Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27509
Issue
A vulnerability has been discovered in Citrix ADC and Citrix Gateway which enables an attacker to create a specially crafted URL that redirects to a malicious website. This vulnerability has the following identifier:
CVD-ID |
Description |
CWE |
Pre-Conditions |
---|---|---|---|
CVE-2022-27509 | Unauthorized redirection to a malicious website | CWE-345: Insufficient Verification of Data Authenticity | Appliance must be configured as a VPN (Gateway) or AAA virtual server. A victim must use an attacker-crafted link. |
Additional Information
The following supported versions of Citrix ADC and Citrix Gateway are affected by this vulnerability:
- Citrix ADC and Citrix Gateway 13.1 before 13.1-24.38
- Citrix ADC and Citrix Gateway 13.0 before 13.0-86.17
- Citrix ADC and Citrix Gateway 12.1 before 12.1-65.15
- Citrix ADC 12.1-FIPS before 12.1-55.282
- Citrix ADC 12.1-NDcPP before 12.1-55.282
This bulletin only applies to customer-managed Citrix ADC and Citrix Gateway appliances. Customers using Citrix-managed cloud services do not need to take any action.
Recommended Action
Citrix recommends that affected customers install the relevant updated versions of Citrix ADC or Citrix Gateway as soon as possible:
- Citrix ADC and Citrix Gateway 13.1-24.38 and later releases
- Citrix ADC and Citrix Gateway 13.0-86.17 and later releases of 13.0
- Citrix ADC and Citrix Gateway 12.1-65.15 and later releases of 12.1
- Citrix ADC 12.1-FIPS 12.1-55.282 and later releases of 12.1-FIPS
- Citrix ADC 12.1-NDcPP 12.1-55.282 and later releases of 12.1-NDcPP
Note: Customers who have previously copied the httpd.conf file to the /nsconfig directory must follow the steps at https://docs.citrix.com/en-us/citrix-adc/current-release/upgrade-downgrade-citrix-adc-appliance/upgrade-considerations-customized-files.html to ensure this security update is correctly installed.
More Information
For assistance from the Kraft Kennedy team, please contact us.