Citrix ADC and Citrix Gateway Session Hijack (CTX319135)

medium Nessus Plugin ID 166616


The remote device is may be affected by a session hijack vulnerability.


The remote Citrix ADC or Citrix Gateway device is version 12.1 before 12.1-62.25 or 13.0 before 13.0-82.42. It is therefore affected by a session hijack vulnerability that, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session.

Please refer to advisory CTX319135 for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to version 11.1-65.22, 12.1-62.27, 13.0-82.45 or later.

See Also

Plugin Details

Severity: Medium

ID: 166616

File Name: citrix_adc_gateway_cve-2021-22920_CTX319135.nasl

Version: 1.3

Type: combined

Family: CGI abuses

Published: 10/27/2022

Updated: 4/7/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-22920


Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:citrix:netscaler_gateway, cpe:/h:citrix:netscaler_application_delivery_controller

Required KB Items: Settings/ParanoidReport, Host/NetScaler/Detected

Exploit Ease: No known exploits are available

Patch Publication Date: 7/21/2021

Vulnerability Publication Date: 7/21/2021

Reference Information

CVE: CVE-2021-22920