-
Notifications
You must be signed in to change notification settings - Fork 35
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* 20240117004 * 20240117006 --------- Co-authored-by: Joshua Hitchen (DGov) <[email protected]>
- Loading branch information
1 parent
a0f5ae9
commit f39bd3f
Showing
1 changed file
with
35 additions
and
0 deletions.
There are no files selected for viewing
35 changes: 35 additions & 0 deletions
35
docs/advisories/20240117006-Citrix-Critical-Security-Advisory.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
# Citrix Critical Security Advisory - 20240117006 | ||
|
||
## Overview | ||
|
||
Citrix have released a security advisory for CVE-2023-6548 affecting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). | ||
|
||
## What is the vulnerability? | ||
|
||
| CVE ID | CVSS Score | Description | | ||
| --- | --- | --- | | ||
| [CVE-2023-6548](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6548) | 5.5 | Authenticated (low privileged) remote code execution on Management Interface | | ||
| [CVE-2023-6549](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6549) | 8.2 | Denial of Service | | ||
|
||
|
||
## What is vulnerable? | ||
|
||
The following products and versions are affected: | ||
|
||
- NetScaler ADC and NetScaler Gateway 14.1 before 14.1-12.35 | ||
- NetScaler ADC and NetScaler Gateway 13.1 before 13.1-51.15 | ||
- NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.21 | ||
- NetScaler ADC 13.1-FIPS before 13.1-37.176 | ||
- NetScaler ADC 12.1-FIPS before 12.1-55.302 | ||
- NetScaler ADC 12.1-NDcPP before 12.1-55.302 | ||
|
||
|
||
## What has been observed? | ||
Citrix has observed exploits of these CVEs on unmitigated appliances. | ||
|
||
|
||
## Recommendation | ||
|
||
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 Hours...* (refer [Patch Management](../guidelines/patch-management.md)): | ||
|
||
- <https://www.bleepingcomputer.com/news/security/citrix-warns-of-new-netscaler-zero-days-exploited-in-attacks/> |