Flowchart Citrix vulnerability

This flowchart could assist in making a risk assesment concerning the Citrix vulnerability.