Vulnerabilites related to citrix - sd-wan_210
CVE-2022-20717 (GCVE-0-2022-20717)
Vulnerability from cvelistv5
Published
2022-04-15 14:15
Modified
2024-11-06 16:27
CWE
Summary
A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:49.363Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220413 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20717",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T15:59:05.080616Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T16:27:31.894Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco SD-WAN vEdge router",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-789",
              "description": "CWE-789",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-15T14:15:28",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220413 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sdwan-vedge-dos-jerVm4bB",
        "defect": [
          [
            "CSCvt55609"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-04-13T16:00:00",
          "ID": "CVE-2022-20717",
          "STATE": "PUBLIC",
          "TITLE": "Cisco SD-WAN vEdge Routers Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco SD-WAN vEdge router",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "5.5",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-789"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220413 Cisco SD-WAN vEdge Routers Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-sdwan-vedge-dos-jerVm4bB",
          "defect": [
            [
              "CSCvt55609"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20717",
    "datePublished": "2022-04-15T14:15:28.491430Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-06T16:27:31.894Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-2049 (GCVE-0-2024-2049)
Vulnerability from cvelistv5
Published
2024-03-12 12:39
Modified
2025-04-15 15:26
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
Summary
Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium Editions on or after 11.4.0 and before 11.4.4.46 allows an attacker to disclose limited information from the appliance via Access to management IP.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:citrix:citrix_sd_wan_standard_edition:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "citrix_sd_wan_standard_edition",
            "vendor": "citrix",
            "versions": [
              {
                "lessThan": "11.4.4.46",
                "status": "affected",
                "version": "11.4",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:citrix:citrix_sd_wan_premium_edition:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "citrix_sd_wan_premium_edition",
            "vendor": "citrix",
            "versions": [
              {
                "lessThan": "11.4.4.46",
                "status": "affected",
                "version": "11.4",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-2049",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-12T16:19:03.842656Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-15T15:26:57.364Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T19:03:37.853Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.citrix.com/article/CTX617071/citrix-sdwan-security-bulletin-for-cve20242049"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Citrix SD-WAN Standard/Premium Editions",
          "vendor": "Citrix",
          "versions": [
            {
              "lessThan": "11.4.4.46",
              "status": "affected",
              "version": "11.4",
              "versionType": "patch"
            }
          ]
        }
      ],
      "datePublic": "2024-03-12T12:26:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium Editions on or after 11.4.0 and before 11.4.4.46 allows an attacker to disclose limited information from the appliance via Access to management IP."
            }
          ],
          "value": "Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium Editions on or after 11.4.0 and before 11.4.4.46 allows an attacker to disclose limited information from the appliance via Access to management IP."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-12T12:43:50.905Z",
        "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
        "shortName": "Citrix"
      },
      "references": [
        {
          "url": "https://support.citrix.com/article/CTX617071/citrix-sdwan-security-bulletin-for-cve20242049"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Server-Side Request Forgery (SSRF)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
    "assignerShortName": "Citrix",
    "cveId": "CVE-2024-2049",
    "datePublished": "2024-03-12T12:39:45.077Z",
    "dateReserved": "2024-03-01T01:10:49.328Z",
    "dateUpdated": "2025-04-15T15:26:57.364Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-27505 (GCVE-0-2022-27505)
Vulnerability from cvelistv5
Published
2022-04-13 17:06
Modified
2024-09-16 19:15
Severity ?
CWE
  • CWE-79 - Cross-site Scripting (XSS)
Summary
Reflected cross site scripting (XSS)
References
Impacted products
Vendor Product Version
Citirx Citrix SD-WAN Version: unspecified   < Citrix SD-WAN Standard/Premium Edition Appliance versions 11.4.1a
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:32:57.951Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.citrix.com/article/CTX370550"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Citrix SD-WAN",
          "vendor": "Citirx",
          "versions": [
            {
              "lessThan": "Citrix SD-WAN Standard/Premium Edition Appliance versions 11.4.1a",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-04-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Reflected cross site scripting (XSS)"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-13T17:06:05",
        "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
        "shortName": "Citrix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.citrix.com/article/CTX370550"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@citrix.com",
          "DATE_PUBLIC": "2022-04-12T18:45:00.000Z",
          "ID": "CVE-2022-27505",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Citrix SD-WAN",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "Citrix SD-WAN Standard/Premium Edition Appliance versions 11.4.1a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Citirx"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Reflected cross site scripting (XSS)"
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Cross-site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.citrix.com/article/CTX370550",
              "refsource": "MISC",
              "url": "https://support.citrix.com/article/CTX370550"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
    "assignerShortName": "Citrix",
    "cveId": "CVE-2022-27505",
    "datePublished": "2022-04-13T17:06:05.551190Z",
    "dateReserved": "2022-03-21T00:00:00",
    "dateUpdated": "2024-09-16T19:15:53.220Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-27506 (GCVE-0-2022-27506)
Vulnerability from cvelistv5
Published
2022-04-13 17:06
Modified
2024-09-16 18:24
Severity ?
CWE
  • CWE-798 - Use of Hard-coded Credentials
Summary
Hard-coded credentials allow administrators to access the shell via the SD-WAN CLI
References
Impacted products
Vendor Product Version
Citirx Citrix SD-WAN Version: unspecified   < Citrix SD-WAN Center Management Console versions 11.4.3
Version: unspecified   < Citrix SD-WAN Standard/Premium Edition Appliance versions 11.4.1
Version: Citrix SD-WAN Orchestrator for On-Premises versions 13.2.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:32:57.947Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.citrix.com/article/CTX370550"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Citrix SD-WAN",
          "vendor": "Citirx",
          "versions": [
            {
              "lessThan": "Citrix SD-WAN Center Management Console versions 11.4.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "Citrix SD-WAN Standard/Premium Edition Appliance versions 11.4.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "Citrix SD-WAN Orchestrator for On-Premises versions 13.2.1"
            }
          ]
        }
      ],
      "datePublic": "2022-04-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Hard-coded credentials allow administrators to access the shell via the SD-WAN CLI"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-13T17:06:04",
        "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
        "shortName": "Citrix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.citrix.com/article/CTX370550"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@citrix.com",
          "DATE_PUBLIC": "2022-04-12T18:45:00.000Z",
          "ID": "CVE-2022-27506",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Citrix SD-WAN",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "Citrix SD-WAN Center Management Console versions 11.4.3"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "Citrix SD-WAN Standard/Premium Edition Appliance versions 11.4.1"
                          },
                          {
                            "version_value": "Citrix SD-WAN Orchestrator for On-Premises versions 13.2.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Citirx"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hard-coded credentials allow administrators to access the shell via the SD-WAN CLI"
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-798 Use of Hard-coded Credentials"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.citrix.com/article/CTX370550",
              "refsource": "MISC",
              "url": "https://support.citrix.com/article/CTX370550"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6",
    "assignerShortName": "Citrix",
    "cveId": "CVE-2022-27506",
    "datePublished": "2022-04-13T17:06:04.592555Z",
    "dateReserved": "2022-03-21T00:00:00",
    "dateUpdated": "2024-09-16T18:24:50.407Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2022-04-13 18:15
Modified
2024-11-21 06:55
Summary
Reflected cross site scripting (XSS)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_110_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "2C436C68-91E0-4DFC-B26E-704704373D11",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6062DBFF-04E4-48D9-A2A0-42BECE9E0EA2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_210_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "28F19F7F-119B-42CA-92AC-1EC0B5EA65EE",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42DBB6B2-E526-4C12-AED8-245D4E21A011",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_400_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "35137F80-2505-40D6-9703-6583724DB22F",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A63600-BD59-4B25-ABCF-EFCB78418AD7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_410_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "F8C3FE3D-8B46-4572-B107-4E1F05EB86E4",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_410:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B202D8C-2FDB-4B07-9633-E71849AC2FC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "C409D9FC-B097-4478-A2D2-9DA76BEE3CA4",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "81D5AB3E-4ECE-4BFF-97D5-054425DBF704",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99FC163D-E468-4D98-AE56-D4D29F5C05D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "7F7E28DC-C74A-4570-9DB6-FFD92C849468",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "B7EC24DB-4989-410E-9C32-5A40B3D580EB",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E387174A-1A9C-4A16-9F66-8158F06C89C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "62F61A9E-9E09-4D6F-9727-F0214F3A72F0",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "3AEC8FC2-F269-4027-B61C-B9B39C72662A",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2524E92A-D661-4F31-9026-2F182B68CDC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_4000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "B37E90C7-1A14-490A-B81C-5CF1311BAF00",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "252E9A75-976D-4FC1-97DF-4B9255E642A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_4100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "6A1E50D9-E102-4221-89F9-49D47254CC1A",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4755E090-6448-49DD-8977-2619A1F87C4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "111DB687-03BD-4E39-9233-02E58A6941D1",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "BFE3A49F-E388-4768-B1C6-DD999D0FCE3B",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C022A51A-6D37-4AA9-82B5-19F17EA581CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "4A978EBD-CB85-4E2B-A0CB-0C2A7342E9E0",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "DC6625CF-02B6-480A-AE4A-70DA7B54CC8A",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_6100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDF6BE4E-8242-411F-BF4B-DB472DCD33E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "985D9688-9456-4CDF-9C07-A37F43BFCFBB",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "DAC1DC52-75F1-4A40-B455-DCCFD1541929",
              "versionEndExcluding": "11.4.3a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3426DD26-48A7-408A-82B4-99CAA82804AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reflected cross site scripting (XSS)"
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de tipo cross site scripting (XSS) Reflejado"
    }
  ],
  "id": "CVE-2022-27505",
  "lastModified": "2024-11-21T06:55:51.400",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-13T18:15:14.360",
  "references": [
    {
      "source": "secure@citrix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.citrix.com/article/CTX370550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.citrix.com/article/CTX370550"
    }
  ],
  "sourceIdentifier": "secure@citrix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "secure@citrix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-13 18:15
Modified
2024-11-21 06:55
Summary
Hard-coded credentials allow administrators to access the shell via the SD-WAN CLI



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_110_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "035D0592-FED6-4127-8725-D7999E34A0A9",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6062DBFF-04E4-48D9-A2A0-42BECE9E0EA2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_210_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "7AEE938D-5F3F-40B6-960C-4B0805D18682",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42DBB6B2-E526-4C12-AED8-245D4E21A011",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_400_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "B2395CF4-323B-47CA-9B28-FB5AF34C0BF3",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A63600-BD59-4B25-ABCF-EFCB78418AD7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_410_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "7D3A6676-A2BC-4404-ADC5-7744637B1BFB",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_410:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B202D8C-2FDB-4B07-9633-E71849AC2FC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "13664871-CB0E-4F90-A057-6B56B79BFAD9",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "95CC26F0-2155-4012-8334-898B4B5D3D37",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99FC163D-E468-4D98-AE56-D4D29F5C05D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "1FB72842-531F-489A-AB1E-8CB05EC067CF",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "21F0B949-C529-4C56-8A73-9838421D1A38",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E387174A-1A9C-4A16-9F66-8158F06C89C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "27EA7D6B-FBA9-4E4C-845C-B57A8D631E74",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "90078A87-D3A3-431C-BD4F-1B918D7BCDD4",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2524E92A-D661-4F31-9026-2F182B68CDC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_4000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "D701CD31-A84C-4785-B220-7D23CF43AEAE",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "252E9A75-976D-4FC1-97DF-4B9255E642A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_4100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "514969DB-34F6-4192-8A27-0AE8FAA0891A",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4755E090-6448-49DD-8977-2619A1F87C4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "0154E074-A23F-4EF3-A125-9257402292FA",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "359A4D35-8351-45D7-8C97-1D4E1681C753",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C022A51A-6D37-4AA9-82B5-19F17EA581CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "792958BF-4AA6-4054-8499-059DE1310862",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "34E631AA-544A-4816-B135-3E9C4C8AB461",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_6100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDF6BE4E-8242-411F-BF4B-DB472DCD33E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "DB4221AD-1C20-486E-8836-D43747572144",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "125EF509-F4D7-4347-A5DB-04934D3AA5FA",
              "versionEndExcluding": "11.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3426DD26-48A7-408A-82B4-99CAA82804AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:citrix:sd-wan_center_management_console:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "007CACD7-E5F3-4488-B25E-236DB298CB7D",
              "versionEndExcluding": "11.4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:citrix:sd-wan_orchestrator:*:*:*:*:on-premises:*:*:*",
              "matchCriteriaId": "E438CE24-2842-4B6B-9E51-893AFAD936EF",
              "versionEndExcluding": "13.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Hard-coded credentials allow administrators to access the shell via the SD-WAN CLI"
    },
    {
      "lang": "es",
      "value": "Unas credenciales embebidas permiten a administradores acceder al shell por medio de la CLI de SD-WAN"
    }
  ],
  "id": "CVE-2022-27506",
  "lastModified": "2024-11-21T06:55:51.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-13T18:15:14.527",
  "references": [
    {
      "source": "secure@citrix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.citrix.com/article/CTX370550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.citrix.com/article/CTX370550"
    }
  ],
  "sourceIdentifier": "secure@citrix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "secure@citrix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-15 15:15
Modified
2024-11-21 06:43
Summary
A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B7EA8D9-812D-4D62-A5A7-8994BDB0C8E5",
              "versionEndIncluding": "20.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:sd-wan_vedge_router:20.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FADAB8-5A72-4B9D-9E9C-91A69F53B441",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99FC163D-E468-4D98-AE56-D4D29F5C05D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6062DBFF-04E4-48D9-A2A0-42BECE9E0EA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3426DD26-48A7-408A-82B4-99CAA82804AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E387174A-1A9C-4A16-9F66-8158F06C89C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42DBB6B2-E526-4C12-AED8-245D4E21A011",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2524E92A-D661-4F31-9026-2F182B68CDC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C022A51A-6D37-4AA9-82B5-19F17EA581CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the NETCONF process of Cisco SD-WAN vEdge Routers could allow an authenticated, local attacker to cause an affected device to run out of memory, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient memory management when an affected device receives large amounts of traffic. An attacker could exploit this vulnerability by sending malicious traffic to an affected device. A successful exploit could allow the attacker to cause the device to crash, resulting in a DoS condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el proceso NETCONF de los routers Cisco SD-WAN vEdge podr\u00eda permitir a un atacante local autenticado causar a un dispositivo afectado quedarse sin memoria, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad es debido a una administraci\u00f3n insuficiente de la memoria cuando un dispositivo afectado recibe grandes cantidades de tr\u00e1fico. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de tr\u00e1fico malicioso a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar un bloqueo del dispositivo, resultando en una condici\u00f3n de DoS"
    }
  ],
  "id": "CVE-2022-20717",
  "lastModified": "2024-11-21T06:43:24.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-15T15:15:13.113",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vedge-dos-jerVm4bB"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-789"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-12 13:15
Modified
2025-07-25 15:36
Summary
Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium Editions on or after 11.4.0 and before 11.4.4.46 allows an attacker to disclose limited information from the appliance via Access to management IP.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "76CD1B07-1DD4-403E-843B-DF4DB5B351C6",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1000:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "B5438795-5950-47DE-AD87-82A2F4D6D568",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_110_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "85D31B36-E836-4A4B-B7B2-CD8E222C44F4",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_110:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "92435A9E-6673-4A7F-8283-F37B131BC4DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "64D38F42-3CB3-4B51-AB9E-75657CDE563B",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1100:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "9E3C0E94-BCDD-4957-8D9A-2B8F5EB70574",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "979F7E87-1C9B-460C-8171-1036BD645CCF",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2000:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "860D6524-264F-4F88-AAA3-7C4CA0EC55B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_210_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "BD7E15AA-74EF-4D64-8506-BFE42E9EAD9B",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_210:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "91CB177A-8EAE-456C-B559-2088E7CF8E32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "DE978723-D64A-45CD-B111-F73EA1C77A31",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2100:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "31195A4E-7EB1-4367-8AD2-A3AC253F5B78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_400_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "44103C47-C3C3-4BFF-A3AF-6A5E3942CE38",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_400:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "BE40B2DD-CD9D-4EB7-AAC0-4B1DB58A5DD0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_4000_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "41DC9108-6989-4E76-94DD-C45617CBEDEA",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_4000:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "A39BE60C-C539-4E5B-A483-4DBB9653470D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_410_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "874FC81B-F21B-4A1C-84D8-31E41D11E2BA",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_410:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "AADD71C2-D011-4358-97DA-9551C73AE500",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_4100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "ACCE06C2-66B6-4B8E-9F31-30D99C904AE6",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_4100:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "8D566367-ADB2-4B3F-A5A0-1A59CC852DCE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "E84EEC33-730A-4F55-BE89-264C576E9E96",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_5100:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "1A9165FB-FA3B-48CA-8F95-838D9E146E24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:standard:*:*:*",
              "matchCriteriaId": "2AFB141C-762A-4D4E-B9A8-49A7BFB10060",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_6100:-:*:*:*:standard:*:*:*",
              "matchCriteriaId": "539913FB-58FF-4C92-831D-27A1F5562C25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1000_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "FED84B7F-C5FD-483F-A07C-DB7647883D4F",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1000:-:*:*:*:premium:*:*:*",
              "matchCriteriaId": "07DE6E51-078C-4071-AD06-6B95D9E5054E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_1100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "B9467588-F79F-4195-A2B3-D365F7B9A90D",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_1100:-:*:*:*:premium:*:*:*",
              "matchCriteriaId": "A4C21748-F802-4274-BCB1-23F3F8013A87",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2000_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "43BB6BAB-6E52-4F94-BC03-DED3D3B8BF2A",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2000:-:*:*:*:premium:*:*:*",
              "matchCriteriaId": "6439B964-A8B9-455B-9724-7CB76806EED6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_2100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "499A3152-C623-4DFD-B989-C473C9A9B306",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_2100:-:*:*:*:premium:*:*:*",
              "matchCriteriaId": "69C163C7-65FF-4C39-BF65-5555CD1269E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_6100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "AB1CF36A-0751-4CB9-A1ED-CC63472123E0",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_6100:-:*:*:*:premium:*:*:*",
              "matchCriteriaId": "E3FEEA2C-572C-42E7-98A3-731D2BA6CDB2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:citrix:sd-wan_5100_firmware:*:*:*:*:premium:*:*:*",
              "matchCriteriaId": "8233AB68-1082-4E2D-B4D1-DFF31100BB6B",
              "versionEndExcluding": "11.4.4.46",
              "versionStartIncluding": "11.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:citrix:sd-wan_5100:-:*:*:*:premium:*:*:*",
              "matchCriteriaId": "853E002B-4534-48E6-8FCE-C01B1255366A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium Editions on or after 11.4.0 and before 11.4.4.46 allows an attacker to disclose limited information from the appliance via Access to management IP."
    },
    {
      "lang": "es",
      "value": "Server-Side Request Forgery (SSRF) en las ediciones Citrix SD-WAN Standard/Premium posteriores a 11.4.0 y anteriores a 11.4.4.46 permite a un atacante revelar informaci\u00f3n limitada del dispositivo a trav\u00e9s del acceso a la IP de administraci\u00f3n."
    }
  ],
  "id": "CVE-2024-2049",
  "lastModified": "2025-07-25T15:36:48.663",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "secure@citrix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-03-12T13:15:49.807",
  "references": [
    {
      "source": "secure@citrix.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://support.citrix.com/article/CTX617071/citrix-sdwan-security-bulletin-for-cve20242049"
    },
    {
      "source": "nvd@nist.gov",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.citrix.com/external/article?articleUrl=CTX617071-citrix-sdwan-security-bulletin-for-cve20242049\u0026language=en_US"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://support.citrix.com/article/CTX617071/citrix-sdwan-security-bulletin-for-cve20242049"
    }
  ],
  "sourceIdentifier": "secure@citrix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "secure@citrix.com",
      "type": "Secondary"
    }
  ]
}