Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-6151 (GCVE-0-2024-6151)
Vulnerability from cvelistv5 – Published: 2024-07-10 20:21 – Updated: 2024-08-01 21:33- CWE-269 - Improper Privilege Management
| Vendor | Product | Version | |
|---|---|---|---|
| Citrix | Windows Virtual Delivery Agent |
Affected:
2402 , < 0
(patch)
Affected: 1912 LTSR , < CU9 (patch) Affected: 2203 LTSR , < CU5 (patch) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "virtual_apps_and_desktops",
"vendor": "citrix",
"versions": [
{
"lessThan": "2402",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "CU9",
"status": "affected",
"version": "1912 LTSR",
"versionType": "custom"
},
{
"lessThan": "CU5",
"status": "affected",
"version": "2203 LTSR",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6151",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-10T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-18T03:55:19.557Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:33:04.965Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX678035"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Windows Virtual Delivery Agent",
"vendor": "Citrix",
"versions": [
{
"lessThan": "0",
"status": "affected",
"version": "2402",
"versionType": "patch"
},
{
"lessThan": "CU9",
"status": "affected",
"version": "1912 LTSR",
"versionType": "patch"
},
{
"lessThan": "CU5",
"status": "affected",
"version": "2203 LTSR",
"versionType": "patch"
}
]
}
],
"datePublic": "2024-07-09T20:19:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eLocal Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u0026nbsp;\u003c/span\u003e\u003c/b\u003ein\u0026nbsp;\u003cspan style=\"background-color: transparent;\"\u003eVirtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS\u003c/span\u003e"
}
],
"value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS"
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-10T20:21:25.554Z",
"orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
"shortName": "Citrix"
},
"references": [
{
"url": "https://support.citrix.com/article/CTX678035"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
"assignerShortName": "Citrix",
"cveId": "CVE-2024-6151",
"datePublished": "2024-07-10T20:21:25.554Z",
"dateReserved": "2024-06-18T21:14:34.928Z",
"dateUpdated": "2024-08-01T21:33:04.965Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-6151",
"date": "2026-05-17",
"epss": "0.00122",
"percentile": "0.30828"
},
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\\u00a0in\\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS\"}, {\"lang\": \"es\", \"value\": \"La escalada de privilegios locales permite a un usuario con pocos privilegios obtener privilegios de SYSTEM en Virtual Delivery Agent para Windows utilizado por Citrix Virtual Apps and Desktops y Citrix DaaS.\"}]",
"id": "CVE-2024-6151",
"lastModified": "2024-11-21T09:49:04.457",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"secure@citrix.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 8.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"vulnerableSystemConfidentiality\": \"HIGH\", \"vulnerableSystemIntegrity\": \"HIGH\", \"vulnerableSystemAvailability\": \"HIGH\", \"subsequentSystemConfidentiality\": \"NONE\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}]}",
"published": "2024-07-10T21:15:11.013",
"references": "[{\"url\": \"https://support.citrix.com/article/CTX678035\", \"source\": \"secure@citrix.com\"}, {\"url\": \"https://support.citrix.com/article/CTX678035\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secure@citrix.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-6151\",\"sourceIdentifier\":\"secure@citrix.com\",\"published\":\"2024-07-10T21:15:11.013\",\"lastModified\":\"2025-07-25T15:40:09.120\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS\"},{\"lang\":\"es\",\"value\":\"La escalada de privilegios locales permite a un usuario con pocos privilegios obtener privilegios de SYSTEM en Virtual Delivery Agent para Windows utilizado por Citrix Virtual Apps and Desktops y Citrix DaaS.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"secure@citrix.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:-:*:*:*\",\"versionEndIncluding\":\"2311\",\"matchCriteriaId\":\"145B0427-AFE9-4C0E-AABB-A460F4D4A690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:-:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"F9330183-B04B-46F1-9DA6-5EAF216DFCC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu1:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"A2486FD4-AF16-4F57-836A-42A2D11012C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu2:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"1BF66372-CFDC-42DD-87FA-480DC0565977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu3:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"AE1E7523-EEB7-46CE-A01E-04FACB407395\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu4:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"0B60552E-923B-4064-96D9-0F565C58695C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu5:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"21EC9092-FCA9-41AA-9A9B-83D7E3DABB2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu6:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"5353646C-E3FB-4315-83C7-D6EEE258C964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu7:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"0A7169FA-E416-436B-B9D1-6249E0E1BC16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu8:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"C85E0F97-4718-4DF4-A05F-2F5E5DFD812F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:-:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"8AE1E7FC-9E2C-45BC-9F12-43149210D261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu1:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"0AEBE958-3A73-4F9D-932E-62495408A609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu2:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"BBD9FA8E-333E-4231-9F7D-08A604D065AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu3:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"9E928A6F-EEAF-4142-BA77-30845345C28D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu4:*:*:ltsr:*:*:*\",\"matchCriteriaId\":\"C19DD0C7-197B-456C-B682-99D0862B1F98\"}]}]}],\"references\":[{\"url\":\"https://support.citrix.com/article/CTX678035\",\"source\":\"secure@citrix.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX678035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.citrix.com/article/CTX678035\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:33:04.965Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-6151\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-12T20:02:35.634261Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:*:*:*:*\"], \"vendor\": \"citrix\", \"product\": \"virtual_apps_and_desktops\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2402\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1912 LTSR\", \"lessThan\": \"CU9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2203 LTSR\", \"lessThan\": \"CU5\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-12T20:05:53.242Z\"}}], \"cna\": {\"title\": \"Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 8.5, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Citrix\", \"product\": \"Windows Virtual Delivery Agent\", \"versions\": [{\"status\": \"affected\", \"version\": \"2402\", \"lessThan\": \"0\", \"versionType\": \"patch\"}, {\"status\": \"affected\", \"version\": \"1912 LTSR\", \"lessThan\": \"CU9\", \"versionType\": \"patch\"}, {\"status\": \"affected\", \"version\": \"2203 LTSR\", \"lessThan\": \"CU5\", \"versionType\": \"patch\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-07-09T20:19:00.000Z\", \"references\": [{\"url\": \"https://support.citrix.com/article/CTX678035\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\\u00a0in\\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cb\u003e\u003cspan style=\\\"background-color: transparent;\\\"\u003eLocal Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u0026nbsp;\u003c/span\u003e\u003c/b\u003ein\u0026nbsp;\u003cspan style=\\\"background-color: transparent;\\\"\u003eVirtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS\u003c/span\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"e437aed5-38e0-4fa3-a98b-cb73e7acaec6\", \"shortName\": \"Citrix\", \"dateUpdated\": \"2024-07-10T20:21:25.554Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-6151\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:33:04.965Z\", \"dateReserved\": \"2024-06-18T21:14:34.928Z\", \"assignerOrgId\": \"e437aed5-38e0-4fa3-a98b-cb73e7acaec6\", \"datePublished\": \"2024-07-10T20:21:25.554Z\", \"assignerShortName\": \"Citrix\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-QCJC-4PGC-2W7H
Vulnerability from github – Published: 2024-07-10 21:30 – Updated: 2025-07-25 18:30Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS
{
"affected": [],
"aliases": [
"CVE-2024-6151"
],
"database_specific": {
"cwe_ids": [
"CWE-269"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-10T21:15:11Z",
"severity": "HIGH"
},
"details": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS",
"id": "GHSA-qcjc-4pgc-2w7h",
"modified": "2025-07-25T18:30:33Z",
"published": "2024-07-10T21:30:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6151"
},
{
"type": "WEB",
"url": "https://support.citrix.com/article/CTX678035"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
CERTFR-2024-AVI-0563
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Citrix. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | N/A | Provisioning versions antérieures à 2402 | ||
| Citrix | N/A | NetScaler Agent versions 13.1.x antérieures à 13.1-53.22 | ||
| Citrix | N/A | Virtual Apps and Desktops 2203 LTSR versions antérieures à CU5 | ||
| Citrix | N/A | NetScaler Console versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | Workspace app pour Windows versions antérieures à 2403.1 | ||
| Citrix | N/A | NetScaler ADC et NetScaler Gateway versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | NetScaler Console versions 13.1.x antérieures à 13.1-53.22 | ||
| Citrix | N/A | Provisioning versions antérieures à 2203 LTSR CU5 | ||
| Citrix | N/A | Virtual Apps and Desktops 1912 LTSR versions antérieures à CU9 | ||
| Citrix | N/A | NetScaler ADC et NetScaler Gateway versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | Provisioning versions antérieures à 1912 LTSR CU9 | ||
| Citrix | N/A | NetScaler ADC 12.1-FIPS versions antérieures à 12.1-55.304 | ||
| Citrix | N/A | Workspace app pour Windows versions antérieures à 2402 LTSR | ||
| Citrix | N/A | NetScaler Agent versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | NetScaler Console versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | NetScaler SVM versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | NetScaler SVM versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | Virtual Apps and Desktops versions antérieures à 2402 | ||
| Citrix | N/A | Workspace app pour HTML5 versions antérieures à 2404.1 | ||
| Citrix | N/A | NetScaler ADC et NetScaler Gateway versions 13.1.x antérieures à 13.1-53.17 | ||
| Citrix | N/A | NetScaler Agent versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | NetScaler SVM versions 13.1.x antérieures à 13.1-53.17 | ||
| Citrix | N/A | NetScaler ADC 12.1-NDcPP versions antérieures à 12.1-55.304 | ||
| Citrix | N/A | NetScaler ADC 13.1-FIPS versions antérieures à 13.1-37.183 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Provisioning versions ant\u00e9rieures \u00e0 2402",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Agent versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Virtual Apps and Desktops 2203 LTSR versions ant\u00e9rieures \u00e0 CU5",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Console versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Workspace app pour Windows versions ant\u00e9rieures \u00e0 2403.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC et NetScaler Gateway versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Console versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Provisioning versions ant\u00e9rieures \u00e0 2203 LTSR CU5",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Virtual Apps and Desktops 1912 LTSR versions ant\u00e9rieures \u00e0 CU9",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC et NetScaler Gateway versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Provisioning versions ant\u00e9rieures \u00e0 1912 LTSR CU9",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC 12.1-FIPS versions ant\u00e9rieures \u00e0 12.1-55.304",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Workspace app pour Windows versions ant\u00e9rieures \u00e0 2402 LTSR",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Agent versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Console versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler SVM versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler SVM versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Virtual Apps and Desktops versions ant\u00e9rieures \u00e0 2402",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Workspace app pour HTML5 versions ant\u00e9rieures \u00e0 2404.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC et NetScaler Gateway versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Agent versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler SVM versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC 12.1-NDcPP versions ant\u00e9rieures \u00e0 12.1-55.304",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC 13.1-FIPS versions ant\u00e9rieures \u00e0 13.1-37.183",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-5491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5491"
},
{
"name": "CVE-2024-6236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6236"
},
{
"name": "CVE-2024-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6286"
},
{
"name": "CVE-2024-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6151"
},
{
"name": "CVE-2024-6148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6148"
},
{
"name": "CVE-2024-6235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6235"
},
{
"name": "CVE-2024-5492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5492"
},
{
"name": "CVE-2024-6149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6149"
},
{
"name": "CVE-2024-6150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6150"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Citrix. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678037",
"url": "https://support.citrix.com/article/CTX678037"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678035",
"url": "https://support.citrix.com/article/CTX678035"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678025",
"url": "https://support.citrix.com/article/CTX678025"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678036",
"url": "https://support.citrix.com/article/CTX678036"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX677998",
"url": "https://support.citrix.com/article/CTX677998"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX677944",
"url": "https://support.citrix.com/article/CTX677944"
}
]
}
CERTFR-2024-AVI-0563
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Citrix. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | N/A | Provisioning versions antérieures à 2402 | ||
| Citrix | N/A | NetScaler Agent versions 13.1.x antérieures à 13.1-53.22 | ||
| Citrix | N/A | Virtual Apps and Desktops 2203 LTSR versions antérieures à CU5 | ||
| Citrix | N/A | NetScaler Console versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | Workspace app pour Windows versions antérieures à 2403.1 | ||
| Citrix | N/A | NetScaler ADC et NetScaler Gateway versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | NetScaler Console versions 13.1.x antérieures à 13.1-53.22 | ||
| Citrix | N/A | Provisioning versions antérieures à 2203 LTSR CU5 | ||
| Citrix | N/A | Virtual Apps and Desktops 1912 LTSR versions antérieures à CU9 | ||
| Citrix | N/A | NetScaler ADC et NetScaler Gateway versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | Provisioning versions antérieures à 1912 LTSR CU9 | ||
| Citrix | N/A | NetScaler ADC 12.1-FIPS versions antérieures à 12.1-55.304 | ||
| Citrix | N/A | Workspace app pour Windows versions antérieures à 2402 LTSR | ||
| Citrix | N/A | NetScaler Agent versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | NetScaler Console versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | NetScaler SVM versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | NetScaler SVM versions 13.0.x antérieures à 13.0-92.31 | ||
| Citrix | N/A | Virtual Apps and Desktops versions antérieures à 2402 | ||
| Citrix | N/A | Workspace app pour HTML5 versions antérieures à 2404.1 | ||
| Citrix | N/A | NetScaler ADC et NetScaler Gateway versions 13.1.x antérieures à 13.1-53.17 | ||
| Citrix | N/A | NetScaler Agent versions 14.1.x antérieures à 14.1-25.53 | ||
| Citrix | N/A | NetScaler SVM versions 13.1.x antérieures à 13.1-53.17 | ||
| Citrix | N/A | NetScaler ADC 12.1-NDcPP versions antérieures à 12.1-55.304 | ||
| Citrix | N/A | NetScaler ADC 13.1-FIPS versions antérieures à 13.1-37.183 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Provisioning versions ant\u00e9rieures \u00e0 2402",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Agent versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Virtual Apps and Desktops 2203 LTSR versions ant\u00e9rieures \u00e0 CU5",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Console versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Workspace app pour Windows versions ant\u00e9rieures \u00e0 2403.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC et NetScaler Gateway versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Console versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Provisioning versions ant\u00e9rieures \u00e0 2203 LTSR CU5",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Virtual Apps and Desktops 1912 LTSR versions ant\u00e9rieures \u00e0 CU9",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC et NetScaler Gateway versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Provisioning versions ant\u00e9rieures \u00e0 1912 LTSR CU9",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC 12.1-FIPS versions ant\u00e9rieures \u00e0 12.1-55.304",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Workspace app pour Windows versions ant\u00e9rieures \u00e0 2402 LTSR",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Agent versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Console versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler SVM versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler SVM versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Virtual Apps and Desktops versions ant\u00e9rieures \u00e0 2402",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Workspace app pour HTML5 versions ant\u00e9rieures \u00e0 2404.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC et NetScaler Gateway versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler Agent versions 14.1.x ant\u00e9rieures \u00e0 14.1-25.53",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler SVM versions 13.1.x ant\u00e9rieures \u00e0 13.1-53.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC 12.1-NDcPP versions ant\u00e9rieures \u00e0 12.1-55.304",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "NetScaler ADC 13.1-FIPS versions ant\u00e9rieures \u00e0 13.1-37.183",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-5491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5491"
},
{
"name": "CVE-2024-6236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6236"
},
{
"name": "CVE-2024-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6286"
},
{
"name": "CVE-2024-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6151"
},
{
"name": "CVE-2024-6148",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6148"
},
{
"name": "CVE-2024-6235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6235"
},
{
"name": "CVE-2024-5492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5492"
},
{
"name": "CVE-2024-6149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6149"
},
{
"name": "CVE-2024-6150",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6150"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Citrix. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678037",
"url": "https://support.citrix.com/article/CTX678037"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678035",
"url": "https://support.citrix.com/article/CTX678035"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678025",
"url": "https://support.citrix.com/article/CTX678025"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX678036",
"url": "https://support.citrix.com/article/CTX678036"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX677998",
"url": "https://support.citrix.com/article/CTX677998"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX677944",
"url": "https://support.citrix.com/article/CTX677944"
}
]
}
BDU:2024-06441
Vulnerability from fstec - Published: 18.06.2024{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Citrix Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 2402 (Citrix Virtual Apps and Desktops (CVAD)), \u0434\u043e 1912 LTSR CU9 (Citrix Virtual Apps and Desktops (CVAD)), \u0434\u043e 2203 LTSR CU5 (Citrix Virtual Apps and Desktops (CVAD)), \u0434\u043e 2402 LTSR (Citrix Virtual Apps and Desktops (CVAD))",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://support.citrix.com/article/CTX678035",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "18.06.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "26.08.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.08.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-06441",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-6151",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Citrix Virtual Apps and Desktops (CVAD)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Virtual Delivery Agent for Windows \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 Citrix Virtual Apps \u0438 Desktops (CVAD) (\u0440\u0430\u043d\u0435\u0435 XenApp \u0438 XenDesktop), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 (CWE-269)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Virtual Delivery Agent for Windows \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 Citrix Virtual Apps \u0438 Desktops (CVAD) (\u0440\u0430\u043d\u0435\u0435 XenApp \u0438 XenDesktop) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://support.citrix.com/article/CTX678035\nhttps://vuldb.com/?id.270889\nhttps://www.cybersecurity-help.cz/vdb/SB2024071064",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-269",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
WID-SEC-W-2024-1561
Vulnerability from csaf_certbund - Published: 2024-07-09 22:00 - Updated: 2024-07-09 22:00Es besteht eine Schwachstelle in Citrix Systems Virtual Apps and Desktops, die auf eine unsachgemäße Verwaltung von Berechtigungen zurückzuführen ist. Ein lokaler Angreifer mit geringen Rechten könnte diese Schwachstelle ausnutzen, um Systemrechte zu erlangen.
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Citrix Virtual Apps and Desktops ist eine L\u00f6sung zur Anwendungsvirtualisierung.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Citrix Systems Virtual Apps and Desktops ausnutzen, um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1561 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1561.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1561 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1561"
},
{
"category": "external",
"summary": "Citrix Security Bulletin vom 2024-07-09",
"url": "https://support.citrix.com/article/CTX678035/windows-virtual-delivery-agent-for-cvad-and-citrix-daas-security-bulletin-cve20246151"
}
],
"source_lang": "en-US",
"title": "Citrix Systems Virtual Apps and Desktops: Schwachstelle erm\u00f6glicht Privilegieneskalation",
"tracking": {
"current_release_date": "2024-07-09T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:11:04.259+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-1561",
"initial_release_date": "2024-07-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2402",
"product": {
"name": "Citrix Systems Virtual Apps and Desktops \u003c2402",
"product_id": "T035979"
}
},
{
"category": "product_version_range",
"name": "LTSR \u003c1912 CU9",
"product": {
"name": "Citrix Systems Virtual Apps and Desktops LTSR \u003c1912 CU9",
"product_id": "T035980"
}
},
{
"category": "product_version_range",
"name": "LTSR \u003c2203 CU5",
"product": {
"name": "Citrix Systems Virtual Apps and Desktops LTSR \u003c2203 CU5",
"product_id": "T035981"
}
}
],
"category": "product_name",
"name": "Virtual Apps and Desktops"
}
],
"category": "vendor",
"name": "Citrix Systems"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6151",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in Citrix Systems Virtual Apps and Desktops, die auf eine unsachgem\u00e4\u00dfe Verwaltung von Berechtigungen zur\u00fcckzuf\u00fchren ist. Ein lokaler Angreifer mit geringen Rechten k\u00f6nnte diese Schwachstelle ausnutzen, um Systemrechte zu erlangen."
}
],
"release_date": "2024-07-09T22:00:00.000+00:00",
"title": "CVE-2024-6151"
}
]
}
FKIE_CVE-2024-6151
Vulnerability from fkie_nvd - Published: 2024-07-10 21:15 - Updated: 2025-07-25 15:40| URL | Tags | ||
|---|---|---|---|
| secure@citrix.com | https://support.citrix.com/article/CTX678035 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX678035 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| citrix | virtual_apps_and_desktops | * | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 1912 | |
| citrix | virtual_apps_and_desktops | 2203 | |
| citrix | virtual_apps_and_desktops | 2203 | |
| citrix | virtual_apps_and_desktops | 2203 | |
| citrix | virtual_apps_and_desktops | 2203 | |
| citrix | virtual_apps_and_desktops | 2203 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:-:*:*:*",
"matchCriteriaId": "145B0427-AFE9-4C0E-AABB-A460F4D4A690",
"versionEndIncluding": "2311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:-:*:*:ltsr:*:*:*",
"matchCriteriaId": "F9330183-B04B-46F1-9DA6-5EAF216DFCC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu1:*:*:ltsr:*:*:*",
"matchCriteriaId": "A2486FD4-AF16-4F57-836A-42A2D11012C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu2:*:*:ltsr:*:*:*",
"matchCriteriaId": "1BF66372-CFDC-42DD-87FA-480DC0565977",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu3:*:*:ltsr:*:*:*",
"matchCriteriaId": "AE1E7523-EEB7-46CE-A01E-04FACB407395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu4:*:*:ltsr:*:*:*",
"matchCriteriaId": "0B60552E-923B-4064-96D9-0F565C58695C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu5:*:*:ltsr:*:*:*",
"matchCriteriaId": "21EC9092-FCA9-41AA-9A9B-83D7E3DABB2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu6:*:*:ltsr:*:*:*",
"matchCriteriaId": "5353646C-E3FB-4315-83C7-D6EEE258C964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu7:*:*:ltsr:*:*:*",
"matchCriteriaId": "0A7169FA-E416-436B-B9D1-6249E0E1BC16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:1912:cu8:*:*:ltsr:*:*:*",
"matchCriteriaId": "C85E0F97-4718-4DF4-A05F-2F5E5DFD812F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:-:*:*:ltsr:*:*:*",
"matchCriteriaId": "8AE1E7FC-9E2C-45BC-9F12-43149210D261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu1:*:*:ltsr:*:*:*",
"matchCriteriaId": "0AEBE958-3A73-4F9D-932E-62495408A609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu2:*:*:ltsr:*:*:*",
"matchCriteriaId": "BBD9FA8E-333E-4231-9F7D-08A604D065AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu3:*:*:ltsr:*:*:*",
"matchCriteriaId": "9E928A6F-EEAF-4142-BA77-30845345C28D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:cu4:*:*:ltsr:*:*:*",
"matchCriteriaId": "C19DD0C7-197B-456C-B682-99D0862B1F98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in\u00a0Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS"
},
{
"lang": "es",
"value": "La escalada de privilegios locales permite a un usuario con pocos privilegios obtener privilegios de SYSTEM en Virtual Delivery Agent para Windows utilizado por Citrix Virtual Apps and Desktops y Citrix DaaS."
}
],
"id": "CVE-2024-6151",
"lastModified": "2025-07-25T15:40:09.120",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "secure@citrix.com",
"type": "Secondary"
}
]
},
"published": "2024-07-10T21:15:11.013",
"references": [
{
"source": "secure@citrix.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.citrix.com/article/CTX678035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.citrix.com/article/CTX678035"
}
],
"sourceIdentifier": "secure@citrix.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
NCSC-2024-0288
Vulnerability from csaf_ncscnl - Published: 2024-07-10 13:54 - Updated: 2024-07-11 15:05| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
netscaler_application_delivery_controller
citrix
|
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:*:*:*:*
|
— | |
|
netscaler_gateway
citrix
|
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_adc:14.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_adc:13.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_adc:13.0:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_adc:13.1-fips:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_adc:12.1-fips:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_adc:12.1-ndcpp:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
netscaler_application_delivery_controller
citrix
|
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:*:*:*:*
|
— | |
|
netscaler_gateway
citrix
|
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netscaler
|
cpe:2.3:a:netscaler:netscaler_adc:14.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netscaler
|
cpe:2.3:a:netscaler:netscaler_adc:13.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netscaler
|
cpe:2.3:a:netscaler:netscaler_adc:13.0:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netscaler
|
cpe:2.3:a:netscaler:netscaler_adc:13.1-fips:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netscaler
|
cpe:2.3:a:netscaler:netscaler_adc:12.1-fips:*:*:*:*:*:*:*
|
— | |
|
netscaler_adc
netscaler
|
cpe:2.3:a:netscaler:netscaler_adc:12.1-ndcpp:*:*:*:*:*:*:*
|
— | |
|
netscaler_gateway
netscaler
|
cpe:2.3:a:netscaler:netscaler_gateway:14.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_gateway
netscaler
|
cpe:2.3:a:netscaler:netscaler_gateway:13.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_gateway
netscaler
|
cpe:2.3:a:netscaler:netscaler_gateway:13.0:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
citrix_workspace_app_for_windows
citrix
|
cpe:2.3:a:citrix:citrix_workspace_app_for_windows:2403:*:*:*:*:*:*:*
|
— | |
|
citrix_workspace_app_for_windows
citrix
|
cpe:2.3:a:citrix:citrix_workspace_app_for_windows:2402_ltsr:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
netscaler_console
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_console:14.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_console
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_console:13.1:*:*:*:*:*:*:*
|
— | |
|
netscaler_console
netsclaer
|
cpe:2.3:a:netsclaer:netscaler_console:13.0:*:*:*:*:*:*:*
|
— | |
|
agent
netscaler
|
cpe:2.3:a:netscaler:agent:14.1:*:*:*:*:*:*:*
|
— | |
|
agent
netscaler
|
cpe:2.3:a:netscaler:agent:13.1:*:*:*:*:*:*:*
|
— | |
|
agent
netscaler
|
cpe:2.3:a:netscaler:agent:13.0:*:*:*:*:*:*:*
|
— | |
|
sdx
netscaler
|
cpe:2.3:a:netscaler:sdx:14.1:*:*:*:*:*:*:*
|
— | |
|
sdx
netscaler
|
cpe:2.3:a:netscaler:sdx:13.1:*:*:*:*:*:*:*
|
— | |
|
sdx
netscaler
|
cpe:2.3:a:netscaler:sdx:13.0:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
virtual_apps_and_desktops
citrix
|
cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:*:*:*:*
|
— | |
|
windows_virtual_delivery_agent
citrix
|
cpe:2.3:a:citrix:windows_virtual_delivery_agent:2402:*:*:*:*:*:*:*
|
— | |
|
windows_virtual_delivery_agent
citrix
|
cpe:2.3:a:citrix:windows_virtual_delivery_agent:1912_ltsr:*:*:*:*:*:*:*
|
— | |
|
windows_virtual_delivery_agent
citrix
|
cpe:2.3:a:citrix:windows_virtual_delivery_agent:2203_ltsr:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
citrix_provisioning
citrix
|
cpe:2.3:a:citrix:citrix_provisioning:2402:*:*:*:*:*:*:*
|
— | |
|
citrix_provisioning
citrix
|
cpe:2.3:a:citrix:citrix_provisioning:22.3_ltsr:*:*:*:*:*:*:*
|
— | |
|
citrix_provisioning
citrix
|
cpe:2.3:a:citrix:citrix_provisioning:1912_ltsr:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
citrix_workspace_app_for_html5
citrix
|
cpe:2.3:a:citrix:citrix_workspace_app_for_html5:2404:*:*:*:*:*:*:*
|
— |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Cirtix heeft een aantal kwetsbaarheden verholpen in Workspace, NetScaler ADC en NetScaler Gateway",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n * Denial-of-Service (DoS)\n * Manipulatie van gegevens\n * Verhoogde gebruikersrechten",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Citrix heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Voor meer informatie, zie bijgevoegde referenties.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - first",
"url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5491"
},
{
"category": "external",
"summary": "Source - first",
"url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5492"
},
{
"category": "external",
"summary": "Source - first",
"url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6148"
},
{
"category": "external",
"summary": "Source - first",
"url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6150"
},
{
"category": "external",
"summary": "Source - first",
"url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6151"
},
{
"category": "external",
"summary": "Source - first",
"url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6236"
},
{
"category": "external",
"summary": "Source - first",
"url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6286"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5491"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5492"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6148"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6150"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6151"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6236"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6286"
},
{
"category": "external",
"summary": "Source - certbundde",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1557.json"
},
{
"category": "external",
"summary": "Source - certbundde",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1558.json"
},
{
"category": "external",
"summary": "Source - certbundde",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1559.json"
},
{
"category": "external",
"summary": "Source - certbundde",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1561.json"
},
{
"category": "external",
"summary": "Source - certbundde",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1577.json"
},
{
"category": "external",
"summary": "Source - cveprojectv5",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5491"
},
{
"category": "external",
"summary": "Source - cveprojectv5",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5492"
},
{
"category": "external",
"summary": "Source - cveprojectv5",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6148"
},
{
"category": "external",
"summary": "Source - cveprojectv5",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6150"
},
{
"category": "external",
"summary": "Source - cveprojectv5",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6151"
},
{
"category": "external",
"summary": "Source - cveprojectv5",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6236"
},
{
"category": "external",
"summary": "Source - cveprojectv5",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6286"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://support.citrix.com/article/CTX677944/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20245491-and-cve20245492"
},
{
"category": "external",
"summary": "Reference - certbundde",
"url": "https://support.citrix.com/article/CTX677998/netscaler-console-agent-and-svm-security-bulletin-for-cve20246235-and-cve20246236"
},
{
"category": "external",
"summary": "Reference - certbundde",
"url": "https://support.citrix.com/article/CTX678035/windows-virtual-delivery-agent-for-cvad-and-citrix-daas-security-bulletin-cve20246151"
},
{
"category": "external",
"summary": "Reference - certbundde",
"url": "https://support.citrix.com/article/CTX678036/citrix-workspace-app-for-windows-security-bulletin-cve20246286"
},
{
"category": "external",
"summary": "Reference - certbundde",
"url": "https://support.citrix.com/article/CTX678037/citrix-workspace-app-for-html5-security-bulletin-cve20246148-and-cve20246149"
}
],
"title": "Kwetsbaarheden verholpen in Citrix Workspace, NetScaler ADC en NetScaler Gateway",
"tracking": {
"current_release_date": "2024-07-11T15:05:36.608570Z",
"id": "NCSC-2024-0288",
"initial_release_date": "2024-07-10T13:54:21.933605Z",
"revision_history": [
{
"date": "2024-07-10T13:54:21.933605Z",
"number": "0",
"summary": "Initiele versie"
},
{
"date": "2024-07-11T15:05:36.608570Z",
"number": "1",
"summary": "De volgende CVE\u0027s zijn toegevoegd:\n* CVE-2024-6286\n* CVE-2024-2636\n* CVE-2024-6151\n* CVE-2024-6150\n* CVE-2024-6748"
}
],
"status": "final",
"version": "1.0.1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "netscaler_console",
"product": {
"name": "netscaler_console",
"product_id": "CSAFPID-1499415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_console:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_console",
"product": {
"name": "netscaler_console",
"product_id": "CSAFPID-1499414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_console:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499376",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_adc:12.1-fips:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_adc:12.1-ndcpp:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499374",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_adc:13.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499375",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_adc:13.1-fips:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499373",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_adc:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499372",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_adc:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_console",
"product": {
"name": "netscaler_console",
"product_id": "CSAFPID-1499416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netsclaer:netscaler_console:13.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "netsclaer"
},
{
"branches": [
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-195679",
"product_identification_helper": {
"cpe": "cpe:2.3:h:citrix:netscaler_application_delivery_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway",
"product": {
"name": "netscaler_gateway",
"product_id": "CSAFPID-618244",
"product_identification_helper": {
"cpe": "cpe:2.3:h:citrix:netscaler_gateway:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway_firmware",
"product": {
"name": "netscaler_gateway_firmware",
"product_id": "CSAFPID-219738",
"product_identification_helper": {
"cpe": "cpe:2.3:o:citrix:netscaler_gateway_firmware:13.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway_firmware",
"product": {
"name": "netscaler_gateway_firmware",
"product_id": "CSAFPID-219736",
"product_identification_helper": {
"cpe": "cpe:2.3:o:citrix:netscaler_gateway_firmware:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway_firmware",
"product": {
"name": "netscaler_gateway_firmware",
"product_id": "CSAFPID-1498868",
"product_identification_helper": {
"cpe": "cpe:2.3:o:citrix:netscaler_gateway_firmware:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_delivery_management",
"product": {
"name": "application_delivery_management",
"product_id": "CSAFPID-730743",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:application_delivery_management:13.0:-:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_delivery_management",
"product": {
"name": "application_delivery_management",
"product_id": "CSAFPID-1499328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:application_delivery_management:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_delivery_management",
"product": {
"name": "application_delivery_management",
"product_id": "CSAFPID-1499327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:application_delivery_management:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "citrix_provisioning",
"product": {
"name": "citrix_provisioning",
"product_id": "CSAFPID-1499406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:citrix_provisioning:1912_ltsr:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "citrix_provisioning",
"product": {
"name": "citrix_provisioning",
"product_id": "CSAFPID-1499405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:citrix_provisioning:22.3_ltsr:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "citrix_provisioning",
"product": {
"name": "citrix_provisioning",
"product_id": "CSAFPID-1499404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:citrix_provisioning:2402:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "citrix_workspace_app_for_html5",
"product": {
"name": "citrix_workspace_app_for_html5",
"product_id": "CSAFPID-1499498",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:citrix_workspace_app_for_html5:2404:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "citrix_workspace_app_for_windows",
"product": {
"name": "citrix_workspace_app_for_windows",
"product_id": "CSAFPID-1499408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:citrix_workspace_app_for_windows:2402_ltsr:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "citrix_workspace_app_for_windows",
"product": {
"name": "citrix_workspace_app_for_windows",
"product_id": "CSAFPID-1499407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:citrix_workspace_app_for_windows:2403:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_agent",
"product": {
"name": "netscaler_agent",
"product_id": "CSAFPID-1498494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-681827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-226051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:fips:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-226052",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:ndcpp:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-795258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-795257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-226046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:fips:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_application_delivery_controller",
"product": {
"name": "netscaler_application_delivery_controller",
"product_id": "CSAFPID-795255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_console",
"product": {
"name": "netscaler_console",
"product_id": "CSAFPID-1498495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway",
"product": {
"name": "netscaler_gateway",
"product_id": "CSAFPID-226010",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_svm",
"product": {
"name": "netscaler_svm",
"product_id": "CSAFPID-1498496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:netscaler_svm:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "provisioning_services",
"product": {
"name": "provisioning_services",
"product_id": "CSAFPID-1499324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:provisioning_services:-:*:*:*:ltsr:*:*:*"
}
}
},
{
"category": "product_name",
"name": "provisioning_services",
"product": {
"name": "provisioning_services",
"product_id": "CSAFPID-1499325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:provisioning_services:2203:*:*:*:ltsr:*:*:*"
}
}
},
{
"category": "product_name",
"name": "virtual_apps_and_desktops",
"product": {
"name": "virtual_apps_and_desktops",
"product_id": "CSAFPID-457601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:virtual_apps_and_desktops:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "virtual_apps_and_desktops",
"product": {
"name": "virtual_apps_and_desktops",
"product_id": "CSAFPID-1499326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:virtual_apps_and_desktops:2203:*:ltsr:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_virtual_delivery_agent",
"product": {
"name": "windows_virtual_delivery_agent",
"product_id": "CSAFPID-1499412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:windows_virtual_delivery_agent:1912_ltsr:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_virtual_delivery_agent",
"product": {
"name": "windows_virtual_delivery_agent",
"product_id": "CSAFPID-1499413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:windows_virtual_delivery_agent:2203_ltsr:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_virtual_delivery_agent",
"product": {
"name": "windows_virtual_delivery_agent",
"product_id": "CSAFPID-1499411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:windows_virtual_delivery_agent:2402:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "workspace_app",
"product": {
"name": "workspace_app",
"product_id": "CSAFPID-1454897",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:workspace_app:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "workspace",
"product": {
"name": "workspace",
"product_id": "CSAFPID-355107",
"product_identification_helper": {
"cpe": "cpe:2.3:a:citrix:workspace:-:*:*:*:ltsr:windows:*:*"
}
}
}
],
"category": "vendor",
"name": "citrix"
},
{
"branches": [
{
"category": "product_name",
"name": "agent",
"product": {
"name": "agent",
"product_id": "CSAFPID-1499419",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:agent:13.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "agent",
"product": {
"name": "agent",
"product_id": "CSAFPID-1499418",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:agent:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "agent",
"product": {
"name": "agent",
"product_id": "CSAFPID-1499417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:agent:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_adc:12.1-fips:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_adc:12.1-ndcpp:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_adc:13.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_adc:13.1-fips:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_adc:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_adc",
"product": {
"name": "netscaler_adc",
"product_id": "CSAFPID-1499379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_adc:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway",
"product": {
"name": "netscaler_gateway",
"product_id": "CSAFPID-1499387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_gateway:13.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway",
"product": {
"name": "netscaler_gateway",
"product_id": "CSAFPID-1499386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_gateway:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "netscaler_gateway",
"product": {
"name": "netscaler_gateway",
"product_id": "CSAFPID-1499385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:netscaler_gateway:14.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sdx",
"product": {
"name": "sdx",
"product_id": "CSAFPID-1499422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:sdx:13.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sdx",
"product": {
"name": "sdx",
"product_id": "CSAFPID-1499421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:sdx:13.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sdx",
"product": {
"name": "sdx",
"product_id": "CSAFPID-1499420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:netscaler:sdx:14.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "netscaler"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5492",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-681827",
"CSAFPID-226010",
"CSAFPID-1499372",
"CSAFPID-1499373",
"CSAFPID-1499374",
"CSAFPID-1499375",
"CSAFPID-1499376",
"CSAFPID-1499377"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5492.json"
}
],
"title": "CVE-2024-5492"
},
{
"cve": "CVE-2024-5491",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-681827",
"CSAFPID-226010",
"CSAFPID-1499379",
"CSAFPID-1499380",
"CSAFPID-1499381",
"CSAFPID-1499382",
"CSAFPID-1499383",
"CSAFPID-1499384",
"CSAFPID-1499385",
"CSAFPID-1499386",
"CSAFPID-1499387"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5491.json"
}
],
"title": "CVE-2024-5491"
},
{
"cve": "CVE-2024-6286",
"product_status": {
"known_affected": [
"CSAFPID-1499407",
"CSAFPID-1499408"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6286",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6286.json"
}
],
"title": "CVE-2024-6286"
},
{
"cve": "CVE-2024-6236",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1499414",
"CSAFPID-1499415",
"CSAFPID-1499416",
"CSAFPID-1499417",
"CSAFPID-1499418",
"CSAFPID-1499419",
"CSAFPID-1499420",
"CSAFPID-1499421",
"CSAFPID-1499422"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6236.json"
}
],
"title": "CVE-2024-6236"
},
{
"cve": "CVE-2024-6151",
"product_status": {
"known_affected": [
"CSAFPID-457601",
"CSAFPID-1499411",
"CSAFPID-1499412",
"CSAFPID-1499413"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6151",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6151.json"
}
],
"title": "CVE-2024-6151"
},
{
"cve": "CVE-2024-6150",
"product_status": {
"known_affected": [
"CSAFPID-1499404",
"CSAFPID-1499405",
"CSAFPID-1499406"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6150",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6150.json"
}
],
"title": "CVE-2024-6150"
},
{
"cve": "CVE-2024-6148",
"product_status": {
"known_affected": [
"CSAFPID-1499498"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6148",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6148.json"
}
],
"title": "CVE-2024-6148"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.