ID

VAR-202007-1179


CVE

CVE-2020-8199


TITLE

Citrix ADC Gateway Linux client Vulnerabilities related to authority management in

Trust: 0.8

sources: JVNDB: JVNDB-2020-007905

DESCRIPTION

Improper access control in Citrix ADC Gateway Linux client versions before 1.0.0.137 results in local privilege escalation to root. (DoS) It may be put into a state. Citrix Systems Gateway Plug-in is a plug-in of Citrix Systems (Citrix Systems) for connecting and managing Citrix Gateway remote access products. A local attacker could exploit this vulnerability to elevate privileges

Trust: 1.71

sources: NVD: CVE-2020-8199 // JVNDB: JVNDB-2020-007905 // VULHUB: VHN-186324

AFFECTED PRODUCTS

vendor:citrixmodel:gateway plug-in for linuxscope:ltversion:1.0.0.137

Trust: 1.0

vendor:citrixmodel:gateway plug-in for linuxscope:eqversion:1.0.0.137

Trust: 0.8

sources: JVNDB: JVNDB-2020-007905 // NVD: CVE-2020-8199

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-8199
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-007905
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202007-372
value: HIGH

Trust: 0.6

VULHUB: VHN-186324
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-8199
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-007905
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-186324
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-8199
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-007905
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-186324 // JVNDB: JVNDB-2020-007905 // CNNVD: CNNVD-202007-372 // NVD: CVE-2020-8199

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-269

Trust: 0.9

sources: VULHUB: VHN-186324 // JVNDB: JVNDB-2020-007905 // NVD: CVE-2020-8199

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202007-372

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-202007-372

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-007905

PATCH

title:CTX276688url:https://support.citrix.com/article/CTX276688

Trust: 0.8

title:Citrix Systems Gateway Plug-in Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=123542

Trust: 0.6

sources: JVNDB: JVNDB-2020-007905 // CNNVD: CNNVD-202007-372

EXTERNAL IDS

db:NVDid:CVE-2020-8199

Trust: 2.5

db:JVNDBid:JVNDB-2020-007905

Trust: 0.8

db:CNNVDid:CNNVD-202007-372

Trust: 0.7

db:AUSCERTid:ESB-2020.2310

Trust: 0.6

db:NSFOCUSid:48030

Trust: 0.6

db:VULHUBid:VHN-186324

Trust: 0.1

sources: VULHUB: VHN-186324 // JVNDB: JVNDB-2020-007905 // CNNVD: CNNVD-202007-372 // NVD: CVE-2020-8199

REFERENCES

url:https://support.citrix.com/article/ctx276688

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-8199

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8199

Trust: 0.8

url:http://www.nsfocus.net/vulndb/48030

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2310/

Trust: 0.6

sources: VULHUB: VHN-186324 // JVNDB: JVNDB-2020-007905 // CNNVD: CNNVD-202007-372 // NVD: CVE-2020-8199

CREDITS

Maarten Boone (@staatsgeheim), Donny Maasland (@donnymaasland), Ltd and Viktor Dragomiretskyy, Albert Shi of Univision Network (Shanghai) Co.,Laurent Geyer of Akamai, Muris Kurgas of Digital 14 (Xen1thLabs)

Trust: 0.6

sources: CNNVD: CNNVD-202007-372

SOURCES

db:VULHUBid:VHN-186324
db:JVNDBid:JVNDB-2020-007905
db:CNNVDid:CNNVD-202007-372
db:NVDid:CVE-2020-8199

LAST UPDATE DATE

2024-11-23T21:35:30.089000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-186324date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-007905date:2020-08-31T00:00:00
db:CNNVDid:CNNVD-202007-372date:2020-08-25T00:00:00
db:NVDid:CVE-2020-8199date:2024-11-21T05:38:29.230

SOURCES RELEASE DATE

db:VULHUBid:VHN-186324date:2020-07-10T00:00:00
db:JVNDBid:JVNDB-2020-007905date:2020-08-31T00:00:00
db:CNNVDid:CNNVD-202007-372date:2020-07-08T00:00:00
db:NVDid:CVE-2020-8199date:2020-07-10T16:15:12.687