8.1
CVE-2022-27511
- EPSS 19.29%
- Published 16.06.2022 19:15:07
- Last modified 21.11.2024 06:55:52
- Source secure@citrix.com
- Teams watchlist Login
- Open Login
Corruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted.
Data is provided by the National Vulnerability Database (NVD)
Citrix ≫ Application Delivery Management Version < 13.0-85.19
Citrix ≫ Application Delivery Management Version >= 13.1 < 13.1-21.53
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 19.29% | 0.951 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:C/A:N
|
CWE-284 Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.