The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

cybersecurity note CVE-2016-5302

Citrix XenServer 7: privilege escalation via Active Directory

Synthesis of the vulnerability

An attacker with an account on the Active Directory can log in Citrix XenServer 7, in order to compromise the system.
Severity of this alert: 2/4.
Creation date: 10/06/2016.
Références of this alert: CERTFR-2016-AVI-197, CTX213549, CVE-2016-5302, VIGILANCE-VUL-19859.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Citrix XenServer 7 product can be installed with the Active Directory authentication still enabled.

However, after this installation, every AD user can authenticate on XenServer.

An attacker with an account on the Active Directory can therefore log in Citrix XenServer 7, in order to compromise the system.
Full Vigil@nce bulletin... (Free trial)

This computer weakness announce impacts software or systems such as XenServer.

Our Vigil@nce team determined that the severity of this security alert is medium.

The trust level is of type confirmed by the editor, with an origin of user account.

An attacker with a expert ability can exploit this vulnerability.

Solutions for this threat

Citrix XenServer 7: patch for Active Directory.
A patch is available:
  https://support.citrix.com/article/CTX213769
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a system vulnerability watch. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.