Citrix this week announced patches for multiple vulnerabilities across its product portfolio, including a high-severity issue in SD-WAN.
Tracked as CVE-2022-27505, the newly resolved high-severity issue in SD-WAN is a reflected cross-site scripting (XSS) vulnerability that exists because input isn’t properly neutralized during web page generation.
According to Citrix, both standard and premium editions of the SD-WAN appliance before version 11.4.3a are impacted.
Citrix SD-WAN offers optimized delivery of applications on a secure WAN and ensures secure access to apps.
The security update that Citrix released to resolve this vulnerability also addresses CVE-2022-27506, a low-severity security hole where administrators could have used hardcoded credentials to access the shell via the SD-WAN CLI.
[ READ: Citrix Patches Critical Vulnerability in ADC, Gateway ]
This week, Citrix also patched CVE-2022-27503, which is an XSS flaw in StoreFront, and CVE-2022-21827, which affects Gateway Plug-in for Windows (Citrix Secure Access for Windows) and allows the arbitrary corruption or deletion of files.
Additionally, the company announced patches for three security defects in Endpoint Management (XenMobile Server). All three issues – tracked as CVE-2021-44519, CVE-2021-44520, and CVE-2022-26151 – could lead to unauthorized access to the underlying OS.
Citrix recommends that users upgrade to a fixed version of the affected solutions. A patched version of the Gateway Plug-in for Windows can be found in the latest iterations of Citrix ADC and Gateway.
The US Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Citrix’s security bulletins and apply the available security updates.
“An attacker could exploit some of these vulnerabilities to take control of an affected system,” CISA notes.
Related: Citrix Patches Hypervisor Vulnerabilities Allowing Host Compromise
Related: Citrix Patches Vulnerability in Workspace App for Windows
Related: Citrix Releases Updates to Prevent DDoS Attacks Abusing Its Appliances

More from Ionut Arghire
- Google Leads $16 Million Investment in Dope.security
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- CISA, NSA Issue Guidance for IAM Administrators
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
