Critical Citrix NetScaler Vulnerability Allows Attackers to Access Sensitive Information
Citrix has disclosed two distinguished vulnerabilities affecting its NetScaler Console (previously NetScaler ADM), NetScaler SVM, and NetScaler Agent, which could potentially enable attackers to rep entry to sensitive knowledge and cause denial of provider (DoS) assaults.
The vulnerabilities, identified as CVE-2024-6235 and CVE-2024-6236, have triggered urgent requires updates from Citrix to mitigate the risks.
Vulnerability Critical aspects
- CVE-2024-6235: This vulnerability involves depraved authentication (CWE-287) and can lead to sensitive knowledge disclosure. It has a CVSS v4.0 Negative Procure of 9.4, indicating distinguished severity. Exploitation requires rep entry to to the NetScaler Console IP.
- CVE-2024-6236: This vulnerability is due to the depraved restriction of operations throughout the limits of a memory buffer (CWE-119), leading to a doable DoS attack. It has a CVSS v4.0 Negative Procure of seven.1, indicating excessive severity. Exploitation requires rep entry to to the NetScaler Console IP, NetScaler Agent IP, or SVM IP.
Affected Variations
The vulnerabilities affect lots of versions of NetScaler merchandise:
- CVE-2024-6235 affects NetScaler Console versions:
- 14.1 outdated to 14.1-25.Fifty three
- CVE-2024-6236 affects:
- NetScaler Console versions 14.1 outdated to 14.1-25.Fifty three, 13.1 outdated to 13.1-Fifty three.22, and 13.0 outdated to 13.0-92.31
- NetScaler SVM versions 14.1 outdated to 14.1-25.Fifty three, 13.1 outdated to 13.1-Fifty three.17, and 13.0 outdated to 13.0-92.31
- NetScaler Agent versions 14.1 outdated to 14.1-25.Fifty three, 13.1 outdated to 13.1-Fifty three.22, and 13.0 outdated to 13.0-92.31
Truly helpful Actions
Citrix strongly advises potentialities to update their NetScaler merchandise to the most up-to-date versions to tackle these vulnerabilities:
- NetScaler Console:
- Update to 14.1-25.Fifty three or later
- Update to 13.1-Fifty three.22 or later
- Update to 13.0-92.31 or later
- NetScaler SVM:
- Update to 14.1-25.Fifty three or later
- Update to 13.1-Fifty three.17 or later
- Update to 13.0-92.31 or later
- NetScaler Agent:
- Update to 14.1-25.Fifty three or later
- Update to 13.1-Fifty three.22 or later
- Update to 13.0-92.31 or later
Citrix’s Response
Citrix stumbled on these vulnerabilities through internal compare and is ignorant of any wild exploits. Nonetheless, the company emphasizes the importance of counseled movement, significantly for potentialities with NetScaler Console exposed to the public web.
Citrix has notified its potentialities and channel partners through a safety bulletin published on the Citrix Recordsdata Center. The corporate emphasizes the importance of promptly applying updates to give protection to in opposition to doable exploits.
For technical support, potentialities are encouraged to contact Citrix Technical Fortify. Citrix also recommends subscribing to procure indicators for future safety bulletins and defend urged about doable vulnerabilities and updates.
The invention of those vulnerabilities underscores the distinguished need for neatly timed updates and vigilant safety practices. By addressing these vulnerabilities promptly, organizations can safeguard their networks and sensitive knowledge from doable cyber threats.
Source credit : cybersecuritynews.com