7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:P/I:P/A:C
0.001 Low
EPSS
Percentile
19.9%
Several security issues have been identified that affect Citrix Hypervisor:
Two issues, each of which may each allow privileged code in a guest VM to cause the host to crash or become unresponsive. These two issues only affect systems where the malicious guest VM has a physical PCI device passed through to it by the host administrator.
These issues have the following identifiers:
A further issue that affects underlying CPU hardware. Although this is not an issue in the Citrix Hypervisor product itself, Citrix is releasing hotfixes that also address this CPU issue. This issue is of a type known as “speculative execution attacks” and may allow malicious code running on a CPU to infer the value of registers or memory belonging to other processes running on that CPU.
This issue has the following identifiers:
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:P/I:P/A:C
0.001 Low
EPSS
Percentile
19.9%