Citrix Endpoint Management (XenMobile Server) |
|
Vendor Data
Vendor Patch Exists
Vendor Investigating
Community Data
Vulnerable
Vendor Resources
Resource | Link |
---|---|
Citrix Statement | https://support.citrix.com/article/CTX335705 |
Community Resources
Resource | Link |
---|---|
source | https://support.citrix.com/article/CTX335705 |
Community Notes
Source | Note |
---|---|
NCSC-NL | CVE-2021-4104: Not vuln ; CVE-2021-44228: Fix ; CVE-2021-45046: Fix ; CVE-2021-45105: Investigation |
CISAGov | For CVE-2021-44228 and CVE-2021-45046: Impacted–Customers are advised to apply the latest CEM rolling patch updates listed below as soon as possible to reduce the risk of exploitation. XenMobile Server 10.14 RP2; XenMobile Server 10.13 RP5; and XenMobile Server 10.12 RP10. Note: Customers who have upgraded their XenMobile Server to the updated versions are recommended not to apply the responder policy mentioned in the blog listed below to the Citrix ADC vserver in front of the XenMobile Server as it may impact the enrollment of Android devices. For CVE-2021-45105: Investigation in progress. |
CISAGov | Last Update: 12/21/2021 |
Sources
Date | Attribution | Description |
---|---|---|
2021-12-27 15:29:04 | NCSC-NL | Updated vendorInvestigating. Updated vendorPatchExists. Updated community note. Updated community link source. |
2021-12-30 21:31:50 | CISAGov | Updated communityVulnerable. Updated vendorPatchExists. Updated vendor link Citrix Statement. Updated community note. Updated community note. |