#VU69136 Protection Mechanism Failure in Citrix Access Gateway and Citrix Netscaler ADC


Published: 2022-11-08

Vulnerability identifier: #VU69136

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-27516

CWE-ID: CWE-693

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Citrix Access Gateway
Server applications / Remote management servers, RDP, SSH
Citrix Netscaler ADC
Client/Desktop applications / Software for system administration

Vendor:

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to incorrect implementation of of the "Max Login Attempts" feature within the VPN (Gateway) and AAA virtual server. An attacker can bypass implemented security restrictions and perform a brute-force attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability