Daily Tech News, Interviews, Reviews and Updates

Citrix Issued warning to its customers to upgrade and stop a critical bug from resetting Admin Password

Citrix warns its customers to establish security updates that detect a critical Citrix Application Delivery Management’s (ADM) susceptibility to let the attackers change the admin password.

Citrix Application Delivery and Management (Citrix ADM) is a web-based solution for managing all Citric deployments including Citric ADC MPX, Citric ADC VPX, Citrix Gateway, and many others. Citrix secures Web Gateways deployed on clouds.

Florian Hauser of Code White reported a bug named CVE-2022-27511 that causes Improper Access Control weakness, by restricting the software from stopping unauthorized threat actors. Citrix ADM server and Citrix ADM agent both versions are exploited to breach security to let the threat actor corrupt systems remotely.

Citrix advises, “The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to construct with the default administrator credentials after the device has rebooted.”

Citrix further recommends that the compromised users can install relevant updated versions of the Citrix ADM server and Citrix ADM agent.

Citrix said, “Customers must upgrade both Citrix ADM server and all associated Citrix ADM agents.”

Citrix has also provided detailed instructions on upgrading methods of ADM servers on its documentation website.



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More