1. Add a new traffic policy:
Traffic_Pol_SSO_http
2. Click 'Add' beside 'Request Profile'
3. Call this:
Traffic_Pro_SSO_http
4. Set this to 'HTTP' and 'Single Sign-on' to 'ON'
5. Save this.
6. in the 'Expression' section:
if using Advanced policy’s enter:
'true'
if using Classic policy’s enter:
'ns_true'
You can check which version is set here :
Enter the relevant setting - 'true' or 'ns_true'
7. You may get a warning, click OK
8. Bind this to the Citrix Gateway For XenMobile\CEM and set this with a large priority number so it it will trigger last and after all existing policy’s
9. You should see something like this ( you may see more policy’s depending on the config ) :
Now we need to repeat the process for 'TCP'
10.
Add a new traffic policy called:
Traffic_Pol_SSO_tcp
11. Click Add beside Request Profile
12 Call this:
'Traffic_Pro_SSO_tcp'
13. Set the Traffic Profile to 'TCP' and 'Single Sign-On' to 'ON'
14. Save this.
15. in the expression section enter ns_true or true depending on what type of policy’s are set
16. Click OK. You may get a warning again about classic policy, click ok
17. Bind this to the gateway with a large Priority number so it will be evaluated last.
10. Once this is in place.
Test the following:
- Test a new enrollment and see if it and Secure Hub work
- Test an existing enrolment and see if Secure Hub works.
If you encounter an issue with Secure Web and internal web sites make sure both traffic policies are set to last in the priority list.
CVE-ID | Description | CWE | Affected Products | Pre-conditions |
CVE-2020-8299 | Network-based denial-of-service from within the same Layer 2 network segment | CWE-400: Uncontrolled Resource Consumption | Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP | The attacker machine must be in the same Layer 2 network segment as the vulnerable appliance |
CVE-2020-8300 | SAML authentication hijack through a phishing attack to steal a valid user session | CWE-284: Improper access control | Citrix ADC, Citrix Gateway | Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP |
The following supported versions of Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP address CVE-2020-8299, a Medium severity vulnerability.
Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0
Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1
Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1
Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS
Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4
Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3
Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3
Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2
Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1
Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2
The following supported versions of Citrix ADC and Citrix Gateway address CVE-2020-8300, a High severity vulnerability.
Citrix ADC and Citrix Gateway 13.0-82.41 and later releases of 13.0
Citrix ADC and NetScaler Gateway ADC 12.1-62.23 and later releases of 12.1
Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1
Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS
Citrix strongly recommends that affected customers install relevant updates as soon as possible.
Date | Change |
2021-06-08 | Initial Publication |
2021-06-08 | Formatting Corrections |