Vulnerability Description
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 allow remote attackers to obtain sensitive information from the backend client TLS handshake by leveraging use of TLS with Client Certificates and a Diffie-Hellman Ephemeral (DHE) key exchange.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citrix | Application Delivery Controller Firmware | 10.5 |
| Citrix | Netscaler Gateway Firmware | 10.5 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/102177Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040011Third Party AdvisoryVDB Entry
- https://support.citrix.com/article/ctx230612Vendor Advisory
- http://www.securityfocus.com/bid/102177Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040011Third Party AdvisoryVDB Entry
- https://support.citrix.com/article/ctx230612Vendor Advisory
FAQ
What is CVE-2017-17549?
CVE-2017-17549 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 allow remote attacke...
How severe is CVE-2017-17549?
CVE-2017-17549 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17549?
Check the references section above for vendor advisories and patch information. Affected products include: Citrix Application Delivery Controller Firmware, Citrix Netscaler Gateway Firmware.