
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN365
_____________________________________________________________________

DATE                : 20/07/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Citrix ADC, Citrix Gateway versions
                               prior to 13.0-82.45, 12.1-62.27,
             Citrix ADC, NetScaler Gateway versions prior to 11.1-65.22,
                Citrix ADC 12.1-FIPS versions prior to 12.1-55.247,
                       Citrix SD-WAN WANOP versions prior to 11.4.0.a,
                             11.3.2.a, 11.2.3.b, 10.2.9.b.

=====================================================================
https://support.citrix.com/article/CTX319135
_____________________________________________________________________

Citrix Application Delivery Controller, Citrix Gateway, and
Citrix SD-WAN WANOP Edition appliance Security Update


Reference: CTX319135
Category : High
Created  : 19 July 2021
Modified : 19 July 2021


Applicable Products

  o Citrix ADC
  o Citrix Gateway
  o Citrix SD-WAN WANOP


Description of Problem

Multiple vulnerabilities have been discovered in Citrix ADC (formerly
known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler
Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO,
5000-WO, and 5100-WO.
These vulnerabilities, if exploited, could result in the following
security issues:

+--------------+-------------------+------------+-------------+---------------+
|CVE-ID        |Description        |CWE         |Affected     |Pre-

                                                             conditions|
|              |                   |            |Products     |
      |
+--------------+-------------------+------------+-------------+---------------+
|              |                   |CWE-400:    |Citrix ADC,  |
                                                              Unauth
                                                              enticated|
|              |Limited disk space |Uncontrolled|Citrix       |attacker
                                                               must  |
|CVE-2021-22919|consumption on the |Resource    |Gateway,     |be able
                                                                to     |
|              |appliance          |Consumption |Citrix SD-WAN|reach the
     |
|              |                   |            |WANOP
                                                 Edition     |management
                                                                  GUI |
+--------------+-------------------+------------+-------------+---------------+
|              |SAML authentication|CWE-284:    |             |Citrix
                                                               ADC or  |
|              |hijack through a   |Improper    |Citrix ADC,  |Citrix
                                                               Gateway |
|CVE-2021-22920|phishing attack to |access      |Citrix       |must be
                                                                       |
|              |steal a valid user |control     |Gateway
                                                             |configured
                                                                as a   |
|              |session            |            |             |SAML SP |
+--------------+-------------------+------------+-------------+---------------+
|              |                   |            |             |Citrix
                                                               ADC or  |
|              |Session fixation by|CWE-384:    |Citrix ADC,  |Citrix
                                                               Gateway |
|CVE-2021-22927|an authorized user |Session     |Citrix       |must be
                                                                       |
|              |on SAML SP         |Fixation    |Gateway
                                                             |configured
                                                                 as a  |
|              |                   |            |             |SAML SP |
+--------------+-------------------+------------+-------------+---------------+

The following supported versions of Citrix ADC, Citrix Gateway, and
Citrix SD-WAN WANOP Edition are affected by CVE-2021-22919:

  o Citrix ADC and Citrix Gateway 13.0 before 13.0-82.45
  o Citrix ADC and Citrix Gateway 12.1 before 12.1-62.27
  o Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.22
  o Citrix ADC 12.1-FIPS before 12.1-55.247
  o Citrix SD-WAN WANOP Edition 11.4 before 11.4.0.a
  o Citrix SD-WAN WANOP Edition 11.3 before 11.3.2.a
  o Citrix SD-WAN WANOP Edition 11.2 before 11.2.3.b
  o Citrix SD-WAN WANOP Edition 10.2 before 10.2.9.b

The following supported versions of Citrix ADC and Citrix Gateway are
affected by CVE-2021-22920:

  o Citrix ADC and Citrix Gateway 13.0-82.42
  o Citrix ADC and Citrix Gateway 12.1-62.25

The following supported versions of Citrix ADC and Citrix Gateway are
affected by CVE-2021-22927:

  o Citrix ADC and Citrix Gateway 13.0 before 13.0-82.45
  o Citrix ADC and Citrix Gateway 12.1 before 12.1-62.27
  o Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.22
  o Citrix ADC 12.1-FIPS before 12.1-55.247

These issues have already been addressed in Citrix managed Cloud
services such as Citrix Gateway Service and Citrix Secure Workspace
Access. Customers using Citrix managed Cloud services do not need to
take any action.


What Customers Should Do

The following supported versions of Citrix ADC, Citrix Gateway and
Citrix SD-WAN WANOP Edition address CVE-2021-22919:

  o Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0
  o Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1
  o Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of
     11.1
  o Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS
  o Citrix SD-WAN WANOP Edition 11.4.0a and later releases of 11.4
  o Citrix SD-WAN WANOP Edition 11.3.2a and later releases of 11.3
  o Citrix SD-WAN WANOP Edition 11.2.3b and later releases of 11.2
  o Citrix SD-WAN WANOP Edition 10.2.9b and later releases of 10.2

The following supported versions of Citrix ADC and Citrix Gateway
address CVE-2021-22920

  o Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0
  o Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1

The following supported versions of Citrix ADC and Citrix Gateway
address CVE-2021-22927

  o Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0
  o Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1
  o Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of
     11.1
  o Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS

Citrix strongly recommends that affected customers install relevant
updates as soon as possible.

If Citrix ADC or Citrix Gateway is configured as a SAML SP, customers
must ensure that the device is configured accordingly. See Citrix
Application Delivery Controller and Gateway - SAML Configuration
Reference Guide for details. Customers who have previously set the SAML
configuration according to the document do not need to reapply the
configuration changes.


Acknowledgements

Citrix would like to thank Wolfgang Ettlinger and Marc Nimmerrichter of
Certitude Consulting for working with us to protect Citrix customers.


What Citrix is Doing

Citrix is notifying customers and channel partners about this potential
security issue. This article is also available from the Citrix Knowledge
Center at https://support.citrix.com/ .


Obtaining Support on This Issue

If you require technical assistance with this issue, please contact
Citrix Technical Support. Contact details for Citrix Technical Support
are available at https://www.citrix.com/support/open-a-support-case/ .


Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and
considers any and all potential vulnerabilities seriously. For details
on our vulnerability response process and guidance on how to report
security-related issues to Citrix, please see the following webpage:
https://www.citrix.com/about/trust-center/vulnerability-process.html .


Disclaimer

This document is provided on an "as is" basis and does not imply any
kind of guarantee or warranty, including the warranties of
merchantability or fitness for a particular use. Your use of the
information on the document is at your own risk. Citrix reserves the
right to change or update this document at any time.


Changelog

Date       Change

2021-07-19 Initial Publication

2021-07-19 CVE-2021-22919 clarification


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================







