First published: Fri Jul 11 2014(Updated: )
Citrix XenDesktop 7.x, 5.x, and 4.x, when pooled random desktop groups is enabled and ShutdownDesktopsAfterUse is disabled, allows local guest users to gain access to another user's desktop via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix XenDesktop | >=5.0<=5.6 | |
Citrix XenDesktop | >=7.0<=7.11 | |
Citrix XenDesktop | =4.0 | |
Citrix XenDesktop | =4.0-fp1 | |
Citrix XenDesktop | =4.0-fp2 | |
Citrix XenDesktop | =5.6-fp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4700 is classified as a high severity vulnerability due to the potential for unauthorized access to user desktops.
To fix CVE-2014-4700, ensure that the ShutdownDesktopsAfterUse setting is enabled in your Citrix XenDesktop configuration.
CVE-2014-4700 affects Citrix XenDesktop versions 4.x, 5.x, and 7.x prior to version 7.11.
If exploited, CVE-2014-4700 allows malicious local guest users to gain unauthorized access to another user's desktop.
A temporary workaround for CVE-2014-4700 is to restrict local guest access until a permanent fix can be applied.