Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
A Citrix server is running on this machine.
Citrix servers permit a Windows user to remotely
obtain a graphical login (and therefore act as a local
user on the remote host).
NOTE: by default the Citrix Server application
utilizes a weak 40 bit obfuscation algorithm (not
even a true encryption). If the default settings have
not been changed, there already exists tools which can
be used to passively ferret userIDs and passwords as they
traverse a network.
If this server is located within your DMZ, the risk is
substantially higher, as Citrix necessarily requires
access into the internal network for applications like
SMB browsing, file sharing, email synchronization, etc.
If a possible hacker gains a valid login and password, he may
be able to use this service to gain further access on
the remote host or remote network. This protocol has also
been shown to be vulnerable to a man-in-the-middle attack.
Solution: Disable this service if you do not use it. Also, make sure
that the server is configured to utilize strong encryption.
Network Security Threat Level: Low
Networks Security ID: 7276
Vulnerability Assessment Copyright: This script is Copyright (C) 2002 John Lampe...email@example.com
No Discussions have been posted on this vulnerability.