Lucene search

K
citrixCitrixCTX256918
HistorySep 11, 2019 - 4:00 a.m.

Citrix SD-WAN Security Update

2019-09-1104:00:00
support.citrix.com
42

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.974 High

EPSS

Percentile

99.9%

Description of Problem

Multiple denial of service vulnerabilities have been identified in the Citrix SD-WAN Appliance and Citrix SD-WAN Center Management Console. These vulnerabilities could permit a remote attacker to cause a denial of service by causing a host crash or by causing reduced service capacity due to resource exhaustion. The vulnerabilities have been assigned the following CVE numbers.

  • CVE-2019-11477: SACK Panic
  • CVE-2019-11478: SACK Slowness or Excess Resource Usage
  • CVE-2019-11479: Excess Resource Consumption Due to Low MSS Values

Mitigating Factors

In order to protect against these vulnerabilities and web application related issues, Citrix recommends access to the management console be restricted. In situations where customers have deployed their management console in line with industry best practice, network access to this interface should already be restricted.

Security Best Practices:

10.x - <https://docs.citrix.com/en-us/netscaler-sd-wan/10/best-practices/security-best-practices.html&gt;

What Customers Should Do

These vulnerabilities have been addressed in the following software versions:

ā€¢ NetScaler SD-WAN 10.0.8

ā€¢ Citrix SD-WAN 10.2.4

ā€¢ Citrix SD-WAN 11.0.1

Citrix recommends that customers using vulnerable software upgrade their management console to the new version or later as soon as possible.

Customers using versions of the product that will not contain a fix (i.e. 9.3.x) are advised to consider upgrading to a version that does contain the fix (i.e. 11.0.1)

The new software versions will be available on the Citrix website. Information on the available versions can be found at the following location:

<https://www.citrix.com/downloads/netscaler-sd-wan/&gt;

In line with general best practice, Citrix also recommends that customers limit access to the management console of the Citrix SD-WAN Appliance and Citrix SD-WAN Center Management Console to trusted network traffic only.

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at _ <http://support.citrix.com/&gt;_.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at _ <https://www.citrix.com/support/open-a-support-case.html&gt;_.

Reporting Security Vulnerabilities

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 ā€“ Reporting Security Issues to Citrix

Changelog

Date Change
11th September 2019 Initial Publication

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.974 High

EPSS

Percentile

99.9%