First published: Mon Nov 07 2016(Updated: )
Incorrect access control mechanisms in Citrix Receiver Desktop Lock 4.5 allow an attacker to bypass the authentication requirement by leveraging physical access to a VDI for temporary disconnection of a LAN cable. NOTE: as of 20161208, the vendor could not reproduce the issue, stating "the researcher was unable to provide us with information that would allow us to confirm the behaviour and, despite extensive investigation on test deployments of supported products, we were unable to reproduce the behaviour as he described. The researcher has also, despite additional requests for information, ceased to respond to us."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Receiver | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9111 has a moderate severity rating due to the potential for unauthorized access through an authentication bypass.
To fix CVE-2016-9111, users are advised to update to the latest version of Citrix Receiver Desktop that addresses this vulnerability.
CVE-2016-9111 is caused by incorrect access control mechanisms that allow physical access exploitation.
CVE-2016-9111 specifically affects users of Citrix Receiver Desktop Lock version 4.5.
CVE-2016-9111 requires physical access to the device, making it not exploitable remotely.