Attackers Can Exploit Critical Citrix ADM Vulnerability to Reset Admin Passwords

Citrix on Tuesday warned of a critical vulnerability in Citrix Application Delivery Management (ADM) that could essentially allow an unauthenticated attacker to log in as administrator.

A centralized management solution, Citrix ADM provides visibility into application delivery infrastructure and simplifies operations through automated management jobs. It is deployed as a server that communicates with agents installed on externally managed appliances.

Tracked as CVE-2022-27511, the newly addressed security bug is described as an improper access control issue that could allow a remote, unauthenticated attacker to corrupt the system and trigger an administrator password reset.

“The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with SSH access to connect with the default administrator credentials after the device has rebooted,” Citrix explains in its advisory.

The vulnerability was resolved alongside CVE-2022-27512, which is described as an issue related to improper control of resources.

The issue could lead to the ADM license service being temporarily disrupted, thus preventing Citrix ADM from issuing new licenses or renewing existing ones.

Citrix notes that these vulnerabilities impact all supported versions of Citrix ADM server and Citrix ADM agent, namely versions 13.1 and 13.0. The company also underlines that Citrix ADM 12.1 has reached end of life (EOL) and is no longer supported.

Customers are advised to update to Citrix ADM 13.1-21.53 or later versions of 13.1, or Citrix ADM 13.0-85.19 or later versions of 13.0, which contain the necessary patches. The Citrix ADM server and all associated Citrix ADM agents need to be updated.

The tech giant also notes that it has already updated the Citrix ADM cloud service and that customers using it do not need to take additional action.

Citrix makes no mention of either of these vulnerabilities being exploited in attacks.

Please follow and like us:

Leave a Reply