First published: Thu Jun 25 2009(Updated: )
The default configuration of the Security global settings on the Citrix NetScaler Access Gateway appliance with Enterprise Edition firmware 9.0, 8.1, and earlier specifies Allow for the Default Authorization Action option, which might allow remote authenticated users to bypass intended access restrictions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix NetScaler Access Gateway Firmware | <=8.1 | |
Citrix NetScaler Access Gateway Firmware | =7.0 | |
Citrix NetScaler Access Gateway Firmware | =8.0 | |
Citrix NetScaler Access Gateway Firmware | =9.0 | |
Citrix NetScaler Access Gateway Firmware | ||
All of | ||
Any of | ||
Citrix NetScaler Access Gateway Firmware | <=8.1 | |
Citrix NetScaler Access Gateway Firmware | =7.0 | |
Citrix NetScaler Access Gateway Firmware | =8.0 | |
Citrix NetScaler Access Gateway Firmware | =9.0 | |
Citrix NetScaler Access Gateway Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2213 is considered a high severity vulnerability due to potential unauthorized access by authenticated users.
To fix CVE-2009-2213, you should change the Default Authorization Action setting from Allow to Deny in the Security global settings.
CVE-2009-2213 affects Citrix NetScaler Access Gateway appliances with firmware versions 9.0, 8.1, 8.0, and 7.0.
CVE-2009-2213 could allow remote authenticated users to bypass intended access restrictions, potentially leading to unauthorized access.
Yes, CVE-2009-2213 specifically impacts the Enterprise Edition of the Citrix NetScaler Access Gateway.