Citrix Access Gateway up to 4.4 Firmware Remote Code Execution
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.6 | $0-$5k | 0.00 |
Summary
A vulnerability identified as critical has been detected in Citrix Access Gateway up to 4.4. This vulnerability affects unknown code of the component Firmware. Performing a manipulation results in Remote Code Execution. This vulnerability is cataloged as CVE-2007-4018. There is no exploit available. You should upgrade the affected component.
Details
A vulnerability, which was classified as critical, was found in Citrix Access Gateway up to 4.4 (Connectivity Software). This affects some unknown functionality of the component Firmware. The manipulation with an unknown input leads to a remote code execution vulnerability. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Citrix Access Gateway Advanced Edition before firmware 4.5.5 allows attackers to redirect users to arbitrary web sites and conduct phishing attacks via unknown vectors.
The bug was discovered 07/19/2007. The weakness was shared 07/19/2007 by Paul with Corsaire (Website). It is possible to read the advisory at support.citrix.com. This vulnerability is uniquely identified as CVE-2007-4018 since 07/25/2007. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 1 days. During that time the estimated underground price was around $25k-$100k.
Upgrading to version 4.5 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (35512), SecurityFocus (BID 24975†), OSVDB (37840†), Secunia (SA26143†) and SecurityTracker (ID 1018435†). The entries VDB-38018, VDB-38017, VDB-38014 and VDB-37969 are related to this item. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.citrix.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.6
VulDB Base Score: 7.3
VulDB Temp Score: 6.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Access Gateway 4.5
Timeline
07/19/2007 🔍07/19/2007 🔍
07/19/2007 🔍
07/19/2007 🔍
07/20/2007 🔍
07/20/2007 🔍
07/20/2007 🔍
07/25/2007 🔍
07/25/2007 🔍
08/05/2007 🔍
03/15/2015 🔍
07/23/2019 🔍
Sources
Vendor: citrix.comAdvisory: support.citrix.com
Researcher: Paul
Organization: Corsaire
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2007-4018 (🔍)
GCVE (CVE): GCVE-0-2007-4018
GCVE (VulDB): GCVE-100-38019
X-Force: 35512
SecurityFocus: 24975 - Citrix Access Gateway Standard and Advanced Edition Multiple Remote Vulnerabilities
Secunia: 26143
OSVDB: 37840 - Citrix Access Gateway Advanced Edition Unspecified Site Redirection
SecurityTracker: 1018435
Vulnerability Center: 15763 - Citrix Access Gateway <4.5.5 Allows Redirection of Users to Web Sites and Phishing Attacks, Medium
Vupen: ADV-2007-2583
See also: 🔍
Entry
Created: 03/15/2015 15:58Updated: 07/23/2019 07:23
Changes: 03/15/2015 15:58 (73), 07/23/2019 07:23 (1)
Complete: 🔍
Cache ID: 216:F3B:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.