First published: Tue Apr 12 2022(Updated: )
Citrix XenMobile Server 10.12 through RP11, 10.13 through RP7, and 10.14 through RP4 allows Command Injection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix XenMobile Server | =10.13.0 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_3 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_4 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_5 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_6 | |
Citrix XenMobile Server | =10.13.0-rolling_patch_7 | |
Citrix XenMobile Server | =10.14.0 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_1 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_2 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_3 | |
Citrix XenMobile Server | =10.14.0-rolling_patch_4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-26151 is critical with a severity score of 7.2.
Citrix XenMobile Server versions 10.13.0-rolling_patch_3 and later (including 10.13.0 through RP7 and 10.14.0 through RP4) are affected by CVE-2022-26151.
CVE-2022-26151 is a Command Injection vulnerability.
To fix CVE-2022-26151, it is recommended to apply the latest rolling patches or updates provided by Citrix.
You can find more information about CVE-2022-26151 on the Citrix support website and the CHT Security news article.