← Back to CVEs
CVE-2019-19781
CRITICALCISA KEV9.8
Description
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/27/2019
Last Modified11/7/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorCitrix
ProductApplication Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance
Vulnerability NameCitrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability
KEV Date Added2021-11-03
Remediation Due Date2022-05-03
Ransomware UseKnown
Affected Products
citrix:application_delivery_controllercitrix:application_delivery_controller_firmwarecitrix:gatewaycitrix:gateway_firmwarecitrix:netscaler_gatewaycitrix:netscaler_gateway_firmware
Weaknesses (CWE)
CWE-22CWE-22
References
http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html(cve@mitre.org)
http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html(cve@mitre.org)
http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html(cve@mitre.org)
http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html(cve@mitre.org)
https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/(cve@mitre.org)
https://forms.gle/eDf3DXZAv96oosfj6(cve@mitre.org)
https://support.citrix.com/article/CTX267027(cve@mitre.org)
https://twitter.com/bad_packets/status/1215431625766424576(cve@mitre.org)
https://www.kb.cert.org/vuls/id/619785(cve@mitre.org)
http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html(af854a3a-2127-422b-91ae-364da2661108)
https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/(af854a3a-2127-422b-91ae-364da2661108)
https://forms.gle/eDf3DXZAv96oosfj6(af854a3a-2127-422b-91ae-364da2661108)
https://support.citrix.com/article/CTX267027(af854a3a-2127-422b-91ae-364da2661108)
https://twitter.com/bad_packets/status/1215431625766424576(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/619785(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-19781(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.