9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.975 High
EPSS
Percentile
100.0%
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
Recent assessments:
kevthehermit at February 22, 2020 12:29am UTC reported:
AWS had pre built AMIs for these appliances built and supplied to the market place by Citrix.
At the time of release and for several weeks afterwards, they were still available in their default vulnerable state. Whilst AWS have removed the vulnerable images any AWS account that subscribed to a specific AMI will still have the default vulnerable version.
If you use this kind of setup it is important to remove any old AMIs and replace them, do not assume that patches will be applied to exising AMIs
zeroSteiner at January 02, 2020 3:42pm UTC reported:
AWS had pre built AMIs for these appliances built and supplied to the market place by Citrix.
At the time of release and for several weeks afterwards, they were still available in their default vulnerable state. Whilst AWS have removed the vulnerable images any AWS account that subscribed to a specific AMI will still have the default vulnerable version.
If you use this kind of setup it is important to remove any old AMIs and replace them, do not assume that patches will be applied to exising AMIs
dmelcher5151 at April 16, 2020 12:56am UTC reported:
AWS had pre built AMIs for these appliances built and supplied to the market place by Citrix.
At the time of release and for several weeks afterwards, they were still available in their default vulnerable state. Whilst AWS have removed the vulnerable images any AWS account that subscribed to a specific AMI will still have the default vulnerable version.
If you use this kind of setup it is important to remove any old AMIs and replace them, do not assume that patches will be applied to exising AMIs
bcook-r7 at January 11, 2020 7:23pm UTC reported:
AWS had pre built AMIs for these appliances built and supplied to the market place by Citrix.
At the time of release and for several weeks afterwards, they were still available in their default vulnerable state. Whilst AWS have removed the vulnerable images any AWS account that subscribed to a specific AMI will still have the default vulnerable version.
If you use this kind of setup it is important to remove any old AMIs and replace them, do not assume that patches will be applied to exising AMIs
hrbrmstr at May 12, 2020 7:56pm UTC reported:
AWS had pre built AMIs for these appliances built and supplied to the market place by Citrix.
At the time of release and for several weeks afterwards, they were still available in their default vulnerable state. Whilst AWS have removed the vulnerable images any AWS account that subscribed to a specific AMI will still have the default vulnerable version.
If you use this kind of setup it is important to remove any old AMIs and replace them, do not assume that patches will be applied to exising AMIs
gwillcox-r7 at October 20, 2020 5:51pm UTC reported:
AWS had pre built AMIs for these appliances built and supplied to the market place by Citrix.
At the time of release and for several weeks afterwards, they were still available in their default vulnerable state. Whilst AWS have removed the vulnerable images any AWS account that subscribed to a specific AMI will still have the default vulnerable version.
If you use this kind of setup it is important to remove any old AMIs and replace them, do not assume that patches will be applied to exising AMIs
Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 5
packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html
packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html
packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html
packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html
packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html
badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781
forms.gle/eDf3DXZAv96oosfj6
support.citrix.com/article/CTX267027
twitter.com/bad_packets/status/1215431625766424576
us-cert.cisa.gov/ncas/alerts/aa20-259a
www.kb.cert.org/vuls/id/619785
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.975 High
EPSS
Percentile
100.0%