First published: Wed Dec 13 2017(Updated: )
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 allow remote attackers to obtain sensitive information from the backend client TLS handshake by leveraging use of TLS with Client Certificates and a Diffie-Hellman Ephemeral (DHE) key exchange.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Application Delivery Controller Firmware | =10.5 | |
Citrix Application Delivery Controller Firmware | =11.0 | |
Citrix Application Delivery Controller Firmware | =11.1 | |
Citrix Application Delivery Controller Firmware | =12.0 | |
Citrix Netscaler Gateway Firmware | =10.5 | |
Citrix Netscaler Gateway Firmware | =11.0 | |
Citrix Netscaler Gateway Firmware | =11.1 | |
Citrix Netscaler Gateway Firmware | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Citrix NetScaler ADC and NetScaler Gateway vulnerability is CVE-2017-17549.
The severity level of CVE-2017-17549 is medium with a severity value of 5.9.
Citrix NetScaler ADC and NetScaler Gateway versions 10.5, 11.0, 11.1, and 12.0 are affected by CVE-2017-17549.
Remote attackers can exploit CVE-2017-17549 by obtaining sensitive information from the backend client TLS handshake through the use of TLS wi.
Yes, there is a fix available for CVE-2017-17549. You can find more information on the Citrix support website.