• Home
  • Podcast
  • Contact
Ervik.as
Cloud, Cyber Security, EUC, DaaS and HCI
  • Cloud
    • Azure
    • Citrix Cloud
    • Cloud Management
    • Nutanix Clusters
  • Cyber Security
    • Arctic Wolf
    • Cyber Security News
  • EUC
    • Citrix
      • Citrix Analytics
      • Citrix NetScaler
      • Citrix Provisioning
      • Receiver
      • ShareFile
      • Citrix Virtual Apps (XenApp)
      • Citrix Virtual Desktops (XenDesktop)
      • Workspace
      • Workspace app
    • DaaS
      • Azure Virtual Desktop
      • Frame
    • Microsoft
      • HoloLens
      • Microsoft App-V
      • Remote Desktop Services
      • Windows 7
      • Windows 8
      • Windows 10
      • Windows Server 2008
      • Windows Server 2008 R2
      • Windows Server 2012
      • Windows Server 2012 R2
      • Windows Server 2016
    • Thin Clients
      • Igel
      • Wyse
    • VMware
      • Fusion
      • Horizon View
      • Vmware ThinApp
      • Vmware Workstation
    • Parallels
      • Remote Application Server
  • End User Experience
    • ControlUp
    • eG Innovations
    • Goliath Technologies
    • Liquidware
  • Datacenter
    • Backup & Disaster Recovery
      • Altaro
      • HYCU
      • Unitrends
      • Rubrik
      • Veeam Software
    • Containers
      • Docker
      • Red Hat OpenShift
    • Hybrid Multi Cloud
      • Nutanix
        • Nutanix Database Service
        • Files
        • Flow
        • Nutanix AHV
        • Nutanix Cloud Platform
    • Server Virtualization
      • Nutanix AHV
      • Microsoft Hyper-V
      • VMware vSphere
      • Citrix Hypervisor (XenServer)
    • Network & Security
      • Nutanix Flow
      • Palo Alto Networks
  • About
    • Cookie Policy (EU)
    • News
      • Citrix Community News

Citrix/ NetScaler

DoS and RCE Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway multiple CVE´s

Alexander Ervik Johnsen Citrix, Citrix Bleed, CVE, NetScaler, NetScaler ADC, NetScaler Gateway 2024-02-01

CVE-2023-6548 & CVE-2023-6549: DoS and RCE Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway

On January 16, 2024, Citrix published a security bulletin disclosing two zero-day vulnerabilities (CVE-2023-6548 & CVE-2023-6549) being actively exploited in Citrix NetScaler ADC and NetScaler Gateway.

CVE-2023-6548CVSS 5.5 – MediumActively Exploited?
Code injection vulnerability on the Management Interface can result in authenticated Remote Code Execution (RCE) for low-privileged threat actors.·       Pre-requisite: Access to NSIP, CLIP or SNIP with management interface access is required by threat actors to exploit this vulnerabilityYes
CVE-2023-6549CVSS 8.2 – HighActively Exploited?
Buffer overflow vulnerability that can lead to a Denial of Service (DoS).·       Pre-requisite: To be susceptible to Denial of Service (DoS) attacks, the appliances must be set up either as a gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or as an AAA virtual server.Yes

Specifics of the exploitation observed by Citrix have not been revealed and Arctic Wolf has not identified any public Proof of Concept (PoC) exploits. However, we assess more threat actors are likely to target these vulnerabilities in the near-term due to the potential level of access they can obtain once compromising an appliance. Threat actors have also previously exploited several vulnerabilities targeting Citrix NetScaler ADC and NetScaler Gateway. Most notably in late 2023, nation-state and ransomware threat actors exploited the information disclosure vulnerability CVE-2023-4966 (Citrix Bleed) against several high profile organizations.

Although there is currently no evidence linking these vulnerabilities directly to Citrix Bleed, Arctic Wolf will continue to closely monitor the situation for any emerging threats or developments.

This bulletin only applies to customer-managed NetScaler ADC and NetScaler Gateway products. Customers using Citrix-managed cloud services or Citrix-managed Adaptive Authentication do not need to take any action.

Recommendation

Upgrade Citrix NetScaler ADC and NetScaler Gateway to Fixed Version

Arctic Wolf strongly recommends upgrading Citrix NetScaler ADC and NetScaler Gateway their respective fixed versions.

ProductAffected VersionsFixed Versions
Citrix NetScaler ADC·       14.1 before 14.1-12.35·        13.1 before 13.1-51.15·       13.0 before 13.0-92.21·       13.1-FIPS before 13.1-37.176·       12.1-FIPS before 12.1-55.302·       12.1-NDcPP before 12.1-55.302·       14.1-12.35 and later releases·        13.1-51.15 and later releases of 13.1·       13.0-92.21 and later releases of 13.0·       13.1-FIPS 13.1-37.176 and later releases of 13.1-FIPS·       12.1-FIPS 12.1-55.302 and later releases of 12.1-FIPS·       12.1-NDcPP 12.1-55.302 and later releases of 12.1-NDcPP
Citrix NetScaler Gateway·       14.1 before 14.1-12.35·        13.1 before 13.1-51.15·       13.0 before 13.0-92.21·       14.1-12.35 and later releases·        13.1-51.15 and later releases of 13.1·       13.0-92.21 and later releases of 13.0

Note: Citrix NetScaler ADC and NetScaler Gateway version 12.1 has reached its End of Life (EOL). We strongly advise customers to proceed with upgrading their appliances to a supported version that addresses the existing vulnerabilities.

Please follow your organization’s patching and testing guidelines to avoid operational impact.

References

  1. Citrix Article
  2. CISA Adds Vulnerabilities to KEV
  3. Arctic Wolf Blog (CVE-2023-4966)

Source

Related Posts

Citrix /

Citrix announces acquisition of Unicon

NetScaler /

Citrix NetScaler is back

Citrix /

Citrix acquires deviceTRUST and Strong Network

NetScaler /

Citrix and FireEye Mandiant Launch Indicator of Compromise Scanner

Citrix /

Citrix Announces General Availability of Citrix Daas for Amazon WorkSpaces Core

‹ Microsoft January 2024 Security update› Liquidware Continues to Define the DEX Landscape: A Year of Pioneering Achievements in 2023

Back to Top

Crafted in the land of the Vikings 🇳🇴 by Alexander Ervik Johnsen.
Copyright 2000-2025 - www.ervik.as - All Rights Reserved