Monday, April 14, 2025
Homecyber securityMultiple Flaws in Citrix ADC, Gateway, and SD-WAN Let Attackers Trigger DoS...

Multiple Flaws in Citrix ADC, Gateway, and SD-WAN Let Attackers Trigger DoS Condition

Published on

SIEM as a Service

Follow Us on Google News

Multiple critical security flaws have been detected recently in the Citrix Application Delivery Controller (ADC), Citrix Gateway, and Citrix SD-WAN WANOP. And without any authentication these critical vulnerabilities allow any threat actor to crash the whole network.

These affected Citrix products are mainly used to secure remote access and for application-aware traffic management. 

Vulnerabilities

Here are vulnerabilities that are affecting these Crtitix products:-

- Advertisement - Google News
  • CVE-2021-22955: It’s an unauthenticated denial of service, and it is marked as Critical.
  • CVE-2021-22956: It’s a temporary disruption of the Management GUI, Nitro API, and RPC communication; it’s marked as Low severity tag.

All these three Citrix products are widely deployed globally and among them, as of early 2020, the Gateway and ADC alone installed in at least 80,000 companies in 158 countries. In short, it will have a great impact on exploitation due to its mass use.

Here are the supported versions of Citrix ADC and Citrix Gateway that are affected by CVE-2021-22955:-

  • Citrix ADC and Citrix Gateway 13.0 before 13.0-83.27 
  • Citrix ADC and Citrix Gateway 12.1 before 12.1-63.22 
  • Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.23 
  • Citrix ADC 12.1-FIPS before 12.1-55.257 

While in the case of CVE-2021-22956, all the supported versions of Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP Edition are affected. And here below we have mentioned all the supported versions of Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP Edition that supports the fixed configuration change:-

  • Citrix ADC and Citrix Gateway 13.1-4.43 and later releases 
  • Citrix ADC and Citrix Gateway 13.0-83.27 and later releases of 13.0 
  • Citrix ADC and Citrix Gateway 12.1-63.22 and later releases of 12.1 
  • Citrix ADC and NetScaler Gateway 11.1-65.23 and later releases of 11.1 
  • Citrix ADC 12.1-FIPS 12.1-55.257 and later releases of 12.1-FIPS  
  • Citrix SD-WAN WANOP Edition 11.4.2 and later releases of 11.4 
  • Citrix SD-WAN WANOP Edition 10.2.9c and later releases of 10.2 

Mitigation

In case of CVE-2021-22955 vulnerability, users must upgrade to one of the following supported versions of Citrix ADC and Citrix Gateway:-

  • Citrix ADC and Citrix Gateway 13.1-4.43 and later releases  
  • Citrix ADC and Citrix Gateway 13.0-83.27 and later releases of 13.0 
  • Citrix ADC and Citrix Gateway 12.1-63.22 and later releases of 12.1 
  • Citrix ADC and NetScaler Gateway 11.1-65.23 and later releases of 11.1 
  • Citrix ADC 12.1-FIPS 12.1-55.257 and later releases of 12.1-FIPS 

In case of CVE-2021-22956 vulnerability, users must configure their appliance according to the Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Edition – Management Module Configuration Reference Guide:-

  • Citrix ADC and Citrix Gateway 13.1-4.43 and later releases 
  • Citrix ADC and Citrix Gateway 13.0-83.27 and later releases of 13.0 
  • Citrix ADC and Citrix Gateway 12.1-63.22 and later releases of 12.1 
  • Citrix ADC and NetScaler Gateway 11.1-65.23 and later releases of 11.1 
  • Citrix ADC 12.1-FIPS 12.1-55.257 and later releases of 12.1-FIPS  
  • Citrix SD-WAN WANOP Edition 11.4.2 and later releases of 11.4 
  • Citrix SD-WAN WANOP Edition 10.2.9c and later releases of 10.2

Moreover, Citrix currently is notifying all its users and channel partners about this potential security threat. And they have also assured that the users who are using the Citrix-managed cloud services are still unaffected.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and...

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...