First published: Thu Aug 05 2021(Updated: )
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Netscaler Application Delivery Controller Firmware | >=11.1<11.1-65.22 | |
Citrix Netscaler Application Delivery Controller Firmware | >=12.1<12.1-62.27 | |
Citrix Netscaler Application Delivery Controller Firmware | >=13.0<13.0-82.45 | |
Citrix Application Delivery Controller (ADC) and Gateway | ||
Citrix Netscaler Application Delivery Controller Firmware | >=12.1<12.1-55.238 | |
Citrix MPX/SDX 14030 FIPS | ||
Citrix MPX/SDX 14060 FIPS | ||
Citrix MPX/SDX 14080 FIPS | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix MPX | ||
Citrix NetScaler Gateway | >=12.1<12.1-62.27 | |
Citrix NetScaler Gateway | >=13.0<13.0-82.45 | |
Citrix NetScaler Access Gateway | >=11.1<11.1-65.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-22927.
The severity of CVE-2021-22927 is high (8.1).
The affected software for CVE-2021-22927 is Citrix ADC and Citrix Gateway 13.0-82.45.
CVE-2021-22927 is a session fixation vulnerability that exists in Citrix ADC and Citrix Gateway when configured as a SAML service provider, allowing an attacker to hijack a session.
To fix CVE-2021-22927, update Citrix ADC and Citrix Gateway to a version that is not affected by the vulnerability.