First published: Tue Nov 08 2022(Updated: )
Remote desktop takeover via phishing
Credit: secure@citrix.com secure@citrix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Gateway | >=12.1<12.1-65.21 | |
Citrix Gateway | >=13.0<13.0-88.12 | |
Citrix Gateway | >=13.1<13.1-33.41 | |
Citrix Application Delivery Controller Firmware | >=12.1<12.1-65.21 | |
Citrix Application Delivery Controller Firmware | >=13.0<13.0-88.12 | |
Citrix Application Delivery Controller Firmware | >=13.1<13.1-33.47 | |
Citrix Application Delivery Controller | ||
Citrix Application Delivery Controller Firmware | >=12.1<12.1-55.289 | |
Citrix Application Delivery Controller Firmware | >=12.1<12.1-55.289 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27513 is a vulnerability that allows attackers to take control of remote desktops through phishing attacks.
CVE-2022-27513 has a severity rating of 9.6, which is considered critical.
Citrix Gateway versions 12.1-65.21 to 12.1-65.21, 13.0-88.12 to 13.0-88.12, and 13.1-33.41 to 13.1-33.41, as well as Citrix Application Delivery Controller Firmware versions 12.1-65.21 to 12.1-65.21, 13.0-88.12 to 13.0-88.12, and 13.1-33.47 to 13.1-33.47 are affected by CVE-2022-27513.
An attacker can exploit CVE-2022-27513 by tricking users into clicking on malicious links or downloading malicious files through phishing emails or websites.
No, Citrix Application Delivery Controller is not vulnerable to CVE-2022-27513.