Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Citrix Patches Critical Vulnerability in Gateway, ADC

Citrix on Tuesday announced patches for three vulnerabilities impacting its Gateway and ADC products, including one critical-severity flaw.

Widely deployed across on-premises and cloud environments, Citrix Gateway is an SSL VPN solution delivering single sign-on across applications and devices.

Citrix on Tuesday announced patches for three vulnerabilities impacting its Gateway and ADC products, including one critical-severity flaw.

Widely deployed across on-premises and cloud environments, Citrix Gateway is an SSL VPN solution delivering single sign-on across applications and devices.

Citrix ADC (formerly NetScaler ADC) is an application delivery and load balancing solution that delivers visibility into applications across multiple cloud environments.

The newly identified vulnerabilities, Citrix says, could be exploited to bypass authentication (CVE-2022-27510, CVSS score of 9.8), launch a phishing attack leading to remote desktop takeover (CVE-2022-27513, CVSS score of 8.3), and bypass brute force protections (CVE-2022-27516, CVSS score of 5.3).

For an attack to be successful, however, the vulnerable appliance must be configured as a VPN, Citrix notes in its advisory.

“Note that only appliances that are operating as a gateway (appliances using the SSL VPN functionality or deployed as an ICA proxy with authentication enabled) are affected by the first issue, which is rated as a critical severity vulnerability,” Citrix says.

Advertisement. Scroll to continue reading.

The three vulnerabilities have been addressed with the release of ADC and Gateway versions 13.1-33.47, 13.0-88.12, and 12.1-65.21, and in ADC 12.1-FIPS 12.1-55.289 and ADC 12.1-NDcPP 12.1-55.289.

The tech giant also underlines the fact that ADC and Gateway versions prior to 12.1 reached end-of-life (EOL), encouraging customers still using them to upgrade to a supported version.

In addition to resolving these three vulnerabilities, the aforementioned ADC and Gateway releases include security enhancements to protect against HTTP request smuggling attacks.

In a separate support article, Citrix notes that customers updating ADCs to version 13.1-33.x might experience issues with licensing and encourages them to either re-allocate a new license or contact the Citrix licensing/tech support team for assistance.

Related: Attackers Can Exploit Critical Citrix ADM Vulnerability to Reset Admin Passwords

Related: Citrix Patches Vulnerabilities in Several Products

Related: Citrix Patches Hypervisor Vulnerabilities Allowing Host Compromise

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.