The Check-CVE-2019-19781 tool will enable customers to identify AAA and Gateway endpoints on Citrix ADC and Citrix Gateway devices in their deployment that are vulnerable to CVE-2019-19781. Customers are also encouraged to run the tool upon application of the mitigation steps to ensure correctness.
Exposed Management IPs are vulnerable by default, and should be mitigated in accordance with the steps provided in CTX267679.
Where to download ?
Certain legacy Citrix tools are now available on request only. Please submit the request here - https://forms.gle/obA39PEz5qpDiSPq8
Once we verify your request, we will provide access to the download location.
This tool is designed to be run on any standalone system that is capable of connecting with the Citrix ADC and Gateway instances of interest. As such, please first ensure that you are able to ping the Citrix ADC and Gateway instances from your system.
To run the tool, please do the following from your Windows/*nix system
From within the tool install folder on the system, run the command as –
python check-cve-2019-19781.py --in_file IP_FILE --out_file OUTPUT_FILE
IP_FILE: The input file containing the list of IPs and/or FQDNs, one per line
OUTPUT_FILE: The output file containing the list of vulnerable IPs and FQDNs
Date | Description |
16th January 2020 | Initial publication |
20th January 2020 | Detection for 11.1 NSIP |
25th March 2020 | Added details to Instructions |
Where to download ?
Certain legacy Citrix tools are now available on request only. Please submit the request here - https://forms.gle/obA39PEz5qpDiSPq8
Once we verify your request, we will provide access to the download location.