#VU1136 Session hijacking in Citrix NetScaler


Published: 2016-11-02 | Updated: 2016-11-03

Vulnerability identifier: #VU1136

Vulnerability risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-9028

CWE-ID: CWE-592

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Citrix NetScaler
Server applications / Remote management servers, RDP, SSH

Vendor: Citrix

Description
The vulnerability allows a remote unauthenticated user to hijack the target user's session.
The weakness is due to unathorized redirect in the AAA for Traffic Management (AAA-TM) flow that allows a remote attackers to gain the session cookies and hijack the valid user's session.
Successful exploitation of the vulnerability leads to session steal.

Mitigation
Update to version 10.1 Build 135.8, 10.5 Build 61.11, 11.0 Build 65.31/65.35F.

Vulnerable software versions

Citrix NetScaler: 10.1 - 11.1


External links
http://support.citrix.com/article/CTX218361


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability