Vulnerabilites related to Citrix - Citrix Gateway, Citrix ADC
cve-2022-27510
Vulnerability from cvelistv5
Published
2022-11-08 21:26
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
Unauthorized access to Gateway user capabilities
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:32:59.200Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Citrix Gateway, Citrix ADC ", vendor: "Citrix", versions: [ { status: "affected", version: "0", }, ], }, ], datePublic: "2022-11-08T13:32:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Unauthorized access to Gateway user capabilities </span><br>", }, ], value: "Unauthorized access to Gateway user capabilities \n", }, ], impacts: [ { capecId: "CAPEC-115", descriptions: [ { lang: "en", value: "CAPEC-115 Authentication Bypass", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-288", description: "CWE-288: Authentication Bypass Using an Alternate Path or Channel", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-18T16:48:59.139Z", orgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", shortName: "Citrix", }, references: [ { name: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", url: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", }, ], source: { discovery: "UNKNOWN", }, title: "Unauthorized access to Gateway user capabilities ", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", assignerShortName: "Citrix", cveId: "CVE-2022-27510", datePublished: "2022-11-08T21:26:10.688499Z", dateReserved: "2022-03-21T00:00:00", dateUpdated: "2024-08-03T05:32:59.200Z", serial: 1, state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-27513
Vulnerability from cvelistv5
Published
2022-11-08 21:26
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
Remote desktop takeover via phishing
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:32:59.251Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Citrix Gateway, Citrix ADC ", vendor: "Citrix", versions: [ { status: "affected", version: "0", }, ], }, ], datePublic: "2022-11-08T13:32:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">Remote desktop takeover via phishing </span> </span><br>", }, ], value: "Remote desktop takeover via phishing \n", }, ], impacts: [ { descriptions: [ { lang: "en", value: "Remote desktop takeover via phishing ", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-345", description: "CWE-345: Insufficient Verification of Data Authenticity", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-18T17:10:16.426Z", orgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", shortName: "Citrix", }, references: [ { name: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", url: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", }, ], source: { discovery: "UNKNOWN", }, title: "Remote desktop takeover via phishing", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", assignerShortName: "Citrix", cveId: "CVE-2022-27513", datePublished: "2022-11-08T21:26:08.238599Z", dateReserved: "2022-03-21T00:00:00", dateUpdated: "2024-08-03T05:32:59.251Z", serial: 1, state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-27518
Vulnerability from cvelistv5
Published
2022-12-13 00:00
Modified
2025-01-28 16:20
Severity ?
EPSS score ?
Summary
Unauthenticated remote arbitrary code execution
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 12.1 Version: 13.0 Version: 12.1 FIPs, NDcPP |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:32:59.829Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://support.citrix.com/article/CTX474995", tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX474995", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-27518", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2023-11-20T20:56:29.075511Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-12-13", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-27518", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2025-01-28T16:20:38.276Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Citrix Gateway, Citrix ADC ", vendor: "Citrix", versions: [ { status: "affected", version: "12.1", }, { status: "affected", version: "13.0", }, { status: "affected", version: "12.1 FIPs, NDcPP", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">Unauthenticated remote arbitrary code execution</span><br>", }, ], value: "Unauthenticated remote arbitrary code execution\n", }, ], impacts: [ { capecId: "CAPEC-253", descriptions: [ { lang: "en", value: "CAPEC-253 Remote Code Inclusion", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-664", description: "CWE-664: Improper Control of a Resource Through its Lifetime ", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-18T17:34:17.110Z", orgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", shortName: "Citrix", }, references: [ { name: "https://support.citrix.com/article/CTX474995", url: "https://support.citrix.com/article/CTX474995", }, ], source: { discovery: "UNKNOWN", }, title: "Unauthenticated remote arbitrary code execution", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", assignerShortName: "Citrix", cveId: "CVE-2022-27518", datePublished: "2022-12-13T00:00:00.000Z", dateReserved: "2022-03-21T00:00:00.000Z", dateUpdated: "2025-01-28T16:20:38.276Z", serial: 1, state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-27516
Vulnerability from cvelistv5
Published
2022-11-08 21:26
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
User login brute force protection functionality bypass
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Citrix | Citrix Gateway, Citrix ADC |
Version: 0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T05:32:59.301Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", tags: [ "x_transferred", ], url: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Citrix Gateway, Citrix ADC ", vendor: "Citrix", versions: [ { status: "affected", version: "0", }, ], }, ], datePublic: "2022-11-08T13:32:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">User login brute force protection functionality bypass </span> </span> </span><br>", }, ], value: "User login brute force protection functionality bypass \n", }, ], impacts: [ { descriptions: [ { lang: "en", value: "User login brute force protection functionality bypass ", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-693", description: "CWE-693: Protection Mechanism Failure", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-10-18T17:32:37.759Z", orgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", shortName: "Citrix", }, references: [ { name: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", url: "https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516", }, ], source: { discovery: "UNKNOWN", }, title: "User login brute force protection functionality bypass ", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", assignerShortName: "Citrix", cveId: "CVE-2022-27516", datePublished: "2022-11-08T21:26:12.642212Z", dateReserved: "2022-03-21T00:00:00", dateUpdated: "2024-08-03T05:32:59.301Z", serial: 1, state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }