CVE-2015-3642

The TLS and DTLS processing functionality in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway devices with firmware 9.x before 9.3 Build 68.5, 10.0 through Build 78.6, 10.1 before Build 130.13, 10.1.e before Build 130.1302.e, 10.5 before Build 55.8, and 10.5.e before Build 55.8007.e makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
References
Link Resource
http://support.citrix.com/article/CTX200378 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:citrix:netscaler_firmware:9.0:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:9.1:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:9.2:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.0:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.1:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.1e:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.5:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.5e:*:*:*:*:*:*:*
cpe:2.3:h:citrix:netscaler_application_delivery_controller:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:citrix:netscaler_firmware:9.0:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:9.1:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:9.2:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.0:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.1:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.1e:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.5:*:*:*:*:*:*:*
cpe:2.3:o:citrix:netscaler_firmware:10.5e:*:*:*:*:*:*:*
cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-08-02 19:29

Updated : 2024-02-04 19:29


NVD link : CVE-2015-3642

Mitre link : CVE-2015-3642

CVE.ORG link : CVE-2015-3642


JSON object : View

Products Affected

citrix

  • netscaler_gateway
  • netscaler_application_delivery_controller
  • netscaler_firmware
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor