Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-22956: Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Edition appliance Security Update

An uncontrolled resource consumption vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication.

CVE
#vulnerability#web#dos

CTX330728

{{tooltipText}}

Security Bulletin | Critical | {{likeCount}} found this helpful | Created: {{articleFormattedCreatedDate}} | Modified: {{articleFormattedModifiedDate}}

Description of Problem

Vulnerabilities have been discovered in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could result in the following security issues:

CVE-ID

Description

CWE

Affected Products

Pre-conditions

Criticality

CVE-2021-22955

Unauthenticated denial of service

CWE-400: Uncontrolled Resource Consumption

Citrix ADC, Citrix Gateway

Appliance must be configured as a VPN (Gateway) or AAA virtual server

Critical

CVE-2021-22956

Temporary disruption of the Management GUI, Nitro API and RPC communication

CWE-400: Uncontrolled Resource Consumption

Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP Edition

Access to NSIP or SNIP with management interface access

Low

CVE-2021-22955: The following supported versions of Citrix ADC and Citrix Gateway are affected by this vulnerability:

  • Citrix ADC and Citrix Gateway 13.0 before 13.0-83.27
  • Citrix ADC and Citrix Gateway 12.1 before 12.1-63.22

  • Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.23

  • Citrix ADC 12.1-FIPS before 12.1-55.257

CVE-2021-22956: All supported versions of Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP Edition are affected by this vulnerability until the appliance has been configured according to the Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Edition - Management Module Configuration Reference Guide.

The following supported versions of Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP Edition support this configuration change:

  • Citrix ADC and Citrix Gateway 13.1-4.43 and later releases

  • Citrix ADC and Citrix Gateway 13.0-83.27 and later releases of 13.0

  • Citrix ADC and Citrix Gateway 12.1-63.22 and later releases of 12.1

  • Citrix ADC and NetScaler Gateway 11.1-65.23 and later releases of 11.1

  • Citrix ADC 12.1-FIPS 12.1-55.257 and later releases of 12.1-FIPS

  • Citrix SD-WAN WANOP Edition 11.4.2 and later releases of 11.4

  • Citrix SD-WAN WANOP Edition 10.2.9c and later releases of 10.2

Please note that the WANOP feature of SD-WAN Premium Edition is not impacted.

This bulletin only applies to customer-managed Citrix ADC, Citrix Gateway and Citrix SD-WAN WANOP Edition appliances. Customers using Citrix-managed cloud services do not need to take any action.

Mitigating Factors

CVE-2021-22956 only affects access to the management GUI, Nitro API and RPC communication and does not affect CLI access. Citrix strongly recommends that network traffic to the appliance’s management interface is separated, either physically or logically, from normal network traffic. Doing so greatly diminishes the risk of exploitation of this issue. See https://docs.citrix.com/en-us/citrix-adc/citrix-adc-secure-deployment/secure-deployment-guide.html for more information.

What Customers Should Do

To address these vulnerabilities customers should follow all the upgrade and configuration instructions below.

CVE-2021-22955: Affected customers must upgrade to one of the following supported versions of Citrix ADC and Citrix Gateway to address the vulnerability:

  • Citrix ADC and Citrix Gateway 13.1-4.43 and later releases

  • Citrix ADC and Citrix Gateway 13.0-83.27 and later releases of 13.0

  • Citrix ADC and Citrix Gateway 12.1-63.22 and later releases of 12.1

  • Citrix ADC and NetScaler Gateway 11.1-65.23 and later releases of 11.1

  • Citrix ADC 12.1-FIPS 12.1-55.257 and later releases of 12.1-FIPS

Citrix recommends that affected customers install the relevant update as soon as possible.

CVE-2021-22956: Customers must configure their appliance according to the Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Edition - Management Module Configuration Reference Guide to address the vulnerability. This configuration change is only available in the following versions:

  • Citrix ADC and Citrix Gateway 13.1-4.43 and later releases

  • Citrix ADC and Citrix Gateway 13.0-83.27 and later releases of 13.0

  • Citrix ADC and Citrix Gateway 12.1-63.22 and later releases of 12.1

  • Citrix ADC and NetScaler Gateway 11.1-65.23 and later releases of 11.1

  • Citrix ADC 12.1-FIPS 12.1-55.257 and later releases of 12.1-FIPS

  • Citrix SD-WAN WANOP Edition 11.4.2 and later releases of 11.4

  • Citrix SD-WAN WANOP Edition 10.2.9c and later releases of 10.2

Citrix recommends that affected customers ensure they are running a relevant version and then modify the configuration as soon as their patching schedule allows.

What Citrix is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at https://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at https://www.citrix.com/support/open-a-support-case/.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For details on our vulnerability response process and guidance on how to report security-related issues to Citrix, please see the following webpage: https://www.citrix.com/about/trust-center/vulnerability-process.html.

Disclaimer

This document is provided on an “as is” basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information on the document is at your own risk. Citrix reserves the right to change or update this document at any time.

Changelog

Date

Change

2021-11-09

Initial Publication

2021-11-09

Minor formatting changes

2021-11-10

Clarification regarding remediation steps for CVE-22956

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907