{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2024-069.pdf"
    },
    "title": "Vulnerabilities in Citrix Netscaler",
    "serial_number": "2024-069",
    "publish_date": "15-07-2024 15:41:57",
    "description": "On July 9, 2024, Citrix released a security advisory addressing two vulnerabilities in Citrix NetScaler Console, Agent, and SDX (SVM). The vulnerabilities \"CVE-2024-6235\" and \"CVE-2024-6236\" can result in sensitive information disclosure and denial of service.<br>\n",
    "url_title": "2024-069",
    "content_markdown": "---\ntitle: 'Vulnerabilities in\u00a0Citrix\u00a0Netscaler'\nnumber: '2024-069'\nversion: '1.0'\noriginal_date: 'July 09, 2024'\ndate: 'July 15, 2024'\n---\n\n_History:_\n\n* _15/07/2024 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn July 9, 2024, Citrix released a security advisory addressing two vulnerabilities in Citrix NetScaler Console, Agent, and SDX (SVM). The vulnerabilities `CVE-2024-6235` and `CVE-2024-6236` can result in sensitive information disclosure and denial of service [1,2].\n\n# Technical Details\n\nThe vulnerability `CVE-2024-6235`, with a CVSS score of 9.4 out of 10, can lead to sensitive information disclosure. This vulnerability arises from an improper authentication mechanism in the Citrix NetScaler Console. When exploited, this vulnerability allows an attacker to bypass authentication controls and gain unauthorised access to sensitive information. \n\nThe vulnerability `CVE-2024-6236`, with a CVSS score of 7.1 out of 10, can lead to denial of service. This vulnerability is caused by improper restriction of operations within the bounds of a memory buffer.\n\n# Affected Products\n\nCVE-2024-6235 affects the following version: \n\n- NetScaler Console 14.1\u202fbefore\u202f14.1-25.53\n\nCVE-2024-6236 affects the following versions: \n\n- NetScaler Console 14.1\u202fbefore\u202f14.1-25.53\n- NetScaler Console 13.1\u202fbefore\u202f13.1-53.22\n- NetScaler Console 13.0\u202fbefore\u202f13.0-92.31\n- NetScaler SDX (SVM) 14.1 before 14.1-25.53\n- NetScaler SDX (SVM) 13.1 before 13.1-53.17\n- NetScaler SDX (SVM) 13.0 before 13.0-92.31\n- NetScaler Agent 14.1\u202fbefore\u202f14.1-25.53\n- NetScaler Agent 13.1\u202fbefore\u202f13.1-53.22\n- NetScaler Agent 13.0\u202fbefore\u202f13.0-92.31\n\n# Recommendations\n\nCERT-EU strongly recommends updating affected products as soon as possible to mitigate these vulnerabilities.\n\n# References\n\n[1] <https://support.citrix.com/article/CTX677998/netscaler-console-agent-and-sdx-svm-security-bulletin-for-cve20246235-and-cve20246236>\n\n[2] <https://cybersecuritynews.com/citrix-netscaler-authentication-vulnerability/>\n\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>15/07/2024 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On July 9, 2024, Citrix released a security advisory addressing two vulnerabilities in Citrix NetScaler Console, Agent, and SDX (SVM). The vulnerabilities <code>CVE-2024-6235</code> and <code>CVE-2024-6236</code> can result in sensitive information disclosure and denial of service [1,2].</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerability <code>CVE-2024-6235</code>, with a CVSS score of 9.4 out of 10, can lead to sensitive information disclosure. This vulnerability arises from an improper authentication mechanism in the Citrix NetScaler Console. When exploited, this vulnerability allows an attacker to bypass authentication controls and gain unauthorised access to sensitive information. </p><p>The vulnerability <code>CVE-2024-6236</code>, with a CVSS score of 7.1 out of 10, can lead to denial of service. This vulnerability is caused by improper restriction of operations within the bounds of a memory buffer.</p><h2 id=\"affected-products\">Affected Products</h2><p>CVE-2024-6235 affects the following version: </p><ul><li>NetScaler Console 14.1\u202fbefore\u202f14.1-25.53</li></ul><p>CVE-2024-6236 affects the following versions: </p><ul><li>NetScaler Console 14.1\u202fbefore\u202f14.1-25.53</li><li>NetScaler Console 13.1\u202fbefore\u202f13.1-53.22</li><li>NetScaler Console 13.0\u202fbefore\u202f13.0-92.31</li><li>NetScaler SDX (SVM) 14.1 before 14.1-25.53</li><li>NetScaler SDX (SVM) 13.1 before 13.1-53.17</li><li>NetScaler SDX (SVM) 13.0 before 13.0-92.31</li><li>NetScaler Agent 14.1\u202fbefore\u202f14.1-25.53</li><li>NetScaler Agent 13.1\u202fbefore\u202f13.1-53.22</li><li>NetScaler Agent 13.0\u202fbefore\u202f13.0-92.31</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU strongly recommends updating affected products as soon as possible to mitigate these vulnerabilities.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.citrix.com/article/CTX677998/netscaler-console-agent-and-sdx-svm-security-bulletin-for-cve20246235-and-cve20246236\">https://support.citrix.com/article/CTX677998/netscaler-console-agent-and-sdx-svm-security-bulletin-for-cve20246235-and-cve20246236</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://cybersecuritynews.com/citrix-netscaler-authentication-vulnerability/\">https://cybersecuritynews.com/citrix-netscaler-authentication-vulnerability/</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}