• Insights

Citrix ADC and Citrix Gateway Security Bulletin

Jeff Silverman

2 min read

All Insights

Vulnerabilities have been discovered in Citrix ADC and Citrix Gateway that, if exploited, could result in denial of service. These vulnerabilities have the following identifiers: 

CVD-ID Description CWE Pre-Conditions
CVE-2022-27507 Authenticated denial of service CWE-400: Uncontrolled resource consumption VPN (Gateway) virtual server with DTLS and either HDX Insight for EDT traffic or SmartControl configured
CVE-2022-27508 Unauthenticated denial of service CWE-400: Uncontrolled resource consumption Appliance must be configured as a VPN (Gateway) or AAA virtual server
Additional Information

CVE-2022-27507 (Medium severity)

The following supported versions of Citrix ADC and Citrix Gateway are affected by this vulnerability if DTLS is enabled and either ‘HDX Insight for EDT traffic’ or ‘SmartControl’ have been configured:

  • Citrix ADC and Citrix Gateway 13.1 before 13.1-21.50
  • Citrix ADC and Citrix Gateway 13.0 before 13.0-85.19
  • Citrix ADC and Citrix Gateway 12.1 before 12.1-64.17
  • Citrix ADC 12.1-FIPS before 12.1-55.278
  • Citrix ADC 12.1-NDcPP before 12.1-55.278

Citrix ADC and Citrix Gateway are vulnerable if both of the following conditions are met:

  1. DTLS is enabled:

Customers can determine if DTLS is enabled by executing the following CLI command:

show vpn vserver

For each vServer, “Dtls : ON” or “Dtls : OFF” will indicate the DTLS state.

  1. ‘HDX Insight for EDT traffic’ or ‘SmartControl’ is configured:

Customers can determine if ‘HDX Insight for EDT traffic’ or ‘SmartControl’, has been configured by inspecting the ns.conf file for a VPN vserver policy binding with an ICA_REQUEST type. For example:

bind vpn vserver <name> -policy <policy_name> -priority 100 -type ICA_REQUEST

CVE-2022-27508 (High severity)

The only supported version of Citrix ADC and Citrix Gateway affected by this vulnerability is:

  • Citrix ADC and Citrix Gateway 12.1-64.16

All other supported versions of Citrix ADC and Citrix Gateway, including FIPS and NDcPP versions are not affected by this issue.

Recommended Action

Citrix recommends that affected customers install the relevant updated versions of Citrix ADC or Citrix Gateway as soon as possible.

  • Citrix ADC and Citrix Gateway 13.1-21.50 and later releases
  • Citrix ADC and Citrix Gateway 13.0-85.19 and later releases of 13.0
  • Citrix ADC and Citrix Gateway 12.1-64.17 and later releases of 12.1
  • Citrix ADC 12.1-FIPS 12.1-55.278 and later releases of 12.1-FIPS
  • Citrix ADC 12.1-NDcPP 12.1-55.278 and later releases of 12.1-NDcPP

Customers who are only impacted by CVE-2022-27507 and have DTLS enabled and have configured ‘HDX Insight for EDT traffic’ or ‘SmartControl’ can alternatively disable ‘HDX Insight for EDT traffic’ to address the issue without upgrading by using the following shell commands:

nsapimgr -ys enable_ica_edtinsight=0

echo “nsapimgr -ys enable_ica_edtinsight=0” >> /nsconfig/rc.netscaler

This will ensure it is persistently applied after a reboot of the Citrix ADC appliance.

Note that this will prevent some HDX Insight analytics information from being logged. Also, note also that the commands should be removed after upgrading to a version that addresses the vulnerability.

More Information


For assistance from the Kraft Kennedy team, please contact us.