First published: Tue Dec 07 2021(Updated: )
An uncontrolled resource consumption vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Application Delivery Controller Firmware | <11.1-65.23 | |
Citrix Application Delivery Controller Firmware | >=12.1<12.1-63.22 | |
Citrix Application Delivery Controller Firmware | >=13.0<13.0-83.27 | |
Citrix Application Delivery Controller | ||
Citrix Gateway | <11.1-65.23 | |
Citrix Gateway | >=12.1<12.1-63.22 | |
Citrix Gateway | >=13.0<13.0-65.23 | |
Citrix SD-WAN | <10.2.9c | |
Citrix SD-WAN | >=11.4.0<11.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22956 is an uncontrolled resource consumption vulnerability in Citrix ADC <13.0-83.27, <12.1-63.22, and 11.1-65.23 that could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication.
CVE-2021-22956 affects Citrix ADC versions <13.0-83.27, <12.1-63.22, and 11.1-65.23.
CVE-2021-22956 has a severity rating of 7.5 (high).
An attacker with access to NSIP or SNIP with management interface access can exploit CVE-2021-22956.
Applying the recommended patches from Citrix is the best way to mitigate CVE-2021-22956.