PT-2011-36: Insufficient authorization in Citrix XenServer Virtual Switch Controller Vulnerable softwareCitrix XenServer Virtual Switch Controller Version: 6.0.1 and earlierApplication link: http://support.citrix.com/article/CTX129669Severity levelSeverity level: High Impact: Unauthorized access Access Vector: Locally exploitableCVSS v2: Base Score: 9.0 Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C)CVE: not assigned Vulnerability descriptionPositive Research Center has discovered an insufficient authorization in Citrix XenServer Virtual Switch Controller.Low privileged (Read-Only) users can change certain configuration parameters (e.g. hostname and domain). Configuration snapshots that contain the entire system configuration (including password hashes, SSL keys, etc.) can be downloaded by read-only users. Moreover, snapshots contain the root password for pool-master, which allows an attacker to gain access to the whole infrastructure.How to fixUpdate your software up to the latest versionAdvisory status10.11.2011 - Vendor is notified 10.11.2011 - Vendor gets vulnerability details 13.03.2012 - Vendor releases fixed version and details 27.03.2012 - Public disclosureCreditsThe vulnerability was discovered by Maxim Tsoy, Kirill Mosolov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2011-36 https://support.citrix.com/article/CTX132476Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/