var-201509-0317
Vulnerability from variot
Multiple unspecified vulnerabilities in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 10.1 Build 132.8, 10.5 before Build 57.7, and 10.5e before Build 56.1505.e allow remote attackers to gain privileges via unknown vectors, related to the (1) Command Line Interface (CLI) and the (2) Web User Interface (UI). NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. A security vulnerability exists in Citrix Systems NetScaler ADC and NetScaler Gateway. A remote attacker could exploit this vulnerability to gain privileges. The following products and versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to Build 132.8, 10.5 prior to Build 57.7, and 10.5e prior to Build 56.1505.e
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201509-0317", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 57.7" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 57.7" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5e build 56.1505.e" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5e build 56.1505.e" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "db": "CNNVD", "id": "CNNVD-201509-223" }, { "db": "NVD", "id": "CVE-2015-5538" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:netscaler_application_delivery_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004890" } ] }, "cve": "CVE-2015-5538", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-5538", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-83499", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-5538", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-5538", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201509-223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-83499", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-5538", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-83499" }, { "db": "VULMON", "id": "CVE-2015-5538" }, { "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "db": "CNNVD", "id": "CNNVD-201509-223" }, { "db": "NVD", "id": "CVE-2015-5538" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple unspecified vulnerabilities in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 10.1 Build 132.8, 10.5 before Build 57.7, and 10.5e before Build 56.1505.e allow remote attackers to gain privileges via unknown vectors, related to the (1) Command Line Interface (CLI) and the (2) Web User Interface (UI). NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. A security vulnerability exists in Citrix Systems NetScaler ADC and NetScaler Gateway. A remote attacker could exploit this vulnerability to gain privileges. The following products and versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to Build 132.8, 10.5 prior to Build 57.7, and 10.5e prior to Build 56.1505.e", "sources": [ { "db": "NVD", "id": "CVE-2015-5538" }, { "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "db": "VULHUB", "id": "VHN-83499" }, { "db": "VULMON", "id": "CVE-2015-5538" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5538", "trust": 2.6 }, { "db": "SECTRACK", "id": "1033618", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2015-004890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201509-223", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-83499", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-5538", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83499" }, { "db": "VULMON", "id": "CVE-2015-5538" }, { "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "db": "CNNVD", "id": "CNNVD-201509-223" }, { "db": "NVD", "id": "CVE-2015-5538" } ] }, "id": "VAR-201509-0317", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-83499" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:42:27.495000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX201334", "trust": 0.8, "url": "http://support.citrix.com/article/CTX201334" }, { "title": "Citrix Security Bulletins: Citrix NetScaler Application Delivery Controller and NetScaler Gateway Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=cb922395c3802bcb12cf5bf0bb4f8f49" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5538" }, { "db": "JVNDB", "id": "JVNDB-2015-004890" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2015-5538" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://support.citrix.com/article/ctx201334" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1033618" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5538" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5538" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-83499" }, { "db": "VULMON", "id": "CVE-2015-5538" }, { "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "db": "CNNVD", "id": "CNNVD-201509-223" }, { "db": "NVD", "id": "CVE-2015-5538" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-83499" }, { "db": "VULMON", "id": "CVE-2015-5538" }, { "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "db": "CNNVD", "id": "CNNVD-201509-223" }, { "db": "NVD", "id": "CVE-2015-5538" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-17T00:00:00", "db": "VULHUB", "id": "VHN-83499" }, { "date": "2015-09-17T00:00:00", "db": "VULMON", "id": "CVE-2015-5538" }, { "date": "2015-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "date": "2015-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-223" }, { "date": "2015-09-17T16:59:02.730000", "db": "NVD", "id": "CVE-2015-5538" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-22T00:00:00", "db": "VULHUB", "id": "VHN-83499" }, { "date": "2016-12-22T00:00:00", "db": "VULMON", "id": "CVE-2015-5538" }, { "date": "2015-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004890" }, { "date": "2015-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-223" }, { "date": "2024-11-21T02:33:13.910000", "db": "NVD", "id": "CVE-2015-5538" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix NetScaler Application Delivery Controller and NetScaler Gateway Vulnerability gained in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004890" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.