6.5

CVE-2020-8193

Warning
Exploit

Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.

Data is provided by the National Vulnerability Database (NVD)
CitrixApplication Delivery Controller Firmware Version >= 10.5 < 10.5-70.18
CitrixApplication Delivery Controller Firmware Version >= 11.1 < 11.1-64.14
CitrixApplication Delivery Controller Firmware Version >= 12.0 < 12.0-63.21
CitrixApplication Delivery Controller Firmware Version >= 12.1 < 12.1-57.18
CitrixApplication Delivery Controller Firmware Version >= 13.0 < 13.0-58.30
CitrixNetscaler Gateway Firmware Version >= 10.5 < 10.5-70.18
   CitrixNetScaler Gateway Version-
CitrixNetscaler Gateway Firmware Version >= 11.1 < 11.1-64.14
   CitrixNetScaler Gateway Version-
CitrixNetscaler Gateway Firmware Version >= 12.0 < 12.0-63.21
   CitrixNetScaler Gateway Version-
CitrixNetscaler Gateway Firmware Version >= 12.1 < 12.1-57.18
   CitrixNetScaler Gateway Version-
CitrixGateway Firmware Version >= 13.0 < 13.0-58.30
   CitrixGateway Version-
CitrixSd-wan Wanop Version >= 10.2 < 10.2.7
   Citrix4000-wo Version-
   Citrix4100-wo Version-
   Citrix5000-wo Version-
   Citrix5100-wo Version-
CitrixSd-wan Wanop Version >= 11.0 < 11.0.3d
   Citrix4000-wo Version-
   Citrix4100-wo Version-
   Citrix5000-wo Version-
   Citrix5100-wo Version-
CitrixSd-wan Wanop Version >= 11.1 < 11.1.1a
   Citrix4000-wo Version-
   Citrix4100-wo Version-
   Citrix5000-wo Version-
   Citrix5100-wo Version-

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Citrix ADC, Gateway, and SD-WAN WANOP Appliance Authorization Bypass Vulnerability

Vulnerability

Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an authorization bypass vulnerability that may allow unauthenticated access to certain URL endpoints. The attacker must have access to the NetScaler IP (NSIP) in order to perform exploitation.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.3% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.