Privacy Ninja

Citrix Warns Critical Bug can let Attackers Reset Admin Passwords

Citrix Warns Critical Bug can let Attackers Reset Admin Passwords

Citrix warned customers to deploy security updates that address a critical Citrix Application Delivery Management (ADM) vulnerability that can let attackers reset admin passwords.

Citrix ADM is a web-based solution that provides admins with a centralized cloud-based console for managing on-premises or cloud Citrix deployments, including Citrix Application Delivery Controller (ADC), Citrix Gateway, and Citrix Secure Web Gateway.

It affects all supported versions of Citrix ADM server and Citrix ADM agent (i.e., Citrix ADM 13.0 before 13.0-85.19 and Citrix ADM 13.1 before 13.1-21.53).

Also Read: February 2022 PDPC Incidents and Undertaking

Successful exploitation of this security flaw can allow unauthenticated threat actors to corrupt unpatched systems remotely, leading to admin password reset.

“The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted,” Citrix explained in an advisory published this week.

Upgrade or mitigate ASAP

While the flaw has already been addressed for customers using the cloud-based Citrix ADM service, the company urged admins running vulnerable versions on-premises to patch their installations ASAP.

“Citrix recommends that affected customers install the relevant updated versions of Citrix ADM server and Citrix ADM agent as soon as possible,” the company warned on Tuesday.

“Customers must upgrade both Citrix ADM server and all associated Citrix ADM agents.”

Citrix provides detailed instructions on upgrading ADM servers and all associated Citrix ADM agents on its documentation website.

Also Read: PDPA compliance and progressive HR practices: Why this tandem makes sense

Those who cannot immediately install these security updates can apply mitigation measures shared by Citrix to reduce the risk of exploitation.

“Citrix strongly recommends that network traffic to the Citrix ADM’s IP address is segmented, either physically or logically, from standard network traffic. Doing so diminishes the risk of exploitation of these issues,” the company added.

Citrix has also patched a second security flaw (CVE-2022-27512) this week that would lead to temporary disruption of the ADM license server following successful exploitation.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us