Multiple vulnerabilities have been reported in Citrix products which could be exploited by an attacker to gain elevated privileges, execute arbitrary code or can cause denial of service condition on the targeted system.
Target Audience:
All organizations, IT security teams, and IT administrators managing Citrix products
Risk Assessment:
Unauthorized access to restricted data, remote code execution or denial of service.
Impact Assessment:
Potential for data modification and manipulation, malware propagation or service disruption.
The information provided herein is on "as is" basis, without warranty of any kind.