Vulnerability Details : CVE-2020-8269
An unprivileged Windows user on the VDA can perform arbitrary command execution as SYSTEM in CVAD versions before 2009, 1912 LTSR CU1 hotfixes CTX285870 and CTX286120, 7.15 LTSR CU6 hotfix CTX285344 and 7.6 LTSR CU9
Products affected by CVE-2020-8269
- cpe:2.3:a:citrix:xenapp:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.6:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.6:cu8:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.15:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.15:cu6:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.6:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.6:cu8:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.15:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.15:cu6:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:-:*:*:*
- Citrix » Virtual Apps And Desktops » Ltsr EditionVersions from including (>=) 1903 and up to, including, (<=) 1912cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:ltsr:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8269
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8269
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-8269
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2020-8269
-
https://support.citrix.com/article/CTX285059
Citrix Virtual Apps and Desktops Security UpdatePatch;Vendor Advisory
Jump to