--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Vulnerabilities in Netscaler ADS and Netscaler Gateway' number: '2024-010' version: '1.0' original_date: 'January 16, 2024' date: 'January 17, 2024' --- _History:_ * _17/01/2024 --- v1.0 -- Initial publication_ # Summary On January 16, 2024, Citrix released a security advisory addressing two vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway, specifically `CVE-2023-6548` and `CVE-2023-6549`. These vulnerabilities have been actively exploited and require urgent patching [1, 2]. # Technical Details The vulnerability `CVE-2023-6548`, with a CVSS score of 5.5, is a Remote Code Execution (RCE) vulnerability in the NetScaler ADC and Gateway appliances. It can be exploited by an authenticated attacker with low-level privileges who can access the NetScaler IP (NSIP), Subnet IP (SNIP), or cluster management IP (CLIP) with access to the appliance’s management interface. The vulnerability `CVE-2023-6549`, with a CVSS score of 8.2, is a Denial of Service (DoS) vulnerability in the same appliances. It can be exploited when a vulnerable appliance has been configured as a Gateway (i.e., VPN, ICA Proxy, CVPN, RDP Proxy) or as an AAA virtual server. # Affected Products The vulnerabilities affect: - NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.21; - NetScaler ADC and NetScaler Gateway 13.1 before 13.1-51.15; - NetScaler ADC and NetScaler Gateway 14.1 before 14.1-12.35; - NetScaler ADC 12.1-NDcPP before 12.1-55.302; - NetScaler ADC 12.1-FIPS before 12.1-55.302; - NetScaler ADC 13.1-FIPS before 13.1-37.176. # Recommendations CERT-EU strongly recommends installing the releases patches for these vulnerabilities. Moreover, the vulnerability `CVE-2023-6548` only impacts the management interface, and, as recommended in the secure deployment guide of Citrix, this interface should not be exposed to the internet. # References [1] [2]