CVE-2022-27516
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-27516 is a user login brute force protection functionality bypass vulnerability affecting Citrix ADC and Citrix Gateway products. The vulnerability was disclosed on November 8th, 2022, and affects multiple versions of these products including versions 13.1 before 13.1-33.47, 13.0 before 13.0-88.12, and 12.1 before 12.1-65.21. This vulnerability can only be exploited if the appliance is configured as a VPN (Gateway) or AAA virtual server, and the user lockout functionality 'Max Login Attempts' must be configured (Arctic Wolf).

Technical details

The vulnerability is classified as a Protection Mechanism Failure (CWE-693) and Improper Restriction of Excessive Authentication Attempts (CWE-307). According to the National Vulnerability Database, it received a CVSS v3.1 base score of 9.8 (CRITICAL) from NIST with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, while Citrix Systems assessed it with a CVSS score of 5.3 (MEDIUM) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N (NVD).

Impact

The vulnerability allows attackers to bypass the user login brute force protection mechanism, potentially leading to unauthorized access to affected systems. This specifically impacts systems where the appliance is configured as a VPN (Gateway) or AAA virtual server with the user lockout functionality configured (Arctic Wolf).

Mitigation and workarounds

Citrix has released patched versions to address this vulnerability. Organizations are recommended to upgrade to Citrix ADC and Citrix Gateway versions 13.1-33.47 and later releases, 13.0-88.12 and later releases of 13.0, or 12.1-65.21 and later releases of 12.1. For FIPS and NDcPP versions, upgrade to 12.1-55.289 or later releases. Systems running versions prior to 12.1 are End of Life (EOL) and should be upgraded to supported versions (Arctic Wolf).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-12819HIGH8.1
  • NixOSNixOS
  • pgbouncer
NoYesDec 03, 2025
CVE-2025-20777MEDIUM6.7
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-65105MEDIUM5.3
  • NixOSNixOS
  • apptainer
NoYesDec 02, 2025
CVE-2025-20789MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-20788MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management