Vulnerability Description
Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citrix | Netscaler Sd-Wan | <= 9.1.2.26.561201 |
References
- http://www.securityfocus.com/bid/99943Broken LinkThird Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039019Broken LinkThird Party AdvisoryVDB Entry
- https://support.citrix.com/article/CTX225990Permissions Required
- https://www.exploit-db.com/exploits/42345/ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/42346/Third Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/99943Broken LinkThird Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039019Broken LinkThird Party AdvisoryVDB Entry
- https://support.citrix.com/article/CTX225990Permissions Required
- https://www.exploit-db.com/exploits/42345/ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/42346/Third Party AdvisoryVDB Entry
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-US Government Resource
FAQ
What is CVE-2017-6316?
CVE-2017-6316 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN)...
How severe is CVE-2017-6316?
CVE-2017-6316 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-6316?
Check the references section above for vendor advisories and patch information. Affected products include: Citrix Netscaler Sd-Wan.