CVE-2022-27518
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Unauthenticated remote arbitrary code execution
Analysis
Citrix ADC and Gateway contain an unauthenticated remote code execution vulnerability exploited by APT5 (Chinese state-sponsored) in zero-day attacks against critical infrastructure in December 2022.
Technical Context
The CWE-664 improper control of a resource vulnerability in Citrix ADC/Gateway's SAML service provider or identity provider configuration allows unauthenticated remote code execution. The technical details were limited in disclosure to slow exploitation.
Affected Products
['Citrix ADC and Gateway (when configured as SAML SP or IdP)']
Remediation
Apply Citrix security updates. Review SAML configuration. Check for indicators of APT5 compromise. Conduct thorough incident response if running an affected configuration during the exploitation window.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today