Menu

Alchemy Blog

Alchemy Alerts: January Citrix and NetScaler CVEs

NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-6548 and CVE-2023-6549

 

URGENT: Citrix has issued a security bulletin (CTX584986) addressing vulnerabilities (CVE-2023-6548 and CVE-2023-6549) in NetScaler ADC and NetScaler Gateway. The bulletin provides essential information and guidance on mitigating these vulnerabilities. For detailed insights, refer to the official support article.

Affected Versions:

The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities:

  • NetScaler ADC and NetScaler Gateway 14.1 before 14.1-12.35
  • NetScaler ADC and NetScaler Gateway 13.1 before 13.1-51.15
  • NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.21
  • NetScaler ADC 13.1-FIPS before 13.1-37.176
  • NetScaler ADC 12.1-FIPS before 12.1-55.302
  • NetScaler ADC 12.1-NDcPP before 12.1-55.302

Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL) and is vulnerable.

This bulletin only applies to customer-managed NetScaler ADC and NetScaler Gateway products. Customers using Citrix-managed cloud services or Citrix-managed Adaptive Authentication do not need to take any action.

Summary:

NetScaler ADC and NetScaler Gateway contain the vulnerabilities described below.

CVE ID Description Pre-requisites
CVE-2023-6548 Authenticated (low privileged) remote code execution on the Management Interface Access to NSIP, CLIP or SNIP with management interface access
CVE-2023-6549 Denial of Service Appliance must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)
OR AAA virtual server

Mitigating Factors:

CVE- 2023- 6548 only impacts the management interface. Alchemy Technology Group strongly recommends that network traffic to the appliance’s management interface be separated physically or logically from normal network traffic. In addition, we recommend not exposing the management interface to the internet, as explained in the secure deployment guide. Removing such exposure to the internet greatly reduces the risk of exploitation of this issue. See NetScaler secure deployment guide ( https://docs.citrix.com/en-us/citrix-adc/citrix-adc-secure-deployment/secure-deployment-guide.html) for more information.

What Customers Should Do:

Exploits of these CVEs on unmitigated appliances have been observed. Alchemy Technology Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible.

  • NetScaler ADC and NetScaler Gateway 14.1-12.35 and later releases
  • NetScaler ADC and NetScaler Gateway  13.1-51.15 and later releases of 13.1
  • NetScaler ADC and NetScaler Gateway 13.0-92.21 and later releases of 13.0
  • NetScaler ADC 13.1-FIPS 13.1-37.176 and later releases of 13.1-FIPS
  • NetScaler ADC 12.1-FIPS 12.1-55.302 and later releases of 12.1-FIPS
  • NetScaler ADC 12.1-NDcPP 12.1-55.302 and later releases of 12.1-NDcPP

Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL). Customers are recommended to upgrade their appliances to one supported version that addresses the vulnerabilities.

Citrix StoreFront Security Bulletin for CVE-2023-5914

 

URGENT: Citrix has released a security bulletin (CTX583759) addressing the vulnerability (CVE-2023-5914) in Citrix StoreFront. The bulletin contains crucial information and guidance on addressing and mitigating this specific security concern. For detailed insights, please refer to the official support article.

Applicable Products:

  • StoreFront

Description of Problem:

A vulnerability has been discovered in Citrix StoreFront, which, if exploited, may result in a Cross-site scripting (XSS) attack.

Affected Versions:

The following supported versions of Citrix StoreFront are affected by the vulnerability:

Current Release (CR)

  • Citrix StoreFront before 2308.1
  • Citrix StoreFront before 2311

Long Term Service Release (LTSR)

  • Citrix StoreFront 1912 LTSR before CU8 hotfix 3.22.8001.2
  • Citrix StoreFront 2203 LTSR before CU4 Update 1

Summary:

CVE ID Description Pre-requisites
CVE-2023-5914 Cross-site scripting (XSS) Requires victim to access an attacker-controlled link in the browser

What Customers Should Do:

Alchemy Technology Group strongly urges affected customers of Citrix StoreFront to install the relevant updated versions of Citrix StoreFront as soon as possible:

Current Release (CR)

  • Citrix StoreFront 2308.1 and later
  • Citrix StoreFront 2311and later

Long Term Service Release (LTSR)

  • Citrix StoreFront 1912 LTSR CU8 hotfix 3.22.8001.2* and later
  • Citrix StoreFront 2203 LTSR CU4 Update 1 and later

Please use the following link for downloading the builds: https://www.citrix.com/downloads/

*Citrix StoreFront 1912 LTSR CU8 hotfix 3.22.8001.2 is available to download at the following link: https://support.citrix.com/article/CTX587278

Take Action:

As always, if you have any questions, please don’t hesitate to reach out to your Alchemy account manager to schedule a time with one of our engineers to review the strategy for remediation and the potential impact on your business.

If you do not know who your account manager is, submit an inquiry: https://www.alchemytechgroup.com/citrix-security-check/