Today, Citrix released a security bulletin highlighting two vulnerabilities in the NetScaler ADC and NetScaler Gateway platforms.
The first, CVE-2023-4966, carries a critical CVSS rating of 9.4, and is an “unauthenticated buffer-related vulnerability” that can lead to “sensitive information disclosure”. So far, Citrix has not disclosed what sensitive information can be disclosed from successful exploitation.
The second vulnerability, CVE-2023-4967, carries a high-severity CVSS rating of 8.2, and is a denial of service (DoS) vulnerability. It should be noted that the device must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or a AAA virtual server in order to be vulnerable.
The bulletin applies to customer-managed NetScaler ADC and NetScaler Gateway products:
Note: NetScaler ADC and NetScaler Gateway version 12.1 are now End-of-Life (EOL) and are vulnerable.
Customers must install the relevant updated version in order to be protected. No mitigations or workarounds are known at this time.
Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End-of-Life (EOL).
Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities.
As this is actively being investigated and new information is continuously coming out, this information is subject to change. Please reach out to our team for corrections and see if PacketWatch can help detect and respond to any potential incidents.