Citrix has disclosed critical vulnerabilities affecting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). Read on to learn more about the vulnerabilities and what you can do to ensure your Citrix technologies are protected.
The Citrix NetScaler ADC and Gateway vulnerabilities are tracked as CVE-2023-3519, CVE-2023-3466 and CVE-2023-3467. CVE-2023-3519 is described as an unauthenticated remote code execution and is rated the most critical, with a CVSS scoring of 9.8.
The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities:
Note: NetScaler ADC and NetScaler Gateway version 12.1 are now end of life (EOL), which means it is no longer supported and vulnerable to attack.
Citrix has disclosed that exploitation has been observed in the wild.
Nuspire actively hunts client environments for indications of compromise and creates detection rules when available. Nuspire will continue to monitor the situation for further developments.
Given the critical nature and observed exploitation of these vulnerabilities, affected organizations should implement immediate updates to the following NetScaler ADC and NetScaler Gateway versions, ensuring they are upgraded to the latest releases, per Citrix’s recommendations: