Skip to content

Commit 4189d62

Browse files
authored
20231123001-StopRansomware-Lockbit-CitrixBleed (#417)
1 parent 8f82db1 commit 4189d62

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
# LockBit 3.0 affiliates exploiting Citrix Bleed added to CISA #StopRansomware Catalog - 20231123001
2+
3+
## Overview
4+
5+
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), and Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC) released a joint Advisory to disseminate IOCs, TTPs, and detection methods associated with LockBit 3.0 ransomware exploiting Citrix Bleed (CVE-2023-4966), affecting Citrix NetScaler web application delivery control (ADC) and NetScaler Gateway appliances.
6+
7+
## What is the vulnerability?
8+
9+
[**CVE-2023-4966**](https://nvd.nist.gov/vuln/detail/CVE-2023-4966) - CVSS v3 Base Score: ***9.4***
10+
11+
## What is vulnerable?
12+
13+
The vulnerability exists in the following products:
14+
15+
- NetScaler ADC and NetScaler Gateway 14.1 before 14.1-8.50
16+
- NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.15
17+
- NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.19
18+
- NetScaler ADC 13.1-FIPS before 13.1-37.164
19+
- NetScaler ADC 12.1-FIPS before 12.1-55.300
20+
- NetScaler ADC 12.1-NDcPP before 12.1-55.300
21+
22+
## What has been observed?
23+
24+
CISA added this vulnerabilty in their [#StopRansomware](https://www.cisa.gov/news-events/alerts/2023/11/21/cisa-fbi-ms-isac-and-asds-acsc-release-advisory-lockbit-affiliates-exploiting-citrix-bleed) catalog on *November 21, 2023*. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
25+
26+
## Recommendation
27+
28+
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 Hours...* (refer [Patch Management](../guidelines/patch-management.md)):
29+
30+
- [**Citrix Knowledge Center**](https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967)
31+
32+
### Additional Resources
33+
34+
**WASOC Advisories:**
35+
- [**Citrix Bleed ACT NOW - Ensure Citrix ADC & Netscaler have mitigations applied OR are taken offline - 20231115001**](https://soc.cyber.wa.gov.au/advisories/20231115001-Citrix-Bleed)
36+
- [**Mass exploitation of CitrixBleed vulnerability - 20231102002**](https://soc.cyber.wa.gov.au/advisories/20231102002-Mass-exploitation-of-CitrixBleed-vulnerability/)
37+
- [**Citrix Releases Security Updates for Multiple Products - 20231012003**](https://soc.cyber.wa.gov.au/advisories/20231012003-Citrix-Releases-Security-Updates-for-Multiple-Products/)

0 commit comments

Comments
 (0)