Vulnerability identifier: #VU1136
Vulnerability risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-592
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Citrix NetScaler
Server applications /
Remote management servers, RDP, SSH
Vendor: Citrix
Description
The vulnerability allows a remote unauthenticated user to hijack the target user's session.
The weakness is due to unathorized redirect in the AAA for Traffic Management (AAA-TM) flow that allows a remote attackers to gain the session cookies and hijack the valid user's session.
Successful exploitation of the vulnerability leads to session steal.
Mitigation
Update to version 10.1 Build 135.8, 10.5 Build 61.11, 11.0 Build 65.31/65.35F.
Vulnerable software versions
Citrix NetScaler: 10.1 - 11.1
External links
http://support.citrix.com/article/CTX218361
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.