Lucene search

K
attackerkbAttackerKBAKB:EF56F4A3-B95C-4CA0-9E19-BA58E1295785
HistoryJul 10, 2020 - 12:00 a.m.

CVE-2020-8193

2020-07-1000:00:00
attackerkb.com
17

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.935 High

EPSS

Percentile

98.8%

Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.

Recent assessments:

mekhalleh at July 12, 2020 6:17pm UTC reported:

Full details are here : <https://dmaasland.github.io/posts/citrix.html&gt;

Public reporting on July 8th, 2020 by Donny Maasland discussed how the vulnerability could be exploited.

As of July 10th, RIFT has confirmed that this vulnerability can be used to extract valid VPN sessions from a vulnerable instance (cf. <https://research.nccgroup.com/2020/07/10/rift-citrix-adc-vulnerabilities-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-intelligence/amp/&gt;).

I write quicly a metasploit auxilary scanner and tested on netscaler 12.1 build 57.18 (<https://github.com/Zeop-CyberSec/citrix_adc_netscaler_lfi&gt;)

gwillcox-r7 at October 20, 2020 5:52pm UTC reported:

Full details are here : <https://dmaasland.github.io/posts/citrix.html&gt;

Public reporting on July 8th, 2020 by Donny Maasland discussed how the vulnerability could be exploited.

As of July 10th, RIFT has confirmed that this vulnerability can be used to extract valid VPN sessions from a vulnerable instance (cf. <https://research.nccgroup.com/2020/07/10/rift-citrix-adc-vulnerabilities-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-intelligence/amp/&gt;).

I write quicly a metasploit auxilary scanner and tested on netscaler 12.1 build 57.18 (<https://github.com/Zeop-CyberSec/citrix_adc_netscaler_lfi&gt;)

Assessed Attacker Value: 3
Assessed Attacker Value: 3Assessed Attacker Value: 5

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.935 High

EPSS

Percentile

98.8%