6.5

CVE-2020-8195

Warnung
Exploit

Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CitrixApplication Delivery Controller Firmware Version >= 10.5 < 10.5-70.18
CitrixApplication Delivery Controller Firmware Version >= 11.1 < 11.1-64.14
CitrixApplication Delivery Controller Firmware Version >= 12.0 < 12.0-63.21
CitrixApplication Delivery Controller Firmware Version >= 12.1 < 12.1-57.18
CitrixApplication Delivery Controller Firmware Version >= 13.0 < 13.0-58.30
CitrixNetscaler Gateway Firmware Version >= 10.5 < 10.5-70.18
   CitrixNetScaler Gateway Version-
CitrixNetscaler Gateway Firmware Version >= 11.1 < 11.1-64.14
   CitrixNetScaler Gateway Version-
CitrixNetscaler Gateway Firmware Version >= 12.0 < 12.0-63.21
   CitrixNetScaler Gateway Version-
CitrixNetscaler Gateway Firmware Version >= 12.1 < 12.1-57.18
   CitrixNetScaler Gateway Version-
CitrixGateway Firmware Version >= 13.0 < 13.0-58.30
   CitrixGateway Version-
CitrixSd-wan Wanop Version >= 10.2 < 10.2.7
   Citrix4000-wo Version-
   Citrix4100-wo Version-
   Citrix5000-wo Version-
   Citrix5100-wo Version-
CitrixSd-wan Wanop Version >= 11.0 < 11.0.3d
   Citrix4000-wo Version-
   Citrix4100-wo Version-
   Citrix5000-wo Version-
   Citrix5100-wo Version-
CitrixSd-wan Wanop Version >= 11.1 < 11.1.1a
   Citrix4000-wo Version-
   Citrix4100-wo Version-
   Citrix5000-wo Version-
   Citrix5100-wo Version-
CitrixGateway Plug-in For Linux Version < 1.0.0.137

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability

Schwachstelle

Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an information disclosure vulnerability.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 86.64% 0.994
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.