First published: Wed Feb 08 2017(Updated: )
Citrix NetScaler ADC and NetScaler Gateway 10.5 before Build 65.11, 11.0 before Build 69.12/69.123, and 11.1 before Build 51.21 randomly generates GCM nonces, which makes it marginally easier for remote attackers to obtain the GCM authentication key and spoof data by leveraging a reused nonce in a session and a "forbidden attack," a similar issue to CVE-2016-0270.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Application Delivery Controller Firmware | <=10.5.65.11 | |
Citrix Application Delivery Controller Firmware | <=11.0.69.12 | |
Citrix Application Delivery Controller Firmware | <=11.1.51.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5933 is considered a medium severity vulnerability due to its potential impact on GCM nonce management.
To fix CVE-2017-5933, upgrade Citrix NetScaler ADC and NetScaler Gateway to versions that include patches for this vulnerability.
CVE-2017-5933 affects Citrix NetScaler ADC and NetScaler Gateway versions 10.5 before Build 65.11, 11.0 before Build 69.12/69.123, and 11.1 before Build 51.21.
CVE-2017-5933 may allow remote attackers to obtain GCM authentication keys and spoof data due to nonce reuse.
There are no specific workarounds for CVE-2017-5933; applying the recommended updates is the best mitigation strategy.