CVE-2019-19781 - Verification Tool

CVE-2019-19781 - Verification Tool

book

Article ID: CTX269180

calendar_today

Updated On:

Description

Objective

The Check-CVE-2019-19781 tool will enable customers to identify AAA and Gateway endpoints on Citrix ADC and Citrix Gateway devices in their deployment that are vulnerable to CVE-2019-19781. Customers are also encouraged to run the tool upon application of the mitigation steps to ensure correctness.

Exposed Management IPs are vulnerable by default, and should be mitigated in accordance with the steps provided in CTX267679.

 

 


 

Where to download ?

Certain legacy Citrix tools are now available on request only. Please submit the request here - https://forms.gle/obA39PEz5qpDiSPq8

Once we verify your request, we will provide access to the download location. 

 

 


Instructions

This tool is designed to be run on any standalone system that is capable of connecting with the Citrix ADC and Gateway instances of interest. As such, please first ensure that you are able to ping the Citrix ADC and Gateway instances from your system.

To run the tool, please do the following from your Windows/*nix system

  • Install Python 2.x or 3.x (https://www.python.org/downloads/)
  • Install cURL utility (https://curl.haxx.se/download.html)

From within the tool install folder on the system, run the command as –


python check-cve-2019-19781.py --in_file IP_FILE --out_file OUTPUT_FILE

 

IP_FILE: The input file containing the list of IPs and/or FQDNs, one per line

OUTPUT_FILE: The output file containing the list of vulnerable IPs and FQDNs


Update Logs

 DateDescription
16th January 2020Initial publication
20th January 2020Detection for 11.1 NSIP
25th March 2020Added details to Instructions

Additional Information

 


 

Where to download ?

Certain legacy Citrix tools are now available on request only. Please submit the request here - https://forms.gle/obA39PEz5qpDiSPq8

Once we verify your request, we will provide access to the download location.