Security Alert: Critical Citrix Gateway and Citrix ADC Vulnerabilities

November 9, 2022

November 2022 continues strong with more cybersecurity vulnerabilities. 

If you are running Citrix Gateway and Citrix ADC, stop what you are doing and read this post.  Please reach out to Cornerstone.IT with any questions. We are a Citrix Gold partner with decades of Citrix experience.

Severity

Critical

Issue

  • Unauthorized access to Gateway user capabilities
  • Remote desktop takeover via phishing
  • User login brute force protection functionality bypass

Impacted Products

  • Citrix ADC
  • Citrix Gateway

Description

CVE-IDDescriptionCWEAffected ProductsPre-Conditions
CVE-2022-27510Unauthorized access to Gateway user capabilities CWE-288: Authentication Bypass Using an Alternate Path or Channel Citrix Gateway, Citrix ADC Appliance must be configured as a  
VPN (Gateway) 
CVE-2022-27513 Remote desktop takeover via phishing CWE-345: Insufficient Verification of Data Authenticity Citrix Gateway, Citrix ADC Appliance must be configured as a  
VPN (Gateway) 
and the RDP proxy functionality must be configured
CVE-2022-27516 User login brute force protection functionality bypass CWE-693: Protection Mechanism Failure Citrix Gateway, Citrix ADC Appliance must be configured as a  
VPN (Gateway)  
        OR 
AAA virtual server  
and the user lockout functionality “Max Login Attempts” must be configured 

The following supported versions of Citrix ADC and Citrix Gateway are affected by this vulnerability:

  • Citrix ADC and Citrix Gateway 13.1 before 13.1-33.47
  • Citrix ADC and Citrix Gateway 13.0 before 13.0-88.12
  • Citrix ADC and Citrix Gateway 12.1 before 12.1.65.21
  • Citrix ADC 12.1-FIPS before 12.1-55.289
  • Citrix ADC 12.1-NDcPP before 12.1-55.289

Mitigation

Affected customers of Citrix ADC and Citrix Gateway are recommended to install the relevant updated versions of Citrix ADC or Citrix Gateway as soon as possible:

  • Unauthorized access to Gateway user capabilities
  • Remote desktop takeover via phishing
  • User login brute force protection functionality bypass
  • Citrix ADC and Citrix Gateway 13.1-33.47 and later releases
  • Citrix ADC and Citrix Gateway 13.0-88.12 and later releases of 13.0 
  • Citrix ADC and Citrix Gateway 12.1-65.21 and later releases of 12.1 
  • Citrix ADC 12.1-FIPS 12.1-55.289 and later releases of 12.1-FIPS 
  • Citrix ADC 12.1-FIPS 12.1-55.289 and later releases of 12.1-FIPS 
  • Citrix ADC 12.1-NDcPP 12.1-55.289 and later releases of 12.1-NDcPP

Please note that Citrix ADC and Citrix Gateway versions prior to 12.1 are EOL and customers on those versions are recommended to upgrade to one of the supported versions.

Contact Cornerstone.IT with any questions or assistance regarding these updates.

 Published: 11/8/2022

Cornerstone.IT