Skip to content

Citrix Products | Log4j Vulnerability

Citrix has come out with a advisory with list of apps that are under investigation for Log4j vulnerability. As of now almost all the applications of Citrix are not impacted by Log4j Vulnerability. But still some of the apps under Citrix Virtual Apps and Desktop is under investigation for Log4j vulnerability. Citrix may update more about in the coming days. The below table provides you a list of all the apps in the Citrix advisory

ProductVersionStatusPatched
Citrix ADC (NetScaler ADC)All versionsNot VulnerableNot Needed
Citrix Gateway (NetScaler Gateway) All versionsNot VulnerableNot Needed
Citrix Application Delivery Management All versionsNot VulnerableNot Needed
Citrix Cloud Connector All versionsNot VulnerableNot Needed
Citrix Connector Appliance for Cloud Services All versionsNot VulnerableNot Needed
Citrix Endpoint ManagementAll versionsNot VulnerableNot Needed
Citrix HypervisorAll versionsNot VulnerableNot Needed
Citrix License Server All versionsNot VulnerableNot Needed
Citrix SD-WAN All versionsNot VulnerableNot Needed
Citrix ShareFile Storage Zones Controller All versionsNot VulnerableNot Needed
Citrix Virtual Apps & DesktopApp LayeringNot VulnerableNot Needed
Citrix Virtual Apps & DesktopDelivery ControllerNot VulnerableNot Needed
Citrix Virtual Apps & DesktopDirectorNot VulnerableNot Needed
Citrix Virtual Apps & DesktopFASNot VulnerableNot Needed
Citrix Virtual Apps & DesktopHDXNot VulnerableNot Needed
Citrix Virtual Apps & DesktopProfile ManagementNot VulnerableNot Needed
Citrix Virtual Apps & DesktopPVSNot VulnerableNot Needed
Citrix Virtual Apps & DesktopSession RecordingNot VulnerableNot Needed
Citrix Virtual Apps & DesktopStorefrontNot VulnerableNot Needed
Citrix Virtual Apps & DesktopStudioNot VulnerableNot Needed
Citrix Virtual Apps & DesktopWindows VDANot VulnerableNot Needed
Citrix Virtual Apps & DesktopWEMNot VulnerableNot Needed
Citrix Virtual Apps & DesktopAll Other componentsInvestigationNot Needed
Citrix Workspace App All versionsNot VulnerableNot Needed
Source: https://support.citrix.com/article/CTX335705