7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
16.1%
Several security issues have been identified in Citrix Hypervisor (formerly Citrix XenServer) that may allow:
These issues have the following identifiers:
These issues affect all currently supported versions of Citrix Hypervisor up to and including Citrix Hypervisor 8.2 LTSR.
Citrix has released hotfixes to address these issues. Citrix recommends that affected customers install these hotfixes as their patching schedule allows. The hotfixes can be downloaded from the following locations:
Citrix Hypervisor 8.2 LTSR: CTX283510 – <https://support.citrix.com/article/CTX283510> and CTX283516 – <https://support.citrix.com/article/CTX283516>
Citrix Hypervisor 8.1: CTX283509 – <https://support.citrix.com/article/CTX283509> and CTX283515 – <https://support.citrix.com/article/CTX283515>
Citrix XenServer 7.1 LTSR CU2: CTX283508 – <https://support.citrix.com/article/CTX283508> and CTX283514 – <https://support.citrix.com/article/CTX283514>
Citrix XenServer 7.0: CTX283507 – <https://support.citrix.com/article/CTX283507> and CTX283512 – <https://support.citrix.com/article/CTX283512>
Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at _ <http://support.citrix.com/>_.
If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at _ <https://www.citrix.com/support/open-a-support-case.html>_.
Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For details on our vulnerability response process and guidance on how to report security-related issues to Citrix, please visit the Citrix Trust Center at <https://www.citrix.com/about/trust-center/vulnerability-process.html>.
Date | Change |
---|---|
2020-10-27 | Initial Publication |
2020-10-27 | Corrected links to hotfixes |
CPE | Name | Operator | Version |
---|---|---|---|
citrix hypervisor | le | 8.2 | |
citrix hypervisor | le | 8.1 | |
citrix xenserver | le | 7.1 | |
citrix xenserver | le | 7.0 |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0005 Low
EPSS
Percentile
16.1%