First published: Tue Apr 12 2022(Updated: )
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Command Injection vulnerability, leading to remote code execution with root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix XenMobile Server | =10.13.0 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_3 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_4 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_5 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_6 | |
Citrix XenMobile Server | =10.14.0 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_1 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_2 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44520 is an Authenticated Command Injection vulnerability in Citrix XenMobile Server through 10.12 RP9.
CVE-2021-44520 has a severity score of 8.8 (critical).
CVE-2021-44520 allows an attacker to execute arbitrary commands with root privileges through the vulnerable Citrix XenMobile Server.
To mitigate CVE-2021-44520, update Citrix XenMobile Server to version 10.13.0 or higher.
You can find more information about CVE-2021-44520 in the Citrix XenMobile Server document history, a GitHub Gist, and a support article on the Citrix website.