CVE-2019-6485
Published Feb 22, 2019
Last updated 4 years ago
Overview
- Description
- Citrix NetScaler Gateway 12.1 before build 50.31, 12.0 before build 60.9, 11.1 before build 60.14, 11.0 before build 72.17, and 10.5 before build 69.5 and Application Delivery Controller (ADC) 12.1 before build 50.31, 12.0 before build 60.9, 11.1 before build 60.14, 11.0 before build 72.17, and 10.5 before build 69.5 allow remote attackers to obtain sensitive plaintext information because of a TLS Padding Oracle Vulnerability when CBC-based cipher suites are enabled.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.9
- Impact score
- 3.6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-327
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E0FA8E2-3E8F-481E-8C39-FB00A9739DFC" }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2C6F82C-9969-4A6E-88C8-AB8BB0AAD3C7" }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5D73B9A-59AA-4A38-AEAF-7EAB0965CD7E" }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9F3ED0E-7F3D-477B-B645-77DA5FC7F502" }, { "criteria": "cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58349F8E-3177-413A-9CBE-BB454DCD31E4" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DEBB9B6A-1CAD-4D82-9B1E-939921986053" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8C7525B-2A2D-43AF-8DA0-11FF28322337" }, { "criteria": "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB678AF5-12B4-41D0-A381-46EE277313B7" }, { "criteria": "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "123D42E1-3CDD-4D46-82F6-8982DE716F7E" }, { "criteria": "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFCE3458-6750-4773-BA18-CAA67A6093D4" }, { "criteria": "cpe:2.3:o:citrix:netscaler_application_delivery_controller_firmware:12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28A1E3C0-5A62-4EAC-941C-DFAF0F277E5B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:netscaler_application_delivery_controller:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "81FD5100-3ADB-4C21-BCE5-CDA7C4C1D8B9" } ], "operator": "OR" } ], "operator": "AND" } ]