First published: Tue Apr 19 2022(Updated: )
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Directory Traversal vulnerability, leading to remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix XenMobile Server | =10.13.0 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_3 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_4 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_5 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_6 | |
Citrix XenMobile Server | =10.14.0 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_1 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_2 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-44519.
The severity of CVE-2021-44519 is high (8.8).
CVE-2021-44519 is an Authenticated Directory Traversal vulnerability that leads to remote code execution in Citrix XenMobile Server.
Versions 10.13.0 to 10.14.0 of Citrix XenMobile Server are affected by CVE-2021-44519.
Yes, Citrix has released patches to address the vulnerability. Please refer to the Citrix documentation and support articles for patch details.