{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2023-050.pdf"
    },
    "title": "Citrix NetScaler Critical Vulnerability",
    "serial_number": "2023-050",
    "publish_date": "19-07-2023 08:39:48",
    "description": "On July 18, 2023, Citrix released a security bulletin regarding one critical vulnerability and two high severity vulnerabilities affecting Citrix NetScaler Application delivery controllers (ADCs) and Netscaler Gateway. <br>\nCitrix Netscaler ADC is a purpose-built networking appliance used to improve the performance, security, and resiliency of applications delivered over the web. Citrix NetScaler Gateway consolidates remote access infrastructure to provide single sign-on across all applications whether in a data center, in a cloud, or if the apps are delivered as SaaS apps. It allows people to access any app, from any device, through a single URL.<br>\n",
    "url_title": "2023-050",
    "content_markdown": "---\ntitle: 'Citrix NetScaler Critical Vulnerability'\nversion: '1.0'\nnumber: '2023-050'\noriginal_date: 'July 18, 2023'\ndate: 'July 19, 2023'\n---\n\n_History:_\n\n* _19/07/2023 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn July 18, 2023, Citrix released a security bulletin regarding one critical vulnerability and two high severity vulnerabilities affecting Citrix NetScaler Application delivery controllers (ADCs) and Netscaler Gateway [1]. \nCitrix Netscaler ADC is a purpose-built networking appliance used to improve the performance, security, and resiliency of applications delivered over the web [2]. Citrix NetScaler Gateway consolidates remote access infrastructure to provide single sign-on across all applications whether in a data center, in a cloud, or if the apps are delivered as SaaS apps. It allows people to access any app, from any device, through a single URL [3].\n\n# Technical Details\n\n`CVE-2023-3519` (CVSS score of 9.8): Unauthenticated remote code execution. **Exploits of CVE-2023-3519 on unmitigated appliances have been observed!** In order to exploit the vulnerability the appliance must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA\u202fvirtual\u202fserver [1].\n\n`CVE-2023-3466` (CVSS score of 8.3): Reflected Cross-Site Scripting (XSS). The vulnerability can be exploited if a victim access an attacker-controlled link in the browser while being on a network with connectivity to the appliance [1].\n\n`CVE-2023-3467` (CVSS score of 8.0): Privilege Escalation to root administrator (`nsroot`). Authenticated access to NSIP or SNIP with management interface access is required in order to leverage this flaw [1].\n\n# Affected Products\n\nThe following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities [1]: \n\n- NetScaler ADC and NetScaler Gateway\u202f13.1\u202fbefore\u202f13.1-49.13 \n- NetScaler ADC and NetScaler Gateway\u202f13.0\u202fbefore 13.0-91.13 \n- NetScaler ADC 13.1-FIPS before 13.1-37.159\n- NetScaler ADC 12.1-FIPS before 12.1-55.297\n- NetScaler ADC 12.1-NDcPP before 12.1-55.297\n\nNote: NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL) and is vulnerable [1].\n\n# Recommendations\n\nCERT-EU highly recommends installing the latest updated versions as soon as possible.\n\n# References\n\n[1] <https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467>\n\n[2] <https://www.netscaler.com/articles/what-is-an-application-delivery-controller>\n\n[3] <https://docs.citrix.com/en-us/citrix-gateway.html>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>19/07/2023 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On July 18, 2023, Citrix released a security bulletin regarding one critical vulnerability and two high severity vulnerabilities affecting Citrix NetScaler Application delivery controllers (ADCs) and Netscaler Gateway [1]. Citrix Netscaler ADC is a purpose-built networking appliance used to improve the performance, security, and resiliency of applications delivered over the web [2]. Citrix NetScaler Gateway consolidates remote access infrastructure to provide single sign-on across all applications whether in a data center, in a cloud, or if the apps are delivered as SaaS apps. It allows people to access any app, from any device, through a single URL [3].</p><h2 id=\"technical-details\">Technical Details</h2><p><code>CVE-2023-3519</code> (CVSS score of 9.8): Unauthenticated remote code execution. <strong>Exploits of CVE-2023-3519 on unmitigated appliances have been observed!</strong> In order to exploit the vulnerability the appliance must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA\u202fvirtual\u202fserver [1].</p><p><code>CVE-2023-3466</code> (CVSS score of 8.3): Reflected Cross-Site Scripting (XSS). The vulnerability can be exploited if a victim access an attacker-controlled link in the browser while being on a network with connectivity to the appliance [1].</p><p><code>CVE-2023-3467</code> (CVSS score of 8.0): Privilege Escalation to root administrator (<code>nsroot</code>). Authenticated access to NSIP or SNIP with management interface access is required in order to leverage this flaw [1].</p><h2 id=\"affected-products\">Affected Products</h2><p>The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities [1]: </p><ul><li>NetScaler ADC and NetScaler Gateway\u202f13.1\u202fbefore\u202f13.1-49.13 </li><li>NetScaler ADC and NetScaler Gateway\u202f13.0\u202fbefore 13.0-91.13 </li><li>NetScaler ADC 13.1-FIPS before 13.1-37.159</li><li>NetScaler ADC 12.1-FIPS before 12.1-55.297</li><li>NetScaler ADC 12.1-NDcPP before 12.1-55.297</li></ul><p>Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL) and is vulnerable [1].</p><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU highly recommends installing the latest updated versions as soon as possible.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467\">https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.netscaler.com/articles/what-is-an-application-delivery-controller\">https://www.netscaler.com/articles/what-is-an-application-delivery-controller</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://docs.citrix.com/en-us/citrix-gateway.html\">https://docs.citrix.com/en-us/citrix-gateway.html</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}