
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN312
_____________________________________________________________________

DATE                : 09/06/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Citrix ADC, Citrix Gateway,
                               Citrix SD-WAN WANOP.

=====================================================================
https://support.citrix.com/article/CTX297155
_____________________________________________________________________

CTX297155

Citrix Application Delivery Controller, Citrix Gateway, and Citrix
SD-WAN WANOP appliance Security Update
Security Bulletin | High | Created: 08 Jun 2021 | Modified: 08 Jun 2021


Applicable Products

    Citrix ADC Citrix Gateway Citrix SD-WAN WANOP


Description of Problem

Multiple vulnerabilities have been discovered in Citrix ADC (formerly
known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler
Gateway) and Citrix SD-WAN WANOP appliance models 4000-WO, 4100-WO,
5000-WO, and 5100-WO. These vulnerabilities, if exploited, could result
in the following security issues:

CVE-ID 	Description 	CWE 	Affected Products	Pre-conditions

CVE-2020-8299	Network-based denial-of-service from within the same Layer
2 network segment    CWE-400: Uncontrolled Resource Consumption
 Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP	The attacker machine
must be in the same Layer 2 network segment as the vulnerable appliance

CVE-2020-8300	SAML authentication hijack through a phishing attack to
steal a valid user session	CWE-284: Improper access control	Citrix ADC,
Citrix Gateway	Citrix ADC or Citrix Gateway must be configured as a SAML
SP or a SAML IdP


The following supported versions of Citrix ADC, Citrix Gateway and
Citrix SD-WAN WANOP are affected by CVE-2020-8299:


    Citrix ADC and Citrix Gateway 13.0 before 13.0-76.29
    Citrix ADC and Citrix Gateway 12.1 before 12.1-61.18
    Citrix ADC and NetScaler Gateway 11.1 before 65.20
    Citrix ADC 12.1-FIPS before 12.1-55.238
    Citrix SD-WAN WANOP 11.4 before 11.4.0
    Citrix SD-WAN WANOP 11.3 before 11.3.2
    Citrix SD-WAN WANOP 11.3 before 11.3.1a
    Citrix SD-WAN WANOP 11.2 before 11.2.3a
    Citrix SD-WAN WANOP 11.1 before 11.1.2c
    Citrix SD-WAN WANOP 10.2 before 10.2.9a


The following supported versions of Citrix ADC and Citrix Gateway are
affected by CVE-2020-8300:

    Citrix ADC and Citrix Gateway 13.0. before 13.0-82.41
    Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23
    Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20
    Citrix ADC 12.1-FIPS before 12.1-55.238


These issues have already been addressed in Citrix-managed cloud
services such as Citrix Gateway Service and Citrix Secure Workspace
Access. Customers using Citrix-managed services do not need to take any
additional action.


What Customers Should Do

The following supported versions of Citrix ADC, Citrix Gateway, and
Citrix SD-WAN WANOP address CVE-2020-8299, a Medium severity
vulnerability.

    Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0

    Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1

  Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1

    Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS

    Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4

    Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3

    Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3

    Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2

    Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1

    Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2


The following supported versions of Citrix ADC and Citrix Gateway
address CVE-2020-8300, a High severity vulnerability.

    Citrix ADC and Citrix Gateway 13.0-82.41 and later releases of 13.0

Citrix ADC and NetScaler Gateway ADC 12.1-62.23 and later releases of 12.1

  Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1

    Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS


NOTE: In addition, upon upgrading to the fixed version, customers must
modify the device configuration to resolve CVE-2020-8300. See Citrix
Application Delivery Controller and Citrix Gateway - SAML Configuration
Reference Guide for details.


Citrix strongly recommends that affected customers install relevant
updates as soon as possible.


Acknowledgements

Citrix would like to thank ChenNan of Chaitin Security Research Lab,
Wolfgang Ettlinger and Marc Nimmerrichter of Certitude Consulting for
working with us to protect Citrix customers.


What Citrix is Doing

Citrix is notifying customers and channel partners about this potential
security issue. This article is also available from the Citrix Knowledge
Center at https://support.citrix.com/.


Obtaining Support on This Issue

If you require technical assistance with this issue, please contact
Citrix Technical Support. Contact details for Citrix Technical Support
are available at https://www.citrix.com/support/open-a-support-case/.


Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and
considers any and all potential vulnerabilities seriously. For details
on our vulnerability response process and guidance on how to report
security-related issues to Citrix, please see the following webpage:
https://www.citrix.com/about/trust-center/vulnerability-process.html.


Disclaimer
This document is provided on an "as is" basis and does not imply any
kind of guarantee or warranty, including the warranties of
merchantability or fitness for a particular use. Your use of the
information on the document is at your own risk. Citrix reserves the
right to change or update this document at any time.


Changelog


Date            Change
2021-06-08 	Initial Publication
2021-06-08 	Formatting Corrections

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================




