CVE-2021-22955

7.5 HIGH

📋 TL;DR

An unauthenticated denial of service vulnerability in Citrix ADC (formerly NetScaler) allows attackers to temporarily disrupt the Management GUI, Nitro API, and RPC communication when configured as a VPN Gateway or AAA virtual server. This affects organizations running vulnerable versions of Citrix ADC without proper patches. The vulnerability requires no authentication and can be exploited remotely.

💻 Affected Systems

Products:
  • Citrix ADC
  • Citrix Gateway
Versions: Versions before 13.0-83.27, 12.1-63.22, and 11.1-65.23
Operating Systems: Citrix ADC/NetScaler OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when configured as a VPN (Gateway) or AAA virtual server. Other configurations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of management interfaces and RPC communication, preventing administrators from managing the ADC appliance and potentially affecting VPN/AAA services availability.

🟠

Likely Case

Temporary denial of service affecting management interfaces, requiring manual intervention or system restart to restore functionality.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to management interfaces.

🌐 Internet-Facing: HIGH - The vulnerability affects internet-facing VPN/AAA virtual servers and can be exploited without authentication.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but exposure is reduced compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has relatively simple exploitation requirements, making it attractive for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.0-83.27, 12.1-63.22, or 11.1-65.23 depending on your version

Vendor Advisory: https://support.citrix.com/article/CTX330728

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Citrix support. 2. Backup current configuration. 3. Apply the firmware update following Citrix documentation. 4. Reboot the appliance. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to management interfaces to trusted networks only

Configure firewall rules to limit access to management IPs/ports

Access Control Lists

linux

Implement ACLs to restrict which IPs can access the vulnerable services

add ns acl restrict_mgmt ALLOW -srcIP <trusted_ips> -destIP <adc_ip> -destPort 80,443,3008,3009 -priority 100
apply ns acls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces from untrusted networks
  • Deploy Web Application Firewall (WAF) rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check current firmware version and compare against patched versions. Also verify if configured as VPN Gateway or AAA virtual server.

Check Version:

show version

Verify Fix Applied:

Verify firmware version is at or above 13.0-83.27, 12.1-63.22, or 11.1-65.23 depending on your version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual traffic patterns to management interfaces
  • Multiple connection attempts to vulnerable ports
  • Service disruption logs for management services

Network Indicators:

  • Unusual traffic spikes to ports 80, 443, 3008, 3009
  • Requests to management interfaces from unexpected sources

SIEM Query:

source="citrix_adc" AND (dest_port=80 OR dest_port=443 OR dest_port=3008 OR dest_port=3009) AND (event_type="connection_attempt" OR event_type="service_disruption")

🔗 References

📤 Share & Export