
====================================================================

                              CERT-Renater

                 Note d'Information No. 2017/VULN279
_____________________________________________________________________

DATE                : 26/09/2017

HARDWARE PLATFORM(S):  /

OPERATING SYSTEM(S):Systems running Citrix NetScaler, NetScaler Gateway
                                       versions 10, 11, 12.

=====================================================================
https://support.citrix.com/article/CTX227928
____________________________________________________________________


CTX227928

Authentication Bypass Vulnerability in Citrix NetScaler ADC and
NetScaler Gateway Management Interface

Security Bulletin | High | Created: 25 Sep 2017 | Modified: 25 Sep 2017
Applicable Products


    NetScaler 11.0
    NetScaler 11.1
    NetScaler 12.0
    NetScaler Gateway 11.0
    NetScaler Gateway 11.1
    NetScaler Gateway 12.0
    NetScaler 10.5
    NetScaler 10.1
    NetScaler Gateway 10.5
    NetScaler Gateway 10.1


Description of Problem

A vulnerability has been identified in the management interface of
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler
Gateway that, if exploited, could allow an attacker with access to the
NetScaler management interface to gain administrative access to the
appliance.


This vulnerability has been assigned the following CVE number:

    CVE-2017-14602: Authentication Bypass Vulnerability in Citrix
NetScaler ADC and NetScaler Gateway Management Interface


This vulnerability affects the following product versions:

    Citrix NetScaler ADC and NetScaler Gateway version 12.0 earlier
than build 53.13 (except for build 41.24)
    Citrix NetScaler ADC and NetScaler Gateway version 11.1 earlier
than build 55.13
    Citrix NetScaler ADC and NetScaler Gateway version 11.0 earlier
than build 70.16
    Citrix NetScaler ADC and NetScaler Gateway version 10.5 earlier
than build 66.9
    Citrix NetScaler ADC and NetScaler Gateway version 10.5e earlier
than build 60.7010.e
    Citrix NetScaler ADC and NetScaler Gateway version 10.1 earlier
than build 135.18


Mitigating Factors

In order to exploit this vulnerability, an attacker would require
access to the management interface of the NetScaler. In situations
where customers have deployed their NetScaler ADC and NetScaler Gateway
appliances in line with industry best practice, network access to this
interface should already be restricted.


What Customers Should Do

This vulnerability has been addressed in the following versions of
Citrix NetScaler ADC and NetScaler Gateway:

    Citrix NetScaler ADC and NetScaler Gateway version 12.0 build 41.24
and build 53.13 and later
    Citrix NetScaler ADC and NetScaler Gateway version 11.1 build 55.13
and later
    Citrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.16
and later
    Citrix NetScaler ADC and NetScaler Gateway version 10.5 build 66.9
and later
    Citrix NetScaler ADC and NetScaler Gateway version 10.5e build
60.7010.e and later
    Citrix NetScaler ADC and NetScaler Gateway version 10.1 build
135.18 and later


Citrix strongly recommends that customers impacted by this
vulnerability upgrade to a version of the Citrix NetScaler ADC or
NetScaler Gateway that contains a fix for this issue as soon as
possible.


These versions are available on the Citrix website at the following
addresses:

https://www.citrix.com/downloads/netscaler-adc/
https://www.citrix.com/downloads/netscaler-gateway/


In line with industry best practice, Citrix also recommends that
customers limit access to the management interface to trusted network
traffic only.


Acknowledgements

Citrix thanks Frank Gifford of NCC Group (https://nccgroup.trust) for
working with us to protect Citrix customers.


What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential
security issue. This article is also available from the Citrix
Knowledge Center at  http://support.citrix.com/.


Obtaining Support on This Issue

If you require technical assistance with this issue, please contact
Citrix Technical Support. Contact details for Citrix Technical Support
are available at
https://www.citrix.com/support/open-a-support-case.html.


Reporting Security Vulnerabilities

Citrix welcomes input regarding the security of its products and
considers any and all potential vulnerabilities seriously. For guidance
on how to report security-related issues to Citrix, please see the
following document: CTX081743 – Reporting Security Issues to Citrix


Changelog

Date                             Change
25th September 2017              Initial publishing

==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



