--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerability in Citrix ADM' version: '1.0' number: '2022-043' original_date: 'June 14, 2022' date: 'June 17, 2022' --- _History:_ * _17/06/2022 --- v1.0 -- Initial publication_ # Summary On the 14th of June 2022, Citrix released security updates to address vulnerabilities in Application Delivery Management that could allow an unauthenticated attacker to log in as administrator [1]. All supported versions of Citrix ADM server and Citrix ADM agent are affected by this vulnerability [2]. # Technical Details The vulnerabilities affects Citrix Application Delivery Management (Citrix ADM), when exploited it could result in the following security issues: - `CVE-2022-27511` - Corruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted. - `CVE-2022-27512` - Temporary disruption of the ADM license service. The impact of this includes preventing new licenses from being issued or renewed by Citrix ADM. # Affected Products - Citrix ADM 13.0 before 13.0-85.19 - Citrix ADM 13.1 before 13.1-21.53 Citrix has already updated the ADM cloud service, customers using it do not need to take additional action [1]. # Recommendations CERT-EU recommends to apply the patches provided by Citrix as soon as possible [2]. As a mitigation factor, Citrix recommends that network traffic to the Citrix ADM’s IP address is segmented, either physically or logically, from standard network traffic [2]. # References [1] [2]