1. Reverse Engineering >
  2. Exploits >
  3. AA20-020A: Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

AA20-020A: Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP


Exploits vom | Direktlink: us-cert.gov Nachrichten Bewertung

Original release date: January 20, 2020<br/><h3>Summary</h3><p>On January 19, 2020, Citrix released firmware updates for Citrix Application Delivery Controller (ADC) and Citrix Gateway versions 11.1 and 12.0 to address CVE-2019-19781. Citrix expects to release updates for other vulnerable versions of Citrix ADC, Gateway, and SD-WAN WANOP appliances through January 24, 2020. (See Mitigations for update schedule).<a href="https://support.citrix.com/article/CTX267027">[1]</a></p> <p>A remote, unauthenticated attacker could exploit CVE-2019-19781 to perform arbitrary code execution.<a href="https://support.citrix.com/article/CTX267027">[2]</a> This vulnerability has been detected in exploits in the wild.<a href="https://www.ncsc.gov.uk/news/citrix-alert">[3]</a></p> <p>The Cybersecurity and Infrastructure Agency (CISA) strongly recommends that all users and administrators upgrade their vulnerable appliances as soon as possible once the appropriate firmware update becomes available.</p> <h4>Timeline of Specific Events</h4> <ul> <li>December 17, 2019 – Citrix releases Security Bulletin CTX267027 with mitigations steps.</li> <li>January 8, 2020 – The CERT Coordination Center (CERT/CC) releases Vulnerability Note VU#619785: Citrix Application Delivery Controller and Citrix Gateway Web Server Vulnerability, <a href="https://www.kb.cert.org/vuls/id/619785/">[4]</a> and CISA releases a Current Activity entry.<a href="https://www.us-cert.gov/ncas/current-activity/2020/01/08/citrix-application-delivery-controller-and-citrix-gateway">[5]</a></li> <li>January 10, 2020 – The National Security Agency (NSA) releases a Cybersecurity Advisory on CVE-2019-19781.<a href="https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF">[6]</a></li> <li>January 11, 2020 – Citrix releases blog post on CVE-2019-19781 with timeline for fixes.<a href="https://www.citrix.com/blogs/2020/01/11/citrix-provides-update-on-citrix-adc-citrix-gateway-vulnerability/">[7]</a></li> <li>January 13, 2020 – CISA releases a Current Activity entry describing their utility that enables users and administrators to test whether their Citrix ADC and Citrix Gateway firmware is susceptible to the CVE-2019-19781 vulnerability.<a href="https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability">[8]</a>&nbsp;</li> <li>January 16, 2020 – Citrix announces that Citrix SD-WAN WANOP appliance is also vulnerable to CVE-2019-19781.</li> <li>January 19, 2020 – Citrix releases firmware updates for Citrix ADC and Citrix Gateway versions 11.1 and 12.0 and blog post on accelerated schedule for fixes.<a href="https://www.citrix.com/blogs/2020/01/19/vulnerability-update-first-permanent-fixes-available-timeline-accelerated/">[9]</a></li> <li>January 24, 2020 – Citrix expects to release firmware updates for Citrix ADC and Citrix Gateway versions 10.5, 12.1, and 13.0 and Citrix SD-WAN WANOP release 10.2.6 and 11.0.3.</li> </ul> <h3>Technical Details</h3><h4>Impact</h4> <p>On December 17, 2019, Citrix reported vulnerability CVE-2019-19781. A remote, unauthenticated attacker could exploit this vulnerability to perform arbitrary code execution. This vulnerability has been detected in exploits in the wild.</p> <p>The vulnerability affects the following appliances:</p> <ul> <li>Citrix NetScaler ADC and NetScaler Gateway version 10.5 – all supported builds</li> <li>Citrix ADC and NetScaler Gateway version 11.1 – all supported builds before 11.1.63.15</li> <li>Citrix ADC and NetScaler Gateway version 12.0 – all supported builds before 12.0.63.13</li> <li>Citrix ADC and NetScaler Gateway version 12.1 – all supported builds</li> <li>Citrix ADC and Citrix Gateway version 13.0 – all supported builds</li> <li>Citrix SD-WAN WANOP firmware and appliance models 4000, 4100, 5000, and 5100 – all supported builds. (Citrix SD-WAN WANOP is vulnerable because it packages Citrix ADC as a load balancer).</li> </ul> <h4>Detection Measures</h4> <p>CISA has released a utility that enables users and administrators to detect whether their Citrix ADC and Citrix Gateway firmware is susceptible to CVE-2019-19781.<a href="https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability">[10] </a>CISA encourages administrators to visit CISA’s <a href="https://github.com/cisagov/check-cve-2019-19781">GitHub page</a> to download and run the tool.</p> <p>See the National Security Agency’s Cybersecurity Advisory on CVE-2020-19781 for other detection measures.<a href="https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF">[11]</a></p> <h3>Mitigations</h3><p>CISA strongly recommends users and administrators update Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP once the appropriate firmware updates become available.</p> <p>The fixed builds can be downloaded from Citrix Downloads pages for <a href="https://www.citrix.com/downloads/citrix-adc/">Citrix ADC</a> and <a href="https://www.citrix.com/downloads/citrix-gateway/">Citrix Gateway</a>.</p> <p>Until the appropriate update is accessible, users and administrators should apply Citrix’s interim mitigation steps for CVE-2019-19781.<a href="https://support.citrix.com/article/CTX267679">[12]</a> Verify the successful application of the above mitigations by using the tool in <a href="https://support.citrix.com/article/CTX269180">CTX269180 – CVE-2019-19781 – Verification ToolTest</a>.<strong> Note:</strong> these mitigation steps apply to Citrix ADC and SD-WAN WANOP deployments.<a href="https://support.citrix.com/article/CTX267027">[13]</a></p> <p>Refer to table 1 for Citrix’s planned fix schedule.<a href="https://support.citrix.com/article/CTX267027">[14]</a></p> <p><strong>Table 1. Fix schedule for Citrix appliances vulnerable to CVE-2019-19781</strong></p> <table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px;"> <thead> <tr> <th scope="col"><strong>Vulnerable Appliance</strong></th> <th scope="col"><strong>Firmware Update</strong></th> <th scope="col"><strong>Release Date</strong></th> </tr> <tr> <td scope="col" style="text-align: left;">Citrix ADC and Citrix Gateway version 10.5</td> <td scope="col" style="text-align: left;">Refresh Build 10.5.70.x</td> <td scope="col" style="text-align: left;">January 24, 2020 (Expected)</td> </tr> <tr> <td scope="col" style="text-align: left;">Citrix ADC and Citrix Gateway version 11.1</td> <td scope="col" style="text-align: left;">Refresh Build 11.1.63.15</td> <td scope="col" style="text-align: left;">January 19, 2020</td> </tr> <tr> <td scope="col" style="text-align: left;">Citrix ADC and Citrix Gateway version 12.0</td> <td scope="col" style="text-align: left;">Refresh Build 12.0.63.13</td> <td scope="col" style="text-align: left;">January 19, 2020</td> </tr> <tr> <td scope="col" style="text-align: left;">Citrix ADC and Citrix Gateway version 12.1</td> <td scope="col" style="text-align: left;">Refresh Build 12.1.55.x</td> <td scope="col" style="text-align: left;">January 24, 2020 (Expected)</td> </tr> <tr> <td scope="col" style="text-align: left;">Citrix ADC and Citrix Gateway version 13.0</td> <td scope="col" style="text-align: left;">Refresh Build 13.0.47.x</td> <td scope="col" style="text-align: left;">January 24, 2020 (Expected)</td> </tr> <tr> <td scope="col" style="text-align: left;">Citrix SD-WAN WANOP Release 10.2.6</td> <td scope="col" style="text-align: left;">Citrix ADC Release 11.1.51.615</td> <td scope="col" style="text-align: left;">January 24, 2020 (Expected)</td> </tr> <tr> <td scope="col" style="text-align: left;">Citrix SD-WAN WANOP Release 11.0.3</td> <td scope="col" style="text-align: left;">Citrix ADC Release 11.1.51.615</td> <td scope="col" style="text-align: left;">January 24, 2020 (Expected)</td> </tr> </thead> </table> <p>&nbsp;</p> <p>Administrators should review NSA’s <a href="https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF">Citrix Advisory</a> for other mitigations, such as applying the following defense-in-depth strategy:</p> <p>“Consider deploying a VPN capability using standardized protocols, preferably ones listed on the National Information Assurance Partnership (NIAP) Product Compliant List (PCL), in front of publicly accessible Citrix ADC and Citrix Gateway appliances to require user authentication for the VPN before being able to reach these appliances. Use of a proprietary SSLVPN/TLSVPN is discouraged.”</p> <h3>References</h3> <ul> <li><a href="https://support.citrix.com/article/CTX267027">[1] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> <li><a href="https://support.citrix.com/article/CTX267027">[2] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> <li><a href="https://www.ncsc.gov.uk/news/citrix-alert">[3] United Kingdom National Cyber Secrity Centre (NCSC) Alert: Actors exploiting Citrix products vulnerability </a></li> <li><a href="https://www.kb.cert.org/vuls/id/619785/">[4] CERT/CC Vulnerability Note VU#619785 </a></li> <li><a href="https://www.us-cert.gov/ncas/current-activity/2020/01/08/citrix-application-delivery-controller-and-citrix-gateway">[5] CISA Current Activity: Citrix Application Delivery Controller and Citrix Gateway Vulnerability </a></li> <li><a href="https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF">[6] NSA Cybersecurity Advisory: Mitigate CVE-2019-19781: Critical Vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway </a></li> <li><a href="https://www.citrix.com/blogs/2020/01/11/citrix-provides-update-on-citrix-adc-citrix-gateway-vulnerability/">[7] Citrix blog: Citrix provides update on Citrix ADC, Citrix Gateway vulnerability </a></li> <li><a href="https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability">[8] CISA Current Activity: CISA Releases Test for Citrix ADC and Gateway Vulnerability GitHub: CISAgov – check-cve-2019-19781 </a></li> <li><a href="https://www.citrix.com/blogs/2020/01/19/vulnerability-update-first-permanent-fixes-available-timeline-accelerated/">[9] Citrix Blog: Vulnerability Update: First permanent fixes available, timeline accelerated </a></li> <li><a href="https://www.us-cert.gov/ncas/current-activity/2020/01/13/cisa-releases-test-citrix-adc-and-gateway-vulnerability">[10] CISA Current Activity: CISA Releases Test for Citrix ADC and Gateway Vulnerability GitHub: CISAgov – check-cve-2019-19781 </a></li> <li><a href="https://media.defense.gov/2020/Jan/10/2002233132/-1/-1/0/CSA%20FOR%20CITRIXADCANDCITRIXGATEWAY_20200109.PDF">[11] NSA Cybersecurity Advisory: Mitigate CVE-2019-19781: Critical Vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway </a></li> <li><a href="https://support.citrix.com/article/CTX267679">[12] Citrix Security Bulletin CTX267679, Mitigation Steps for CVE-2019-19781 </a></li> <li><a href="https://support.citrix.com/article/CTX267027">[13] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> <li><a href="https://support.citrix.com/article/CTX267027">[14] Citrix Security Bulletin CTX267027, Vulnerability in Citrix Application Delivery Controller and Citrix Gateway </a></li> </ul> <h3>Revisions</h3> <ul> <li>January 20, 2020: Initial Version</li> </ul> <hr /> <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p class="privacy-and-terms">This product is provided subject to this <a href="https://www.us-cert.gov/privacy/notification">Notification</a> and this <a href="https://www.dhs.gov/privacy-policy">Privacy &amp; Use</a> policy.</p> </div>...

Externe Webseite mit kompletten Inhalt öffnen



https://www.us-cert.gov/ncas/alerts/aa20-020a

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • AA20-020A: Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP

    vom 2044.27 Punkte ic_school_black_18dp
    Original release date: January 20, 2020<br/><h3>Summary</h3><p>On January 19, 2020, Citrix released firmware updates for Citrix Application Delivery Controller (ADC) and Citrix Gateway versions 11.1 and 12.0 to address CVE-2019-19781.
  • AA20-031A: Detecting Citrix CVE-2019-19781

    vom 746.85 Punkte ic_school_black_18dp
    Original release date: January 31, 2020SummaryUnknown cyber network exploitation (CNE) actors have successfully compromised numerous organizations that employed vulnerable Citrix devices through a critical vulnerability known as CVE-2019-19781.[1] Though mitiga
  • Enabling and securing ubiquitous compute from intelligent cloud to intelligent edge

    vom 580.69 Punkte ic_school_black_18dp
    Enterprises are embracing the cloud to run their mission-critical workloads. The number of connected devices on and off-premises, and the data they generate continue to increase requiring new enterprise network edge architectures. We call this the in
  • Choosing between Azure VNet Peering and VNet Gateways

    vom 343.32 Punkte ic_school_black_18dp
    As customers adopt Azure and the cloud, they need fast, private, and secure connectivity across regions and Azure Virtual Networks (VNets). Based on the type of workload, customer needs vary. For example, if you want to ensure data replication across ge
  • DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool

    vom 257.19 Punkte ic_school_black_18dp
    DevAudit is an open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams adopting DevOps and DevSecOps that detects security vulnerabilities at multiple levels of the solution stack. DevAudit provides a wide array
  • Creative X-Fi Elite Pro Drivers

    vom 254.85 Punkte ic_school_black_18dp
    help i'm almost finished with my transition to Linux from Windows except that my Sound Card is not working. Can someone help me find a driver for my Creative Labs X-Fi Elite Pro and that it works with the external I/O box? Thanks! lspci: 00:00.0 Host bri
  • Citrix releases permanent fixes for CVE-2019-19781 flaw in ADC 11.1 and 12.0

    vom 240.83 Punkte ic_school_black_18dp
    Citrix addressed the actively exploited CVE-2019-19781 flaw in Citrix Application Delivery Controller (ADC), Citrix Gateway, and Citrix SD-WAN WANOP appliances. Citrix has released security patches to address actively exploited CVE-2019-19781 vulnerability in
  • Citrix bis 10.5 Administrative Web Interface Clickjacking erweiterte Rechte

    vom 239.62 Punkte ic_school_black_18dp
    Allgemein scipID: 81012 Betroffen: Citrix Netscaler Application Delivery Controller/Netscaler Gateway bis 10.5 Veröffentlicht: 17.02.2016 Risiko: kritisch Erstellt: 18.02.2016 Eintrag: 66.8% komplett Beschreibung Es wurde eine Schwachstelle in Citrix Netscaler Appli
  • Citrix bis 10.5 NS Web GUI Command Handler erweiterte Rechte

    vom 239.62 Punkte ic_school_black_18dp
    Allgemein scipID: 81011 Betroffen: Citrix Netscaler Application Delivery Controller/Netscaler Gateway bis 10.5 Veröffentlicht: 17.02.2016 Risiko: kritisch Erstellt: 18.02.2016 Eintrag: 66.2% komplett Beschreibung Eine Schwachstelle wurde in Citrix Netscaler Applicatio
  • Citrix bis 10.5 Administrative Web Interface Clickjacking erweiterte Rechte

    vom 239.62 Punkte ic_school_black_18dp
    Allgemein scipID: 81012 Betroffen: Citrix Netscaler Application Delivery Controller/Netscaler Gateway bis 10.5 Veröffentlicht: 17.02.2016 Risiko: kritisch Erstellt: 18.02.2016 Eintrag: 66.8% komplett Beschreibung Es wurde eine Schwachstelle in Citrix Netscaler Appli
  • Citrix bis 10.5 NS Web GUI Command Handler erweiterte Rechte

    vom 239.62 Punkte ic_school_black_18dp
    Allgemein scipID: 81011 Betroffen: Citrix Netscaler Application Delivery Controller/Netscaler Gateway bis 10.5 Veröffentlicht: 17.02.2016 Risiko: kritisch Erstellt: 18.02.2016 Eintrag: 66.2% komplett Beschreibung Eine Schwachstelle wurde in Citrix Netscaler Applicatio
  • Taking advantage of the new Azure Application Gateway V2

    vom 234.54 Punkte ic_school_black_18dp
    We recently released Azure Application Gateway V2 and Web Application Firewall (WAF) V2. These SKUs are named Standard_v2 and WAF_v2 respectively and are fully supported with a 99.95% SLA. The new SKUs offer significant improvements and additional capab

Team Security Diskussion über AA20-020A: Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP