Medium severity6.8NVD Advisory· Published Nov 7, 2016· Updated May 6, 2026
CVE-2016-9111
CVE-2016-9111
Description
Incorrect access control mechanisms in Citrix Receiver Desktop Lock 4.5 allow an attacker to bypass the authentication requirement by leveraging physical access to a VDI for temporary disconnection of a LAN cable. NOTE: as of 20161208, the vendor could not reproduce the issue, stating "the researcher was unable to provide us with information that would allow us to confirm the behaviour and, despite extensive investigation on test deployments of supported products, we were unable to reproduce the behaviour as he described. The researcher has also, despite additional requests for information, ceased to respond to us."
Affected products
1- cpe:2.3:a:citrix:receiver_desktop:4.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.htmlnvdExploitThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/40686/nvdExploitThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/94229nvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037176nvd
News mentions
0No linked articles in our index yet.