SolutionĬustomers are advised to refer to CTX463706 for information pertaining to remediating this vulnerability. This QID checks for vulnerable versions of Citrix ADC/Netscaler.Ĭonsequence Successful exploitation of this vulnerability may allow an attacker to either crash or service unavailability of the application. QID marked as practice as we are not checking Max Login Attempts conditionĬitrix ADC and Citrix Gateway 13.1 before 13.1-33.47Ĭitrix ADC and Citrix Gateway 13.0 before 13.0-88.12Ĭitrix ADC and Citrix Gateway 12.1 before 12.1.65.21 Note that only appliances that are operating as a Gateway (appliances using the SSL VPN functionality or deployed as an ICA proxy with authentication enabled) are affected by the first issue, which is rated as a Critical severity vulnerability. Qualys ID 377753 Date Published NovemVendor Reference CTX463706 CVE Reference CVE-2022-27516 CVSS Scores Base 9.8 / Temporal 8.5 Description Vulnerabilities have been discovered in Citrix Gateway and Citrix ADC, listed below. Published vulnerabilities by signing up for a Non-Qualys customers can audit their network for all We have published the detection on the date indicated,Īnd it will typically be available in the KnowledgeBase We are coding a detection and will typically publish it We are researching a detection and will publish one if Please reach out to Qualys Support for status of such support cases. Specific CVE feature requests filed via a Qualys Support case may or may not show up on this page. It may not show all the CVEs that are actively being investigated. Visibility into upcoming and new detections (QIDs) for allĭisclaimer: The Vulnerability Detection Pipeline is intended to give users an early insight into some of the CVEs the Qualys Research Team is investigating. Browse, filter by detection status, or search by CVE to get
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |