CVE Vulnerabilities

CVE-2014-3780

Improper Authentication

Published: May 30, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Unspecified vulnerability in Citrix VDI-In-A-Box 5.3.x before 5.3.8 and 5.4.x before 5.4.4 allows remote attackers to bypass authentication via unspecified vectors, related to a Java servlet.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Vdi-in-a-boxCitrix5.3.0 (including)5.3.0 (including)
Vdi-in-a-boxCitrix5.3.1 (including)5.3.1 (including)
Vdi-in-a-boxCitrix5.3.2 (including)5.3.2 (including)
Vdi-in-a-boxCitrix5.3.3 (including)5.3.3 (including)
Vdi-in-a-boxCitrix5.3.4 (including)5.3.4 (including)
Vdi-in-a-boxCitrix5.3.5 (including)5.3.5 (including)
Vdi-in-a-boxCitrix5.3.6 (including)5.3.6 (including)
Vdi-in-a-boxCitrix5.3.7 (including)5.3.7 (including)
Vdi-in-a-boxCitrix5.4.0 (including)5.4.0 (including)
Vdi-in-a-boxCitrix5.4.1 (including)5.4.1 (including)
Vdi-in-a-boxCitrix5.4.2 (including)5.4.2 (including)
Vdi-in-a-boxCitrix5.4.3 (including)5.4.3 (including)

Potential Mitigations

References