First published: Wed Dec 13 2017(Updated: )
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Application Delivery Controller Firmware | =10.5 | |
Citrix Application Delivery Controller Firmware | =11.0 | |
Citrix Application Delivery Controller Firmware | =11.1 | |
Citrix Application Delivery Controller Firmware | =12.0 | |
Citrix Netscaler Gateway Firmware | =10.5 | |
Citrix Netscaler Gateway Firmware | =11.0 | |
Citrix Netscaler Gateway Firmware | =11.1 | |
Citrix Netscaler Gateway Firmware | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-17382.
The severity of CVE-2017-17382 is medium (5.9).
CVE-2017-17382 affects Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway versions 10.5, 11.0, 11.1, and 12.0.
CVE-2017-17382 could allow remote attackers to decrypt TLS ciphertext data.
Yes, it is recommended to update to the latest build of Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway to mitigate the vulnerability.