8.1
CVE-2021-22927
- EPSS 0.3%
- Published 05.08.2021 21:15:11
- Last modified 21.11.2024 05:50:56
- Source support@hackerone.com
- Teams watchlist Login
- Open Login
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session.
Data is provided by the National Vulnerability Database (NVD)
Citrix ≫ Application Delivery Controller Firmware Version >= 11.1 < 11.1-65.22
Citrix ≫ Application Delivery Controller Firmware Version >= 12.1 < 12.1-62.27
Citrix ≫ Application Delivery Controller Firmware Version >= 13.0 < 13.0-82.45
Citrix ≫ Application Delivery Controller Firmware Version >= 12.1 < 12.1-55.238
Citrix ≫ Mpx/sdx 14030 Fips Version-
Citrix ≫ Mpx/sdx 14060 Fips Version-
Citrix ≫ Mpx/sdx 14080 Fips Version-
Citrix ≫ Mpx 15030-50g Fips Version-
Citrix ≫ Mpx 15040-50g Fips Version-
Citrix ≫ Mpx 15060-50g Fips Version-
Citrix ≫ Mpx 15080-50g Fips Version-
Citrix ≫ Mpx 15100-50g Fips Version-
Citrix ≫ Mpx 15120-50g Fips Version-
Citrix ≫ Mpx 8905 Fips Version-
Citrix ≫ Mpx 8910 Fips Version-
Citrix ≫ Mpx 8920 Fips Version-
Citrix ≫ Mpx/sdx 14060 Fips Version-
Citrix ≫ Mpx/sdx 14080 Fips Version-
Citrix ≫ Mpx 15030-50g Fips Version-
Citrix ≫ Mpx 15040-50g Fips Version-
Citrix ≫ Mpx 15060-50g Fips Version-
Citrix ≫ Mpx 15080-50g Fips Version-
Citrix ≫ Mpx 15100-50g Fips Version-
Citrix ≫ Mpx 15120-50g Fips Version-
Citrix ≫ Mpx 8905 Fips Version-
Citrix ≫ Mpx 8910 Fips Version-
Citrix ≫ Mpx 8920 Fips Version-
Citrix ≫ NetScaler Gateway Version >= 11.1 < 11.1-65.22
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.3% | 0.502 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
|
nvd@nist.gov | 5.8 | 8.6 | 4.9 |
AV:N/AC:M/Au:N/C:P/I:P/A:N
|
CWE-384 Session Fixation
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.