Critical Citrix ADC and Gateway Remote Authentication Bypass Vulnerabilities

16 Nov / 2022

Cyber Security

Critical Citrix ADC and Gateway Remote Authentication Bypass Vulnerabilities 

CVE: CVE-2022-27510, CVE-2022-27513 and CVE-2022-27516

What is Vulnerable?

  • Citrix ADC and Citrix Gateway?13.1?before?13.1-33.47
  • Citrix ADC and Citrix Gateway?13.0?before?13.0-88.12
  • Citrix ADC and?Citrix?Gateway?12.1?before?
  • Citrix ADC 12.1-FIPS before 12.1-55.289
  • Citrix ADC 12.1-NDcPP before 12.1-55.289

What’s Happened?

On November 8 Citrix published a security bulletin announcing fixes for 3 vulnerabilities in their Citrix ADC products. CVE-2022-27510 is an authentication bypass weakness allowing unauthenticated user access to the system and has a CVSS severity of 9.8/10. Citrix Gateways are high-value targets because of the function they serve providing access to the inside of your network and are exploited very quickly so organisations operating an impacted product should update these systems immediately.

Key Facts

These vulnerabilities affect Citrix ADC and Citrix Gateway Appliances when they are configured as: SSL VPN, ICA Proxy, RDP Proxy, CVPN and AAA Virtual Server. Citrix-managed cloud services are unaffected.

What You Can Do

  • Any Citrix ADC appliances running 12.1, 13.0 and 13.1 need to be updated to the latest version of the software released on November 8, details available here
  • Implement MFA for all users and administrators logging into the appliance
  • Cythera continues to monitor Endpoint Protect and Managed Detection & Response for associated indicators of attack and port exploitation activities.
  • Cythera Vulnerability Management Clients are actively being scanned for any vulnerable instances of Citrix appliances
  • Consult with Vendors to ensure that their appliances have been patched

Please reach out to us via our contact us page if you are concerned.


You may be interested in

Why You Shouldn’t Be Reusing Passwords In 2020

Who out there has been guilty of reusing a password? We’re all guilty of it! Results from a recent Google survey discovered that at least 65% …

Read More arrow_forward

Unlocking Cybersecurity with Cythera's Penetration Testing

Unlocking Cybersecurity with Cythera's Penetration TestingPenetration testing, often referred to as pen testing, is a vital cybersecurity measur…

Read More arrow_forward

The Perfect 10 - Remote Code Execution in Apache Log4j Requiring Emergency Patching

CVE: CVE-2021-44228 CVSS Score: 10 (Critical)What Is Vulnerable?: Apache Log4j Version 2.15-rc1 or prior. (All version prior to 2.15-rc1 are vu…

Read More arrow_forward