PT-2011-36: Insufficient authorization in Citrix XenServer Virtual Switch Controller

Vulnerable software

Citrix XenServer Virtual Switch Controller
Version: 6.0.1 and earlier

Application link: 
http://support.citrix.com/article/CTX129669

Severity level

Severity level: High 
Impact: Unauthorized access
Access Vector: Locally exploitable

CVSS v2: 
Base Score: 9.0 
Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE: not assigned

 

Vulnerability description

Positive Research Center has discovered an insufficient authorization in Citrix XenServer Virtual Switch Controller.

Low privileged (Read-Only) users can change certain configuration parameters (e.g. hostname and domain). Configuration snapshots that contain the entire system configuration (including password hashes, SSL keys, etc.) can be downloaded by read-only users. Moreover, snapshots contain the root password for pool-master, which allows an attacker to gain access to the whole infrastructure.

How to fix

Update your software up to the latest version

Advisory status

10.11.2011 - Vendor is notified
10.11.2011 - Vendor gets vulnerability details
13.03.2012 - Vendor releases fixed version and details
27.03.2012 - Public disclosure

Credits

The vulnerability was discovered by Maxim Tsoy, Kirill Mosolov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-36
https://support.citrix.com/article/CTX132476

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
4G and 5G are not ready for smart cities