Vulnerability Details : CVE-2020-8283
An authorised user on a Windows host running Citrix Universal Print Server can perform arbitrary command execution as SYSTEM in CVAD versions before 2009, 1912 LTSR CU1 hotfixes CTX285870 and CTX286120, 7.15 LTSR CU6 hotfix CTX285344 and 7.6 LTSR CU9.
Products affected by CVE-2020-8283
- cpe:2.3:a:citrix:xenapp:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.6:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.6:cu8:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.15:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xenapp:7.15:cu6:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:*:*:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.6:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.6:cu8:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.15:-:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:xendesktop:7.15:cu6:*:*:ltsr:*:*:*
- cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:-:*:*:*
- Citrix » Virtual Apps And Desktops » Ltsr EditionVersions from including (>=) 1903 and up to, including, (<=) 1912cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:ltsr:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8283
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8283
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-8283
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by:
- nvd@nist.gov (Primary)
- support@hackerone.com (Secondary)
References for CVE-2020-8283
-
https://support.citrix.com/article/CTX285059
Citrix Virtual Apps and Desktops Security UpdateVendor Advisory
Jump to