First published: Wed Jun 05 2019(Updated: )
An Incorrect Access Control vulnerability has been identified in Citrix XenMobile Server 10.8.0 before Rolling Patch 6 and 10.9.0 before Rolling Patch 3. An attacker can impersonate and take actions on behalf of any Mobile Application Management (MAM) enrolled device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix XenMobile Server | =10.8.0 | |
Citrix XenMobile Server | =10.8.0-rolling_patch1 | |
Citrix XenMobile Server | =10.8.0-rolling_patch2 | |
Citrix XenMobile Server | =10.8.0-rolling_patch3 | |
Citrix XenMobile Server | =10.8.0-rolling_patch4 | |
Citrix XenMobile Server | =10.8.0-rolling_patch5 | |
Citrix XenMobile Server | =10.9.0 | |
Citrix XenMobile Server | =10.9.0-rolling_patch1 | |
Citrix XenMobile Server | =10.9.0-rolling_patch2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Citrix XenMobile Server vulnerability is CVE-2018-18571.
The severity rating for this vulnerability is 9.1 (Critical).
The affected software is Citrix XenMobile Server versions 10.8.0 before Rolling Patch 6 and 10.9.0 before Rolling Patch 3.
An attacker can impersonate and take actions on behalf of any Mobile Application Management (MAM) enrolled device.
More information about this vulnerability can be found at the following references: [SecurityFocus](http://www.securityfocus.com/bid/108081) and [Citrix Support](https://support.citrix.com/article/CTX247736).