support.citrix.com Open in urlscan Pro
34.107.194.63  Public Scan

URL: https://support.citrix.com/article/CTX633416/citrix-hypervisor-security-update-for-cve202431497
Submission: On May 10 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="fileUploadForm" enctype="multipart/form-data" method="post" target="fileUploadIframe"><input type="file" id="fileSelector" name="file" style="display: none;"><input name="filename" type="hidden"></form>

Text Content

Diese Website verwendet Cookies und verwandte Technologien, wie in
unserer Datenschutzrichtlinie beschrieben, für Zwecke, die den Betrieb der
Website, Analysen, eine verbesserte Benutzererfahrung oder Werbung umfassen
können. Sie können sich dafür entscheiden, unserer Verwendung dieser
Technologien zuzustimmen oder Ihre eigenen Einstellungen vornehmen.
Einstellungen verwalten Akzeptieren Alle Ablehnen

 * 
 * Contact Support
    * Open or view cases
    * Chat live
    * Site feedback

 * SIGN IN
 * My Citrix account
 * Citrix Cloud
 * Citrix Cloud Government
 * My support alerts
 * RSS feeds
 * Sign in


CUSTOMERS WHO VIEWED THIS ARTICLE ALSO VIEWED




IDENTIFY CHANGES IN NETSCALER BUILD FILES WITH


FILE INTEGRITY MONITORING

Learn More Watch Video
CTX633416


CITRIX HYPERVISOR SECURITY UPDATE FOR CVE-2024-31497

Security Bulletin | Severity: Medium | Created: 08 May 2024 | Modified: 08 May
2024 | Status: Final



APPLICABLE PRODUCTS

 * Citrix Hypervisor
 * XenServer


DESCRIPTION OF PROBLEM

Versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR included a 3rd-party
component, PuTTY, that is used to enable SSH connections from XenCenter to guest
VMs when the “Open SSH Console” button is selected.  The inclusion of PuTTY with
XenCenter for Citrix Hypervisor 8.2 CU1 LTSR was deprecated with version 8.2.6
of XenCenter and any versions after 8.2.7 will not include PuTTY.

An issue has been reported in versions of PuTTY prior to version 0.81; when used
in conjunction with XenCenter, this issue may, in some scenarios, allow an
attacker who controls a guest VM to determine the SSH private key of a XenCenter
administrator who uses that key to authenticate to that guest VM while using an
SSH connection.

This issue has the following identifier:

 * CVE-2024-31497
   
   


WHAT CUSTOMERS SHOULD DO

Customers who do not wish to use the “Open SSH Console” functionality may remove
the PuTTY component completely.  Customers who wish to maintain the existing
usage of PuTTY should replace the version installed on their XenCenter system
with an updated version (with a version number of at least 0.81).

Note that versions of XenCenter for XenServer 8 have never included PuTTY.




WHAT WE ARE DOING

We are notifying customers and channel partners about this potential security
issue through the publication of this security bulletin on the Citrix Knowledge
Center at https://support.citrix.com/securitybulletins.




OBTAINING SUPPORT ON THIS ISSUE

If you require technical assistance with this issue, please contact Citrix
Technical Support. Contact details for Citrix Technical Support are available
at https://www.citrix.com/support.




SUBSCRIBE TO RECEIVE ALERTS

We strongly recommend that all customers subscribe to receive alerts when a
security bulletin is created or modified
at https://support.citrix.com/user/alerts.




REPORTING SECURITY VULNERABILITIES TO US

We welcome input regarding the security of our products and consider any and all
potential vulnerabilities seriously. For details on our vulnerability response
process and guidance on how to report security-related issues to us, please see
the following
webpage: https://www.citrix.com/about/trust-center/vulnerability-process.html.




DISCLAIMER

This document is provided on an "as is" basis and does not imply any kind of
guarantee or warranty, including the warranties of merchantability or fitness
for a particular use. Your use of the information on the document is at your own
risk. Cloud Software Group reserves the right to change or update this document
at any time. Customers are therefore recommended to always view the latest
version of this document directly from the Citrix Knowledge Center




CHANGELOG

Date Change 2024-05-08 Initial Publication

 

--------------------------------------------------------------------------------


Was this page helpful?


View support numbers
Share this page
 * 
 * 
 * 
 * 

Legal Do not sell my personal information Cookie Preferences
© 2024 Cloud Software Group, Inc. All rights reserved.





Live chat:Chat Unavailable