CVE-2022-27511Improper Access Control in Citrix Application Delivery Management

Severity
8.1HIGHNVD
EPSS
22.4%
top 4.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 16
Latest updateJul 1

Description

Corruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages5 packages

🔴Vulnerability Details

1
GHSA
GHSA-m9r7-42xp-mhjp: Corruption of the system by a remote, unauthenticated user2022-06-17

📋Vendor Advisories

1
Citrix
Citrix Application Delivery Management Security Bulletin for CVE-2022-27511 and CVE-2022-275122022-06-27

🕵️Threat Intelligence

2
Tenable
Cybersecurity Snapshot: 6 Things That Matter Right Now2022-07-01
Tenable
CVE-2022-27511, CVE-2022-27512: Patches for Two Citrix Application Delivery Management Vulnerabilities2022-06-17