Thursday, December 26, 2024
HomeCyber Security NewsCritical Citrix ADC and Gateway Auth Bypass Flaw Let Attackers Gain Unauthorized...

Critical Citrix ADC and Gateway Auth Bypass Flaw Let Attackers Gain Unauthorized Access

Published on

SIEM as a Service

Citrix published security patches to fix a critical authentication bypass issue in Citrix ADC and Citrix Gateway. It is advised that impacted users of Citrix ADC and Citrix Gateway install the relevantly updated versions of those products as early as possible.

Citrix Gateway is a commonly used cloud-based or on-premises business server SSL VPN service that offers secure remote access with identity and access management capabilities.

For enterprise-deployed cloud applications, Citrix ADC is a load-balancing solution that guarantees continuous availability and the best performance.

- Advertisement - SIEM as a Service

“Note that only appliances that are operating as a Gateway (appliances using the SSL VPN functionality or deployed as an ICA proxy with authentication enabled) are affected by the first issue, which is rated as a Critical severity vulnerability”, reads the Citrix security bulletin.

Vulnerabilities Addressed

The company fixed three vulnerabilities overall. The three flaws can allow attackers to bypass login brute force protection, perform remote desktop takeover, or get unauthorized access to the device depending on the configuration.

Critical-severity authentication bypassing using an alternate path or channel is exploitable only if the appliance is configured as VPN (Gateway).

An insufficient verification of data authenticity allows remote desktop takeover via phishing. The issue is exploitable only if the appliance is configured as VPN (Gateway), and the RDP proxy functionality is configured.

It is a user login brute force protection functionality bypass. This vulnerability can only be exploited if the appliance is configured as VPN (Gateway) or AAA virtual server with a “Max Login Attempts” configuration.

The Following Versions of Citrix ADC and Citrix Gateway are Affected By This Vulnerability

  • Citrix ADC and Citrix Gateway 13.1 before 13.1-33.47 
  • Citrix ADC and Citrix Gateway 13.0 before 13.0-88.12 
  • Citrix ADC and Citrix Gateway 12.1 before 12.1.65.21
  • Citrix ADC 12.1-FIPS before 12.1-55.289 
  • Citrix ADC 12.1-NDcPP before 12.1-55.289

The company said this applies to customer-managed Citrix ADC and Citrix Gateway appliances. Customers using Citrix-managed cloud services do not need to take any action.

Notably, Citrix ADC and Citrix Gateway versions prior to 12.1 are EOL, and customers on those versions are recommended to upgrade to one of the supported versions.

Managed DDoS Attack Protection for Applications – Download Free Guide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Uncovered Dark Web Operation Acquiring KYC Details

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which...

Adobe Warns of ColdFusion Vulnerability Allows Attackers Read arbitrary files

Adobe has issued a critical security update for ColdFusion versions 2023 and 2021 to...

Beware of New Malicious PyPI packages That Steals Login Details

Two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, were recently detected by Fortinet's AI-driven OSS...

Brazilian Hacker Arrested Hacking Computers & Selling Data

A Brazilian man, Junior Barros De Oliveira, has been charged with multiple counts of...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Researchers Uncovered Dark Web Operation Acquiring KYC Details

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which...

Adobe Warns of ColdFusion Vulnerability Allows Attackers Read arbitrary files

Adobe has issued a critical security update for ColdFusion versions 2023 and 2021 to...

Beware of New Malicious PyPI packages That Steals Login Details

Two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, were recently detected by Fortinet's AI-driven OSS...