Rule Category

SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.

Alert Message

SERVER-WEBAPP Citrix ADC and Gateway authentication bypass attempt

Rule Explanation

This rule looks for evidence an attacker is attempting to upgrade session privileges without proper authentication.

What To Look For

This rule alerts on an attempt to bypass authentication in Citrix ADC and Gateway devices.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intel Group

MITRE ATT&CK Framework

Tactic: Privilege Escalation

Technique: Exploitation for Privilege Escalation

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

CVE

Additional Links

Rule Vulnerability

Escalation of Privilege

An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.

CVE Additional Information

CVE-2020-8193
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.
Details
Severity Base Score6.5
Impact Score2.5 Exploit Score3.9
Confidentiality ImpactLOW Integrity ImpactLOW
Availability ImpactNONE Attack VectorNETWORK
ScopeUNCHANGED User InteractionNONE
Authentication Ease of AccessLOW
Privileges RequiredNONE