Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 allow remote attackers to obtain sensitive information from the backend client TLS handshake by leveraging use of TLS with Client Certificates and a Diffie-Hellman Ephemeral (DHE) key exchange.
Max CVSS
5.9
EPSS Score
0.12%
Published
2017-12-13
Updated
2018-01-05

CVE-2017-17382

Public exploit
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
Max CVSS
5.9
EPSS Score
0.30%
Published
2017-12-13
Updated
2019-10-03
A vulnerability has been identified in the management interface of Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.1 before build 135.18, 10.5 before build 66.9, 10.5e before build 60.7010.e, 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13 (except for build 41.24) that, if exploited, could allow an attacker with access to the NetScaler management interface to gain administrative access to the appliance.
Max CVSS
9.0
EPSS Score
0.22%
Published
2017-09-26
Updated
2019-10-03
arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
Max CVSS
8.8
EPSS Score
0.06%
Published
2017-08-24
Updated
2019-10-03
Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.
Max CVSS
7.8
EPSS Score
0.06%
Published
2017-08-24
Updated
2019-05-06
Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
Max CVSS
8.8
EPSS Score
0.06%
Published
2017-08-24
Updated
2020-04-14
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
Max CVSS
8.8
EPSS Score
0.06%
Published
2017-08-24
Updated
2019-10-03
XML external entity (XXE) vulnerability in Citrix XenMobile Server 9.x and 10.x before 10.5 RP3 allows attackers to obtain sensitive information via unspecified vectors.
Max CVSS
7.5
EPSS Score
0.13%
Published
2017-06-16
Updated
2017-07-07
A heap overflow vulnerability in Citrix NetScaler Gateway versions 10.1 before 135.8/135.12, 10.5 before 65.11, 11.0 before 70.12, and 11.1 before 52.13 allows a remote authenticated attacker to run arbitrary commands via unspecified vectors.
Max CVSS
9.0
EPSS Score
0.35%
Published
2017-04-13
Updated
2017-07-11

CVE-2017-6316

Known exploited
Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.
Max CVSS
10.0
EPSS Score
96.17%
Published
2017-07-20
Updated
2017-09-16
CISA KEV Added
2022-03-25
Citrix NetScaler ADC and NetScaler Gateway 10.5 before Build 65.11, 11.0 before Build 69.12/69.123, and 11.1 before Build 51.21 randomly generates GCM nonces, which makes it marginally easier for remote attackers to obtain the GCM authentication key and spoof data by leveraging a reused nonce in a session and a "forbidden attack," a similar issue to CVE-2016-0270.
Max CVSS
5.9
EPSS Score
0.12%
Published
2017-02-08
Updated
2017-03-14
An issue was discovered in Linux Foundation xapi in Citrix XenServer through 7.0. An authenticated read-only administrator can cancel tasks of other administrators.
Max CVSS
4.9
EPSS Score
0.07%
Published
2017-01-30
Updated
2019-10-03
An issue was discovered in Linux Foundation xapi in Citrix XenServer through 7.0. An authenticated read-only administrator can corrupt the host database.
Max CVSS
6.5
EPSS Score
0.12%
Published
2017-01-30
Updated
2019-10-03
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
Max CVSS
5.5
EPSS Score
0.06%
Published
2017-01-26
Updated
2017-01-27
Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
Max CVSS
6.0
EPSS Score
0.06%
Published
2017-01-26
Updated
2017-11-04
Citrix Provisioning Services before 7.12 allows attackers to obtain sensitive information from kernel memory via unspecified vectors.
Max CVSS
7.5
EPSS Score
0.11%
Published
2017-01-18
Updated
2017-01-23
Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code by overwriting a function pointer.
Max CVSS
9.8
EPSS Score
0.77%
Published
2017-01-18
Updated
2017-01-23
Use-after-free vulnerability in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.
Max CVSS
9.8
EPSS Score
0.77%
Published
2017-01-18
Updated
2017-01-23
Citrix Provisioning Services before 7.12 allows attackers to obtain sensitive kernel address information via unspecified vectors.
Max CVSS
5.3
EPSS Score
0.12%
Published
2017-01-18
Updated
2017-01-23
Buffer overflow in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors.
Max CVSS
9.8
EPSS Score
0.76%
Published
2017-01-18
Updated
2017-01-23
The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
Max CVSS
7.5
EPSS Score
0.06%
Published
2017-02-17
Updated
2018-02-08
The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
Max CVSS
7.8
EPSS Score
0.06%
Published
2017-01-23
Updated
2017-07-01
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
Max CVSS
6.0
EPSS Score
0.06%
Published
2017-01-23
Updated
2017-07-01
Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
Max CVSS
8.8
EPSS Score
0.07%
Published
2017-01-23
Updated
2017-07-01
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
Max CVSS
7.8
EPSS Score
0.06%
Published
2017-01-23
Updated
2017-07-01
32 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!