What We Do
How we do it
Resources
TRU INTELLIGENCE CENTER
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
SECURITY ADVISORIES
May 31, 2023
CVE-2023-2868 – Barracuda Zero-Day Vulnerability
THE THREAT On May 23rd, the email security company Barracuda disclosed a new vulnerability impacting Barracuda Email Security Gateway (ESG) appliances. Exploitation of the vulnerability, by threat…
Read More
View all Advisories →
Company
ABOUT ESENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Mar 20, 2023
Exertis and eSentire Partner to Deliver 24/7 Multi-Signal MDR, Digital Forensics & IR Services and Exposure Management to Organisations Across the UK, Ireland, and Europe
Basingstoke, UK– 20 March, 2023. Leading technology distributor, Exertis, announced today that it has bolstered its cybersecurity services, adding eSentire, the Authority in Managed Detection and Response (MDR), to its Enterprise portfolio of offerings. eSentire’s award-winning, 24/7 multi-signal MDR, Digital Forensics & Incident Response (IR), and Exposure Management services will be available…
Read More
Partners
PARTNER PROGRAM
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
ECOSYSTEM PARTNER RESOURCES
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Search
Resources
Security advisories — Dec 13, 2022

Citrix ADC and Gateway Zero-Day Vulnerability - CVE-2022-27518

2 minutes read
Speak With A Security Expert Now

THE THREAT

On December 13th, 2022, Citrix released a patch for vulnerable versions of Citrix ADC and Citrix Gateway products [1]. The vulnerability is tracked as CVE-2022-27518; Citrix describes it as an arbitrary code execution vulnerability. When CVE-2022-27518 is exploited, a threat actor could perform unauthenticated arbitrary code execution on the appliance. This vulnerability is being actively exploited in the wild in limited targeted attacks [4]; applying the available patches as soon as possible is highly recommended.

What we’re doing about it

What you should do about it

Additional information

A vulnerability has been discovered in Citrix Gateway and Citrix ADC, tracked as CVE-2022-27518, that, if exploited, could allow an unauthenticated, remote attacker to perform arbitrary code execution on the appliance.

A pre-condition for this exploit to successfully impact an organization is that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP. The SAML IdP (Identity Provider) is a SAML entity deployed on the customer network. The IdP receives requests from the SAML SP and redirects users to a login page, where they must enter their credentials. The IdP authenticates these credentials with the active directory (external authentication server, such as LDAP) and then generates a SAML assertion sent to the SP.

As mentioned above, you can verify the impacted servers by inspecting your configuration files for the above lines. If either of the commands are present in the ns.conf file, the appliance must be updated if the version is affected.

Relevant updated versions of Citrix ADC or Citrix Gateway include:

Please note that Citrix ADC and Citrix Gateway versions prior to 12.1 are EOL, and customers on those versions are recommended to upgrade to one of the supported versions.

Citrix has notified users via their bulletin [2] and is providing technical assistance with this issue via your Citrix Technical Support contact. 

References:

[1] https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518
[2] https://support.citrix.com/search/#/All%20Products?ct=Security%20Bulletins&searchText=&sortBy=Created%20date&pageIndex=1
[3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27518
[4] https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/

View Most Recent Blogs