NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-6548 and CVE-2023-6549
Two vulnerabilities have been discovered in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway).
Applicable Products
• NetScaler
• NetScaler Gateway
Affected Versions:
The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities:
• NetScaler ADC and NetScaler Gateway 14.1 before 14.1-12.35
• NetScaler ADC and NetScaler Gateway 13.1 before 13.1-51.15
• NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.21
• NetScaler ADC 13.1-FIPS before 13.1-37.176
• NetScaler ADC 12.1-FIPS before 12.1-55.302
• NetScaler ADC 12.1-NDcPP before 12.1-55.302
Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL) and is vulnerable.
Remember, timely updates are your first line of defense against potential cyber threats! Don’t Delay—Reach Out for Expert Assistance
What Customers should do?
Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible. for more information visit: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-6548 and CVE-2023-6549 (citrix.com)
• NetScaler ADC and NetScaler Gateway 14.1-12.35 and later releases
• NetScaler ADC and NetScaler Gateway 13.1-51.15 and later releases of 13.1
• NetScaler ADC and NetScaler Gateway 13.0-92.21 and later releases of 13.0
• NetScaler ADC 13.1-FIPS 13.1-37.176 and later releases of 13.1-FIPS
• NetScaler ADC 12.1-FIPS 12.1-55.302 and later releases of 12.1-FIPS
• NetScaler ADC 12.1-NDcPP 12.1-55.302 and later releases of 12.1-NDcPP
Summary:
CVE ID |
Description |
Pre-requisites |
CWE |
CVSS |
CVE-2023-6548 |
Authenticated (low privileged) remote code execution on Management Interface |
Access to NSIP, CLIP or SNIP with management interface access |
CWE-94 |
5.5 |
CVE-2023-6549 |
Denial of Service |
Appliance must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server |
CWE-119 |
8.2 |
Citrix StoreFront Security Bulletin for CVE-2023-5914
A vulnerability has been discovered in Citrix StoreFront, which, if exploited, may result in a Cross-site scripting (XSS) attack.
Affected Versions:
The following supported versions of Citrix StoreFront are affected by the vulnerability:
Current Release (CR)
- Citrix StoreFront before 2308.1
- Citrix StoreFront before 2311
Long Term Service Release (LTSR)
- Citrix StoreFront 1912 LTSR before CU8 hotfix 3.22.8001.2
- Citrix StoreFront 2203 LTSR before CU4 Update 1
Remember, timely updates are your first line of defense against potential cyber threats! Don’t Delay—Reach Out for Expert Assistance
Summary:
CVE ID |
Description |
Pre-requisites |
CWE |
CVSS |
CVE-2023-5914 |
Cross-site scripting (XSS) |
Requires victim to access an attacker-controlled link in the browser |
CWE-79 |
5.4 |
What Customers Should Do
Cloud Software Group strongly urges affected customers of Citrix StoreFront to install the relevant updated versions of Citrix StoreFront as soon as possible:
Current Release (CR)
- Citrix StoreFront 2308.1 and later
- Citrix StoreFront 2311and later
Long Term Service Release (LTSR)
- Citrix StoreFront 1912 LTSR CU8 hotfix 3.22.8001.2* and later
- Citrix StoreFront 2203 LTSR CU4 Update 1 and later
How We Can Help:
We recognize the challenges that can accompany implementing critical security updates. That’s why our team of industry-leading networking experts stands ready to offer guidance and support. For a smooth and effective upgrade process, contact us at service@helient.com.