Exploit Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on June 6th, 2019 📆 | 6738 Views ⚑


Citrix Application Delivery Management up to 12.1 Access Control privilege escalation

CVSS Meta Temp Score Current Exploit Price (≈)
5.3 $0-$5k

A vulnerability classified as critical has been found in Citrix Application Delivery Management up to 12.1. This affects an unknown function of the component Access Control. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was disclosed 06/05/2019. It is possible to read the advisory at support.citrix.com. This vulnerability is uniquely identified as CVE-2019-9548 since 03/01/2019. The technical details are unknown and an exploit is not publicly available.

Upgrading to version eliminates this vulnerability.



VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: Application Delivery Management

03/01/2019 CVE assigned
06/05/2019 +96 days Advisory disclosed
06/06/2019 +1 days VulDB entry created
06/06/2019 +0 days VulDB last updateVendor: citrix.com

Advisory: support.citrix.com
Status: Confirmed

CVE: CVE-2019-9548 (🔒)

Created: 06/06/2019 09:05 AM
Complete: 🔍


No comments yet. Please log in to comment.

Download it now for free!


Download Nulled WordPress Themes
Premium WordPress Themes Download
Download Nulled WordPress Themes
Download WordPress Themes Free
online free course

Tagged with:

Leave a Reply ✍