Helient Blog

Helient Systems : Security Alert: NetScaler ADC and NetScaler Gateway Security Breach

Written by Helient Webmaster | Jan 16, 2024 8:41:49 AM

 

NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-6548 and CVE-2023-6549

Two vulnerabilities have been discovered in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway).

Applicable Products

• NetScaler
• NetScaler Gateway

Affected Versions:

The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities:

• NetScaler ADC and NetScaler Gateway 14.1 before 14.1-12.35
• NetScaler ADC and NetScaler Gateway 13.1 before 13.1-51.15
• NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.21
• NetScaler ADC 13.1-FIPS before 13.1-37.176
• NetScaler ADC 12.1-FIPS before 12.1-55.302
• NetScaler ADC 12.1-NDcPP before 12.1-55.302

Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL) and is vulnerable.

Remember, timely updates are your first line of defense against potential cyber threats! Don’t Delay—Reach Out for Expert Assistance

 

 

What Customers should do?

Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible. for more information visit: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-6548 and CVE-2023-6549 (citrix.com)

• NetScaler ADC and NetScaler Gateway 14.1-12.35 and later releases
• NetScaler ADC and NetScaler Gateway  13.1-51.15 and later releases of 13.1
• NetScaler ADC and NetScaler Gateway 13.0-92.21 and later releases of 13.0
• NetScaler ADC 13.1-FIPS 13.1-37.176 and later releases of 13.1-FIPS
• NetScaler ADC 12.1-FIPS 12.1-55.302 and later releases of 12.1-FIPS
• NetScaler ADC 12.1-NDcPP 12.1-55.302 and later releases of 12.1-NDcPP

Summary: 

CVE ID Description Pre-requisites CWE CVSS
CVE-2023-6548 Authenticated (low privileged) remote code execution on Management Interface Access to NSIP, CLIP or SNIP with management interface access CWE-94 5.5
CVE-2023-6549 Denial of Service Appliance must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server CWE-119 8.2

 

Citrix StoreFront Security Bulletin for CVE-2023-5914

A vulnerability has been discovered in Citrix StoreFront, which, if exploited, may result in a Cross-site scripting (XSS) attack.

Affected Versions:

The following supported versions of Citrix StoreFront are affected by the vulnerability:

Current Release (CR)

  • Citrix StoreFront before 2308.1
  • Citrix StoreFront before 2311

Long Term Service Release (LTSR)

  • Citrix StoreFront 1912 LTSR before CU8 hotfix 3.22.8001.2
  • Citrix StoreFront 2203 LTSR before CU4 Update 1

Remember, timely updates are your first line of defense against potential cyber threats! Don’t Delay—Reach Out for Expert Assistance

 

 

Summary: 

CVE ID Description Pre-requisites CWE CVSS
CVE-2023-5914 Cross-site scripting (XSS) Requires victim to access an attacker-controlled link in the browser CWE-79 5.4

 

What Customers Should Do

Cloud Software Group strongly urges affected customers of Citrix StoreFront to install the relevant updated versions of Citrix StoreFront as soon as possible:

Current Release (CR)

  • Citrix StoreFront 2308.1 and later
  • Citrix StoreFront 2311and later

Long Term Service Release (LTSR)

  • Citrix StoreFront 1912 LTSR CU8 hotfix 3.22.8001.2* and later
  • Citrix StoreFront 2203 LTSR CU4 Update 1 and later

 

 

How We Can Help:

We recognize the challenges that can accompany implementing critical security updates. That’s why our team of industry-leading networking experts stands ready to offer guidance and support. For a smooth and effective upgrade process, contact us at service@helient.com.