9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
<section>
<div><div>
<div>
<h2> Description of Problem</h2>
<div>
<div>
<div>
<p>A number of security issues have been identified within Citrix XenServer 7.2 which could, if exploited, allow a malicious man-in-the-middle (MiTM) attacker on the management network to decrypt management traffic. Collectively, this has been rated as a medium severity vulnerability; the following issues have been remediated:</p>
<ul>
<li>CVE-2016-2107</li>
<li>CVE-2016-2108</li>
</ul>
</div>
</div>
</div>
<hr />
</div>
<div>
<h2> Mitigating Factors</h2>
<div>
<div>
<div>
<p>Customers who have configured their systems with an isolated management network in accordance with Citrix recommendations have already significantly mitigated these issues.</p>
</div>
</div>
</div>
<hr />
</div>
<div>
<h2> What Customers Should Do</h2>
<div>
<div>
<div>
<p>A hotfix has been released to address these issues. Citrix recommends that affected customers install these hotfixes as soon as their patching schedule permits. The hotfix can be downloaded from the following location:</p>
<p> <br /> Citrix XenServer 7.2: CTX233880 - <a href=“https://support.citrix.com/article/CTX233880”>https://support.citrix.com/article/CTX233880</a></p>
</div>
</div>
</div>
<hr />
</div>
<div>
<h2> What Citrix Is Doing</h2>
<div>
<div>
<div>
<div>
<div>
<p>Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at <u> <a href=“http://support.citrix.com/”>http://support.citrix.com/</a></u>.</p>
</div>
</div>
</div>
</div>
</div>
<hr />
</div>
<div>
<h2> Obtaining Support on This Issue</h2>
<div>
<div>
<div>
<div>
<div>
<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=“https://www.citrix.com/support/open-a-support-case.html”>https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>
</div>
</div>
</div>
</div>
</div>
<hr />
</div>
<div>
<h2> Reporting Security Vulnerabilities</h2>
<div>
<div>
<div>
<div>
<div>
<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – <a href=“http://support.citrix.com/article/CTX081743”>Reporting Security Issues to Citrix</a></p>
</div>
</div>
</div>
</div>
</div>
<hr />
</div>
<div>
<h2> Changelog</h2>
<div>
<div>
<div>
<table border=“1” width=“100%”>
<tbody>
<tr>
<td>Date </td>
<td>Change</td>
</tr>
<tr>
<td>29th March 2018</td>
<td>Initial Publication</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
<hr />
</div>
</div></div>
</section>
CPE | Name | Operator | Version |
---|---|---|---|
citrix xenserver | eq | 7.2 |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C