Citrix has released security updates to address vulnerabilities in application delivery management. An attacker could exploit these vulnerabilities to take control of an affected system.
- Corruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted.
- Temporary disruption of the ADM license service. The impact of this includes preventing new licenses from being issued or renewed by Citrix ADM.
|CVE-2022-27511||Corruption of the system by a remote, unauthenticated user potentially leading to the reset of the administrator password||CWE-284: Improper Access Control||Access to ADM IP|
|CVE-2022-27512||Temporary disruption of the ADM license service||CWE-664: Improper Control of a Resource Through its Lifetime||Access to ADM IP|
All supported versions of Citrix ADM server and Citrix ADM agent are affected by this vulnerability. The following versions of Citrix ADM are in support: Citrix ADM 13.1 and Citrix ADM 13.0.
The affected builds are:
- Citrix ADM 13.1 before 13.1-21.53
- Citrix ADM 13.0 before 13.0-85.19
Recommendation – Application Delivery management
Citrix recommends that affected customers install the relevant updated versions of Citrix ADM server and Citrix ADM agent :Citrix ADM 13.1-21.53 and later versions of 13.1 and Citrix ADM 13.0-85.19 and later versions of 13.0 .