Citrix Releases Security Updates for Actively Exploited Vulnerabilities in NetScaler ADC and NetScaler Gateway
Two actively exploited vulnerabilities in NetScaler ADC and NetScaler Gateway could lead to remote code execution or denial-of-service
Summary
Two actively exploited vulnerabilities in NetScaler ADC and NetScaler Gateway could lead to remote code execution or denial-of-service
Affected platforms
The following platforms are known to be affected:
Threat details
Reassessment of CVE-2023-6548 - 17 July 2024
Citrix originally published a security advisory for CVE-2023-6548 and CVE-2023-6549 in January 2024, and Cyber Alert CC-4439 was published with medium severity. The remediation is now out of date and affected organisations should follow the remediation in the new high severity Cyber Alert CC-4525.
The NHS England National Cyber Security Operations Centre (CSOC) is aware of intelligence provided by CrowdStrike that contrary to Citrix’s initial disclosure, the vulnerability known as CVE-2023-6548 does not require user privileges for exploitation. NHS England National CSOC now assesses CVE-2023-6548 as a critical vulnerability that can allow a remote, unauthenticated attacker to execute remote code on a vulnerable NetScaler Gateway or NetScaler ADC device.
CC-4525 was published at high severity reflecting the increased risk presented by the vulnerability and new remediation is given, which affected organisations must follow.
Introduction
Citrix have released a security bulletin addressing two vulnerabilities affecting NetScaler ADC and NetScaler Gateway.
CVE-2023-6548 has a CVSSv3 score of 5.5 and could allow an attacker to achieve authenticated (low privileged) remote code execution on the management interface. CVE-2023-6549 has a CVSSv3 score of 8.2 and could allow an attacker to achieve denial-of-service (DoS).
Additional vulnerability reported with proof-of-concept exploit code
A cyber security firm has released proof-of-concept exploit code for an out-of-bounds read vulnerability affecting Citrix Netscaler ADC and Gateway, version 13.1-50.23. An unauthenticated attacker could recover potentially sensitive data from memory.
No CVE identifier has been named and Citrix have not released an advisory for the vulnerability. The security firm reports that Citrix confirmed that the latest version 13.1-51.15 was unaffected.
Affected organisations with vulnerable versions are strongly encouraged to apply security updates as soon as practicable.
Exploitation of CVE-2023-6548 and CVE-2023-6549
Citrix have reported that CVE-2023-6548 and CVE-2023-6549 are actively being exploited in the wild
Threat updates
Date | Update |
---|---|
18 Jul 2024 |
New high severity Cyber Alert issued for CVE-2023-6548
New information box created with information about CC-4525 |
7 May 2024 |
Additional vulnerability reported with proof-of-concept released
This cyber alert has been updated with this information. |
Remediation advice
Affected organisations are encouraged to review Citrix Security Bulletin CTX584986 and apply the relevant updates.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 18 July 2024 11:38 am