First published: Fri Jul 10 2020(Updated: )
Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Application Delivery Controller Firmware | >=10.5<10.5-70.18 | |
Citrix Application Delivery Controller Firmware | >=11.1<11.1-64.14 | |
Citrix Application Delivery Controller Firmware | >=12.0<12.0-63.21 | |
Citrix Application Delivery Controller Firmware | >=12.1<12.1-57.18 | |
Citrix Application Delivery Controller Firmware | >=13.0<13.0-58.30 | |
Citrix Application Delivery Controller | ||
Citrix Netscaler Gateway Firmware | >=10.5<10.5-70.18 | |
Citrix Netscaler Gateway Firmware | >=11.1<11.1-64.14 | |
Citrix Netscaler Gateway Firmware | >=12.0<12.0-63.21 | |
Citrix Netscaler Gateway Firmware | >=12.1<12.1-57.18 | |
Citrix NetScaler Gateway | ||
Citrix Gateway Firmware | >=13.0<13.0-58.30 | |
Citrix Gateway | ||
Citrix SD-WAN WANOP | >=10.2<10.2.7 | |
Citrix SD-WAN WANOP | >=11.0<11.0.3d | |
Citrix SD-WAN WANOP | >=11.1<11.1.1a | |
Citrix 4000-wo | ||
Citrix 4100-wo | ||
Citrix 5000-wo | ||
Citrix 5100-wo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8194 is a vulnerability that allows the modification of a file download in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14, and 10.5-70.18, as well as Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d, and 10.2.7.
The severity of CVE-2020-8194 is medium with a CVSS score of 6.5.
Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14, and 10.5-70.18, as well as Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d, and 10.2.7 are affected by CVE-2020-8194.
CVE-2020-8194 allows an attacker to perform reflected code injection, which can be used to modify a file download.
Yes, Citrix has released patches to address the vulnerability. It is recommended to apply the latest updates to the affected software versions.