Citrix ADC

Signature update for May 2022

New signatures rules are generated for the vulnerabilities identified in the week 2022-05-08. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 84 applicable for NetScaler VPX 11.1, NetScaler 12.0, Citrix ADC 12.1, Citrix ADC 13.0, Citrix ADC 13.1 platforms.

Note

Enabling Post body and Response body signature rules might affect Citrix ADC CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998988 CVE-2022-26986 WEB-MISC ImpressCMS Prior to 1.4.3 - SQL Injection Vulnerability via mimetypeid (CVE-2022-26986)
998989 CVE-2022-24112 WEB-MISC Apache APISIX batch-requests Plugin - IP Restriction Bypass Vulnerability (CVE-2022-24112)
998990 CVE-2021-37558 WEB-MISC Centreon Prior to 20.04.14, 20.10.8 and 21.04.2 - SQL Injection Vulnerability Via service_description (CVE-2021-37558)
998991 CVE-2021-37558 WEB-MISC Centreon Prior to 20.04.14, 20.10.8 and 21.04.2 - SQL Injection Vulnerability Via host_name (CVE-2021-37558)
998992 CVE-2021-22056 WEB-MISC VMware Workspace ONE Access and Identity Manager - Server Side Request Forgery vulnerability (CVE-2021-22056)
Signature update for May 2022