support.citrix.com Open in urlscan Pro
35.158.127.51  Public Scan

Submitted URL: https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve2...
Effective URL: https://support.citrix.com/s/article/CTX579459-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cv...
Submission: On December 01 via api from RU — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="fileUploadForm" enctype="multipart/form-data" method="post" target="fileUploadIframe"><input type="file" id="fileSelector" name="file" style="display: none;"><input name="filename" type="hidden"></form>

Text Content

Loading
×Sorry to interrupt
This page has an error. You might just need to refresh it. [Cannot read
properties of undefined (reading 'send')] Failing descriptor:
{markup://c:cspDownloadArticleFiles}

Refresh
Skip to Main Content

Citrix Customer Service
 * Home
 * Support
   
 * Downloads
   
 * Documentation
   
 * Community
 * More
   


Log in


NETSCALER ADC AND NETSCALER GATEWAY SECURITY BULLETIN FOR CVE-2023-4966 AND
CVE-2023-4967

 * 15.07.2024
 * KNOWLEDGE


INFORMATION

TitleNetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-4966 and
CVE-2023-4967
URL
NameCTX579459-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967
CTX NumberCTX579459
Article TypeSecurity Bulletin
Created Date10/Oct/2023
Last Modified Date15/Jul/2024
SeverityCritical
StatusFinal
Details

Multiple vulnerabilities have been discovered in NetScaler ADC (formerly Citrix
ADC) and NetScaler Gateway (formerly Citrix Gateway).

Affected Versions: 

The following supported versions of NetScaler ADC and NetScaler Gateway are
affected by the vulnerabilities: 

 * NetScaler ADC and NetScaler Gateway 14.1 before 14.1-8.50
 * NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.15
 * NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.19
 * NetScaler ADC 13.1-FIPS before 13.1-37.164
 * NetScaler ADC 12.1-FIPS before 12.1-55.300
 * NetScaler ADC 12.1-NDcPP before 12.1-55.300

Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End-of-Life (EOL)
and is vulnerable.

This bulletin only applies to customer-managed NetScaler ADC and NetScaler
Gateway products. Customers using Citrix-managed cloud services or
Citrix-managed Adaptive Authentication do not need to take any action.


Summary: 

NetScaler ADC and NetScaler Gateway contain unauthenticated buffer-related
vulnerabilities mentioned below 

CVE IDDescriptionPre-requisitesCWECVE-2023-4966Sensitive information
disclosureApplication must be configured as Gateway (VPN virtual server, ICA
Proxy, CVPN, RDP Proxy) OR AAA virtual serverCWE-119CVE-2023-4967Denial of
serviceAppliance must be configured as a Gateway (VPN virtual server, ICA Proxy,
CVPN, RDP Proxy) OR AAA virtual serverCWE-119

Mitigating Factors
None.
Acknowledgements
Instructions

Exploits of CVE-2023-4966 on unmitigated appliances have been observed. Cloud
Software Group strongly urges customers of NetScaler ADC and NetScaler Gateway
to install the relevant updated versions of NetScaler ADC and NetScaler Gateway
as soon as possible: 

 * NetScaler ADC and NetScaler Gateway 14.1-8.50  and later releases
 * NetScaler ADC and NetScaler Gateway  13.1-49.15  and later releases of 13.1
 * NetScaler ADC and NetScaler Gateway 13.0-92.19 and later releases of 13.0  
 * NetScaler ADC 13.1-FIPS 13.1-37.164 and later releases of 13.1-FIPS  
 * NetScaler ADC 12.1-FIPS 12.1-55.300 and later releases of 12.1-FIPS  
 * NetScaler ADC 12.1-NDcPP 12.1-55.300 and later releases of 12.1-NDcPP 

Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End-of-Life (EOL).
Customers are recommended to upgrade their appliances to one of the supported
versions that address the vulnerabilities.

Cloud Software Group has published a related blog
at https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/
which contains further context.

Cloud Software Group has published an additional blog
at https://www.netscaler.com/blog/news/netscaler-investigation-recommendations-for-cve-2023-4966/
 which contains recommendations for investigation of this vulnerability.
Citrix Support


WHAT CITRIX IS DOING

Citrix is notifying customers and channel partners about this potential security
issue through the publication of this security bulletin on the Citrix Knowledge
Center at https://support.citrix.com/securitybulletins.

--------------------------------------------------------------------------------


OBTAINING SUPPORT ON THIS ISSUE

If you require technical assistance with this issue, please contact Citrix
Technical Support. Contact details for Citrix Technical Support are available
at https://www.citrix.com/support/open-a-support-case.

--------------------------------------------------------------------------------


SUBSCRIBE TO RECEIVE ALERTS

Citrix strongly recommends that all customers subscribe to receive alerts when a
Citrix security bulletin is created or modified
at https://support.citrix.com/user/alerts.

--------------------------------------------------------------------------------


REPORTING SECURITY VULNERABILITIES TO CITRIX

Citrix welcomes input regarding the security of its products and considers any
and all potential vulnerabilities seriously. For details on our vulnerability
response process and guidance on how to report security-related issues to
Citrix, please see the following
webpage: https://www.citrix.com/about/trust-center/vulnerability-process.html.

--------------------------------------------------------------------------------


DISCLAIMER

This document is provided on an "as is" basis and does not imply any kind of
guarantee or warranty, including the warranties of merchantability or fitness
for a particular use. Your use of the information on the document is at your own
risk. Citrix reserves the right to change or update this document at any time.
Customers are therefore recommended to always view the latest version of this
document directly from the Citrix Knowledge Center.
Additional Resources

2023-10-10 T 16:00:00ZInitial Publication2023-10-17 T 16:00:00ZInclusion of
information related to the exploitation of CVE-2023-49662023-10-23 T
16:00:00ZInclusion of a link to the Cloud Software Group blog post about
CVE-2023-49662023-11-20 T 17:00:00ZInclusion of a link to an additional Cloud
Software Group blog post about CVE-2023-49662023-11-27 T 17:00:00ZCorrection to
article workflow to enable customer email alerts2024-07-15 T 15:30:00ZPlatform
migration

NetScalerNetscaler Gateway

Was this article helpful?
5 stars4 stars3 stars2 stars1 star
close
Site feedbackSite feedback
 * FOLLOW CITRIX
 * 
 * 
 * 

--------------------------------------------------------------------------------

 * Legal|
 * Do Not Sell My Personal Information|
 * Cookie Preferences


© 2024 CLOUD SOFTWARE GROUP, INC. ALL RIGHTS RESERVED.

Live chat:Start Chat


Loading