CNNVD", "id": "CNNVD-202106-723" }, { "db": "NVD", "id": "CVE-2020-8300" } ] }, "id": "VAR-202106-0491", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186425" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:23:32.817000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX297155", "trust": 0.8, "url": "https://support.citrix.com/article/CTX297155" }, { "title": "Citrix Application Delivery Controller Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155266" }, { "title": "Citrix Security Bulletins: Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Edition appliance Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=f961c982d779637a2fd5fc081b568c36" }, { "title": "https://github.com/stuartcarroll/CitrixADC-CVE-2020-8300", "trust": 0.1, "url": "https://github.com/stuartcarroll/CitrixADC-CVE-2020-8300 " }, { "title": "PoC in GitHub", "trust": 0.1, "url": "https://github.com/soosmile/POC " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8300" }, { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "CNNVD", "id": "CNNVD-202106-723" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 1.0 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186425" }, { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "NVD", "id": "CVE-2020-8300" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://support.citrix.com/article/ctx297155" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8300" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1992" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/stuartcarroll/citrixadc-cve-2020-8300" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186425" }, { "db": "VULMON", "id": "CVE-2020-8300" }, { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "CNNVD", "id": "CNNVD-202106-723" }, { "db": "NVD", "id": "CVE-2020-8300" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186425" }, { "db": "VULMON", "id": "CVE-2020-8300" }, { "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "db": "CNNVD", "id": "CNNVD-202106-723" }, { "db": "NVD", "id": "CVE-2020-8300" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-16T00:00:00", "db": "VULHUB", "id": "VHN-186425" }, { "date": "2021-06-16T00:00:00", "db": "VULMON", "id": "CVE-2020-8300" }, { "date": "2022-03-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "date": "2021-06-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-723" }, { "date": "2021-06-16T14:15:08.440000", "db": "NVD", "id": "CVE-2020-8300" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-186425" }, { "date": "2022-09-20T00:00:00", "db": "VULMON", "id": "CVE-2020-8300" }, { "date": "2022-03-16T07:24:00", "db": "JVNDB", "id": "JVNDB-2021-008430" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-723" }, { "date": "2022-09-20T17:23:30.603000", "db": "NVD", "id": "CVE-2020-8300" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-723" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Citrix\u00a0 Product permission management vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-008430" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-723" } ], "trust": 0.6 } }
var-202007-1457
Vulnerability from variot
In certain Citrix products, information disclosure can be achieved by an authenticated VPN user when there is a configured SSL VPN endpoint. This affects Citrix ADC and Citrix Gateway 13.0-58.30 and later releases before the CTX276688 update. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Citrix Systems Gateway is a secure remote access solution. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-1457", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-58.30" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-58.30" }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway \u30d7\u30e9\u30b0\u30a4\u30f3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "db": "NVD", "id": "CVE-2019-18177" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maarten Boone (@staatsgeheim), Donny Maasland (@donnymaasland), Ltd and Viktor Dragomiretskyy, Albert Shi of Univision Network (Shanghai) Co.,Laurent Geyer of Akamai, Muris Kurgas of Digital 14 (Xen1thLabs)", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-368" } ], "trust": 0.6 }, "cve": "CVE-2019-18177", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-18177", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-18177", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-18177", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-18177", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202007-368", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "db": "CNNVD", "id": "CNNVD-202007-368" }, { "db": "NVD", "id": "CVE-2019-18177" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In certain Citrix products, information disclosure can be achieved by an authenticated VPN user when there is a configured SSL VPN endpoint. This affects Citrix ADC and Citrix Gateway 13.0-58.30 and later releases before the CTX276688 update. Citrix Application Delivery Controller is an application delivery controller. The product has features such as application delivery control and load balancing. Citrix Systems Gateway is a secure remote access solution. The product provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components", "sources": [ { "db": "NVD", "id": "CVE-2019-18177" }, { "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "db": "VULHUB", "id": "VHN-150497" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-18177", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2020-017552", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202007-368", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.2310", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-150497", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-150497" }, { "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "db": "CNNVD", "id": "CNNVD-202007-368" }, { "db": "NVD", "id": "CVE-2019-18177" } ] }, "id": "VAR-202007-1457", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-150497" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:44:03.214000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX276688", "trust": 0.8, "url": "https://support.citrix.com/article/CTX276688/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-appliance-security-update" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-017552" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "db": "NVD", "id": "CVE-2019-18177" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.citrix.com/article/ctx276688/citrix-application-delivery-controller-citrix-gateway-and-citrix-sdwan-wanop-appliance-security-update" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18177" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2019-18177/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2310/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-150497" }, { "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "db": "CNNVD", "id": "CNNVD-202007-368" }, { "db": "NVD", "id": "CVE-2019-18177" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-150497" }, { "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "db": "CNNVD", "id": "CNNVD-202007-368" }, { "db": "NVD", "id": "CVE-2019-18177" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-26T00:00:00", "db": "VULHUB", "id": "VHN-150497" }, { "date": "2023-03-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "date": "2020-07-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-368" }, { "date": "2022-12-26T21:15:10.380000", "db": "NVD", "id": "CVE-2019-18177" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-05T00:00:00", "db": "VULHUB", "id": "VHN-150497" }, { "date": "2023-03-17T07:04:00", "db": "JVNDB", "id": "JVNDB-2020-017552" }, { "date": "2023-01-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-368" }, { "date": "2023-01-05T18:38:52.167000", "db": "NVD", "id": "CVE-2019-18177" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-368" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix\u00a0ADC\u00a0 and \u00a0Citrix\u00a0Gateway\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-017552" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-368" } ], "trust": 0.6 } }
var-202108-0264
Vulnerability from variot
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0264", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.2.3.b" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.45" }, { "model": "netscaler gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.27" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.4.0.a" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-55.238" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "10.2.9.b" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.4" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.22" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "13.0-82.45" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.3" }, { "model": "sd-wan wanop", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.3.2.a" }, { "model": "application delivery controller", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "12.1-62.27" }, { "model": "gateway", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "11.2" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "12.1" }, { "model": "sd-wan wanop", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "10.2" }, { "model": "application delivery controller", "scope": "gte", "trust": 1.0, "vendor": "citrix", "version": "13.0" }, { "model": "netscaler gateway", "scope": "lt", "trust": 1.0, "vendor": "citrix", "version": "11.1-65.22" }, { "model": "citrix sdwan wan-op", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix application delivery controller", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "citrix gateway", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30c8\u30ea\u30c3\u30af\u30b9 \u30b7\u30b9\u30c6\u30e0\u30ba", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "db": "NVD", "id": "CVE-2021-22919" } ] }, "cve": "CVE-2021-22919", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22919", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-381393", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22919", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22919", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22919", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-22919", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202107-1476", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-381393", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-381393" }, { "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "db": "CNNVD", "id": "CNNVD-202107-1476" }, { "db": "NVD", "id": "CVE-2021-22919" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed", "sources": [ { "db": "NVD", "id": "CVE-2021-22919" }, { "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "db": "VULHUB", "id": "VHN-381393" }, { "db": "VULMON", "id": "CVE-2021-22919" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22919", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009766", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2021.2434", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202107-1476", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-381393", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22919", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381393" }, { "db": "VULMON", "id": "CVE-2021-22919" }, { "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "db": "CNNVD", "id": "CNNVD-202107-1476" }, { "db": "NVD", "id": "CVE-2021-22919" } ] }, "id": "VAR-202108-0264", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-381393" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:43:26.381000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX319135", "trust": 0.8, "url": "https://support.citrix.com/article/CTX319135" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009766" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-381393" }, { "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "db": "NVD", "id": "CVE-2021-22919" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://support.citrix.com/article/ctx319135" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22919" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2434" } ], "sources": [ { "db": "VULHUB", "id": "VHN-381393" }, { "db": "VULMON", "id": "CVE-2021-22919" }, { "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "db": "CNNVD", "id": "CNNVD-202107-1476" }, { "db": "NVD", "id": "CVE-2021-22919" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-381393" }, { "db": "VULMON", "id": "CVE-2021-22919" }, { "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "db": "CNNVD", "id": "CNNVD-202107-1476" }, { "db": "NVD", "id": "CVE-2021-22919" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-05T00:00:00", "db": "VULHUB", "id": "VHN-381393" }, { "date": "2022-05-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "date": "2021-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1476" }, { "date": "2021-08-05T21:15:10.997000", "db": "NVD", "id": "CVE-2021-22919" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-16T00:00:00", "db": "VULHUB", "id": "VHN-381393" }, { "date": "2022-05-19T08:10:00", "db": "JVNDB", "id": "JVNDB-2021-009766" }, { "date": "2021-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1476" }, { "date": "2021-08-16T16:54:35.763000", "db": "NVD", "id": "CVE-2021-22919" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1476" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Citrix\u00a0 Product vulnerabilities related to resource allocation without restrictions or throttling", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009766" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1476" } ], "trust": 0.6 } }