Advisory- Citrix ADM

Summary

Citrix has recently patched a critical vulnerability in its Application Delivery Management (ADM).

Anonymous user having access to ADM platform, can corrupt the installed server in such a way that on next reboot the server credentials are reset to default (nsrecover/nsroot). Once the exploited device is rebooted, an attacker could connect to the ADM using default administrator credentials with SSH. One other vulnerability in Citrix, could allow an anonymous user to temporarily disrupt the services via a denial of service (DoS) attack on the server.

Solution

All supported versions of Citrix ADM server and Citrix ADM agent are affected by the vulnerabilities. Citrix has urged enterprise sysadmins to upgrade to the most recent versions of its technology. Citrix ADM 13.1-21.53, Citrix ADM 13.0-85.19, or subsequent releases. Customers using Citrix ADM service do not need to take any action, as it has been taken care by Citrix itself.

Citrix also recommends to segment network traffic to their ADM server.

CVEs

CVE-2022-27511 & CVE-2022-27512

Related CWEs

CWE-284, CWE-664, CWE-416

Resources

Authors: Narendra Kumawat, Mahesh Saptarshi

For more information contact:contact@cybersecurist.com

SO WHAT CAN WE DO FOR YOU ?

For all your software product security and IT security compliance requirements

Contact us ☎