9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.014 Low
EPSS
Percentile
86.1%
A number of vulnerabilities have been found in Citrix Hypervisor (formerly Citrix XenServer) that allow the host to be compromised by:
i. Privileged code in a guest VM that has been assigned a PCI passthrough device
ii. Privileged code in a PV guest VM
iii. Unprivileged code in a 32-bit PV guest VM
These vulnerabilities have the following identifiers:
ā¢ CVE-2019-18420
ā¢ CVE-2019-18421
ā¢ CVE-2019-18424
ā¢ CVE-2019-18425
These issues affect all currently supported versions of Citrix Hypervisor up to and including Citrix Hypervisor 8.0.
Customers running only HVM workloads and not making use of PCI passthrough functionality are not affected by these issues. Note that all Microsoft Windows VMs run as HVM VMs.
Hotfixes have been released to address these issues. Citrix recommends that affected customers install these hotfixes as their patching schedules allow. The hotfixes can be downloaded from the following locations:
Citrix Hypervisor 8.0:
CTX262555 - <https://support.citrix.com/article/CTX262555>
CTX258428 - [https://support.citrix.com/article/CTX258428](< https://support.citrix.com/article/CTX258428>)
Citrix XenServer 7.6:
CTX262554 - <https://support.citrix.com/article/CTX262554>
CTX258425 - <https://support.citrix.com/article/CTX258425>
Citrix XenServer 7.1 LTSR CU2:
CTX262553 - <https://support.citrix.com/article/CTX262553>
CTX258424 - <https://support.citrix.com/article/CTX258424>
Citrix XenServer 7.0:
CTX258417 - <https://support.citrix.com/article/CTX258417>
CTX258423 - <https://support.citrix.com/article/CTX258423>
Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at _ <http://support.citrix.com/>_.
If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at _ <https://www.citrix.com/support/open-a-support-case.html>_.
Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 ā Reporting Security Issues to Citrix
Date | Change |
---|---|
31st October 2019 | Initial publication |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.014 Low
EPSS
Percentile
86.1%