Citrix published security patches to fix a critical authentication bypass issue in Citrix ADC and Citrix Gateway. It is advised that impacted users of Citrix ADC and Citrix Gateway install the relevantly updated versions of those products as early as possible.
Citrix Gateway is a commonly used cloud-based or on-premises business server SSL VPN service that offers secure remote access with identity and access management capabilities.
For enterprise-deployed cloud applications, Citrix ADC is a load-balancing solution that guarantees continuous availability and the best performance.
“Note that only appliances that are operating as a Gateway (appliances using the SSL VPN functionality or deployed as an ICA proxy with authentication enabled) are affected by the first issue, which is rated as a Critical severity vulnerability”, reads the Citrix security bulletin.
The company fixed three vulnerabilities overall. The three flaws can allow attackers to bypass login brute force protection, perform remote desktop takeover, or get unauthorized access to the device depending on the configuration.
Critical-severity authentication bypassing using an alternate path or channel is exploitable only if the appliance is configured as VPN (Gateway).
An insufficient verification of data authenticity allows remote desktop takeover via phishing. The issue is exploitable only if the appliance is configured as VPN (Gateway), and the RDP proxy functionality is configured.
It is a user login brute force protection functionality bypass. This vulnerability can only be exploited if the appliance is configured as VPN (Gateway) or AAA virtual server with a “Max Login Attempts” configuration.
The Following Versions of Citrix ADC and Citrix Gateway are Affected By This Vulnerability
The company said this applies to customer-managed Citrix ADC and Citrix Gateway appliances. Customers using Citrix-managed cloud services do not need to take any action.
Notably, Citrix ADC and Citrix Gateway versions prior to 12.1 are EOL, and customers on those versions are recommended to upgrade to one of the supported versions.
Managed DDoS Attack Protection for Applications – Download Free Guide
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…