
Click the blue text to follow us
On January 18, 2024, the Baowangda Xingluo Cybersecurity Laboratory detected
the denial of service vulnerability CVE-2023-6549 in NetScaler ADC & NetScaler Gateway.
Vulnerability Overview
NetScaler ADC and NetScaler Gateway are products of Citrix Systems, Inc. NetScaler Gateway is a secure remote access solution that provides application-level and data-level control features, allowing users to remotely access applications and data from anywhere; NetScaler ADC is a comprehensive application delivery and load balancing solution that ensures application security, overall visibility, and availability.
The denial of service vulnerability CVE-2023-6549 in NetScaler ADC & NetScaler Gateway is due to incorrect limits on the number of requests processed by the server. An attacker can exploit this vulnerability to construct malicious data and execute a denial of service attack, ultimately causing the server to crash.
Risk Warning
This vulnerability has been found to be exploited. When NetScaler ADC and NetScaler Gateway devices are configured as gateways (VPN virtual servers, ICA proxies, CVPN, RDP proxies) or AAA virtual servers, they are susceptible to DoS attacks. Successful exploitation of this vulnerability may lead to denial of service.
Vulnerability Level
High Risk
Scope of Impact
The currently affected versions of NetScaler ADC & NetScaler Gateway are:
NetScaler ADC & NetScaler Gateway 14.1 < 14.1-12.35
NetScaler ADC & NetScaler Gateway 13.1 < 13.1-51.15
NetScaler ADC & NetScaler Gateway 13.0 < 13.0-92.21
NetScaler ADC 13.1-FIPS < 13.1-37.176
NetScaler ADC 12.1-FIPS < 12.1-55.302
NetScaler ADC 12.1-NDcPP < 12.1-55.302
Remediation Recommendations
The official latest version has been released, and it is recommended that affected users promptly update to the latest version. The link is as follows:
https://support.citrix.com/
Safe Versions
NetScaler ADC and NetScaler Gateway 14.1 >= 14.1-12.35
NetScaler ADC and NetScaler Gateway 13.1 >= 13.1-51.15
NetScaler ADC and NetScaler Gateway 13.0 >= 13.0-92.21
NetScaler ADC 13.1-FIPS >= 13.1-37.176
NetScaler ADC 12.1-FIPS >= 12.1-55.302
NetScaler ADC 12.1-NDcPP >= 12.1-55.302
Download Link:
https://www.citrix.com/downloads/
Temporary Measures
CVE-2023-6548 only affects the management interface and can be mitigated by not exposing the management interface to the internet or by allowing access only from trusted networks. For more details, please refer to the NetScaler Security Deployment Guide: https://docs.citrix.com/en-us/citrix-adc/citrix-adc-secure-deployment/secure-deployment-guide.html
Disclaimer
This security announcement is intended to describe potential security issues. Jiangsu Baowangda Xingluo Cybersecurity Laboratory does not provide any guarantees or commitments regarding this security announcement. Any direct or indirect consequences and losses resulting from the dissemination or exploitation of the information provided in this security announcement are the sole responsibility of the user. Jiangsu Baowangda Xingluo Cybersecurity Laboratory and the authors of this security announcement bear no responsibility for this.


Focus on Data Ensure the Future

Scan the code | Follow us
WeChat ID | Baowangda
Website | http://www.bwda.net
Baowangda/Profile
The company is committed to “creating a safer digital future” and focuses on deepening the entire range of data security products based on independent innovative technology, providing secure, compliant, full lifecycle, and all-business scenario data security solutions and services for government, operators, finance, energy, and various types of enterprise users, thus providing a solid network security foundation and digital security guarantee for the national digital power and manufacturing power strategy as well as enterprise digital transformation.
