Description of Problem
Vulnerabilities have been discovered in Citrix ADC and Citrix Gateway that, if exploited, could result in a denial of service.
These vulnerabilities have the following identifiers:
CVE-ID | Description | CWE | Pre-conditions |
CVE-2022-27507 | Authenticated denial of service | CWE-400: Uncontrolled Resource Consumption
| VPN (Gateway) virtual server with
|
CVE-2022-27508 | Unauthenticated denial of service | CWE-400: Uncontrolled Resource Consumption
| Appliance must be configured as a VPN (Gateway) or AAA virtual server |
CVE-2022-27507 (Medium severity)
The following supported versions of Citrix ADC and Citrix Gateway are affected by this vulnerability if DTLS is enabled and either ‘HDX Insight for EDT traffic’ or ‘SmartControl’ have been configured:
Citrix ADC and Citrix Gateway 13.1 before 13.1-21.50
Citrix ADC and Citrix Gateway 13.0 before 13.0-85.19
Citrix ADC and Citrix Gateway 12.1 before 12.1-64.17
Citrix ADC 12.1-FIPS before 12.1-55.278
Citrix ADC 12.1-NDcPP before 12.1-55.278
Citrix ADC and Citrix Gateway are vulnerable if both of the following conditions are met:
DTLS is enabled:
Customers can determine if DTLS is enabled by executing the following CLI command:
show vpn vserver
For each vServer, "Dtls : ON" or "Dtls : OFF" will indicate the DTLS state.
‘HDX Insight for EDT traffic’ or ‘SmartControl’ is configured:
Customers can determine if ‘HDX Insight for EDT traffic’ or ‘SmartControl’, has been configured by inspecting the ns.conf file for a VPN vserver policy binding with an ICA_REQUEST type. For example:
bind vpn vserver <name> -policy <policy_name> -priority 100 -type ICA_REQUEST
CVE-2022-27508 (High severity)
The only supported version of Citrix ADC and Citrix Gateway affected by this vulnerability is:
Citrix ADC and Citrix Gateway 12.1-64.16
All other supported versions of Citrix ADC and Citrix Gateway, including FIPS and NDcPP versions are not affected by this issue.