First published: Wed Aug 02 2017(Updated: )
The TLS and DTLS processing functionality in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway devices with firmware 9.x before 9.3 Build 68.5, 10.0 through Build 78.6, 10.1 before Build 130.13, 10.1.e before Build 130.1302.e, 10.5 before Build 55.8, and 10.5.e before Build 55.8007.e makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix NetScaler Firmware | =9.0 | |
Citrix NetScaler Firmware | =9.1 | |
Citrix NetScaler Firmware | =9.2 | |
Citrix NetScaler Firmware | =10.0 | |
Citrix NetScaler Firmware | =10.1 | |
Citrix NetScaler Firmware | =10.1e | |
Citrix NetScaler Firmware | =10.5 | |
Citrix NetScaler Firmware | =10.5e | |
NetScaler ADC | ||
Citrix NetScaler Access Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3642 has been assigned a high severity rating due to its impact on the confidentiality and integrity of data processed by vulnerable Citrix devices.
To fix CVE-2015-3642, update your Citrix NetScaler devices to a patched firmware version as specified by Citrix.
CVE-2015-3642 affects Citrix NetScaler ADC and Gateway devices running versions prior to 9.3 Build 68.5, 10.0 Build 78.6, 10.1 Build 130.13, and others listed in the CVE details.
The implications of CVE-2015-3642 include the potential for unauthorized decryption of sensitive traffic and man-in-the-middle attacks.
No, CVE-2015-3642 does not affect Citrix NetScaler versions 9.0, 9.1, 9.2, 10.0, 10.1, 10.5, and their corresponding 'e' variants.