Lucene search

K
citrixCitrixCTX247737
HistoryNov 09, 2020 - 9:09 a.m.

Citrix SD-WAN Center Security Updates

2020-11-0909:09:01
support.citrix.com
16
citrix sd-wan center
netscaler sd-wan center
command injection
cross-site scripting
vulnerabilities
upgrade
security update
management console
access restriction

EPSS

0.89

Percentile

98.7%

<section>
<div><div>
<div>
<h2> Description of Problem</h2>
<div>
<div>
<div>
<p>A command injection vulnerability has been identified in the management console of Citrix SD-WAN Center and NetScaler SD-WAN Center. This vulnerability could allow an unauthenticated attacker with access to the management console to compromise the host. A low severity cross-site scripting (XSS) vulnerability has been identified in the management console of Citrix SD-WAN Center and NetScaler SD-WAN Center. This vulnerability if exploited by an attacker, could potentially be used to execute malicious client-side script in the browser of a user then the script may be able to gain access to potentially sensitive information. The vulnerabilities have been assigned the following CVE numbers.</p>
<p>CVE-2019-10883: (Critical) Command Injection in Citrix SD-WAN Center 10.2.x before 10.2.1 and NetScaler SD-WAN Center 10.0.x before 10.0.7.</p>
<p>CVE-2019-11345: (Low) Cross-Site Scripting in Citrix SD-WAN Center 10.2.x before 10.2.1 and NetScaler SD-WAN Center 10.0.x before 10.0.7.</p>
<p>Affected Versions:</p>
<ul>
<li>All versions of NetScaler SD-WAN Center 9.x *</li>
<li>All versions of NetScaler SD-WAN Center 10.0.x earlier than 10.0.7</li>
<li>All versions of Citrix SD-WAN Center 10.1.x </li>
<li>All versions of Citrix SD-WAN Center 10.2.x earlier than 10.2.1</li>
</ul>
<p>
Upgrade to 10.0.7 or 10.2.1 for security update</p>
</div>
</div>
</div>
</div>
<div>
<h2> Mitigating Factors</h2>
<div>
<div>
<div>
<p>In order to protect against this vulnerability and web application related issues, Citrix recommends access to the management console be restricted. In situations where customers have deployed their management console in line with industry best practice, network access to this interface should already be restricted.</p>
<p>Security Best Practices:</p>
<p>10.x - <a href=ā€œhttps://docs.citrix.com/en-us/netscaler-sd-wan/10/best-practices/security-best-practices.htmlā€>https://docs.citrix.com/en-us/netscaler-sd-wan/10/best-practices/security-best-practices.html</a> </p>
</div>
</div>
</div>
</div>
<div>
<h2> What Customers Should Do</h2>
<div>
<div>
<div>
<p>This vulnerability has been addressed in the following software versions: </p>
<p>ā€¢ NetScaler SD-WAN Center 10.0.7</p>
<p>ā€¢ Citrix SD-WAN Center 10.2.1</p>
<p>Citrix strongly recommends that customers using vulnerable software update their management console to the new version or later as soon as possible.</p>
<p>If you are using a version of SD-WAN that is no longer supported, you should upgrade to the new version of the product that includes the security update.</p>
<p>The new software versions will be available on the Citrix website. Information on the available versions can be found at the following location:</p>
<p> <a href=ā€œhttps://www.citrix.com/downloads/netscaler-sd-wan/ā€>https://www.citrix.com/downloads/netscaler-sd-wan/</a></p>
<p>In line with general best practice, Citrix also recommends that customers limit access to the management console of the Citrix SD-WAN Center / NetScaler SD-WAN Center to trusted network traffic only.</p>
</div>
</div>
</div>
</div>
<div>
<h2> Acknowledgements</h2>
<div>
<div>
<div>
<p>Citrix thanks Tenable, Inc. (CVE-2019-10883) and Vasile Revnic (CVE-2019-11345) for working with us to protect Citrix customers.</p>
</div>
</div>
</div>
</div>
<div>
<h2> What Citrix Is Doing</h2>
<div>
<div>
<div>
<div>
<div>
<p>Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at <u> <a href=ā€œhttp://support.citrix.com/ā€>http://support.citrix.com/</a></u>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<h2> Obtaining Support on This Issue</h2>
<div>
<div>
<div>
<div>
<div>
<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=ā€œhttps://www.citrix.com/support/open-a-support-case.htmlā€>https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<h2> Reporting Security Vulnerabilities</h2>
<div>
<div>
<div>
<div>
<div>
<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 ā€“ <a href=ā€œhttp://support.citrix.com/article/CTX081743ā€>Reporting Security Issues to Citrix</a></p>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<h2> Changelog</h2>
<div>
<div>
<div>
<table width=ā€œ100%ā€>
<tbody>
<tr>
<td colspan=ā€œ1ā€ rowspan=ā€œ1ā€>Date </td>
<td colspan=ā€œ1ā€ rowspan=ā€œ1ā€>Change</td>
</tr>
<tr>
<td colspan=ā€œ1ā€ rowspan=ā€œ1ā€>10th April 2019</td>
<td colspan=ā€œ1ā€ rowspan=ā€œ1ā€>Initial publishing</td>
</tr>
<tr>
<td colspan=ā€œ1ā€ rowspan=ā€œ1ā€>23rd April 2019</td>
<td colspan=ā€œ1ā€ rowspan=ā€œ1ā€>Added CVE-2019-11345</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</div>
</div></div>
</section>

EPSS

0.89

Percentile

98.7%