Citrix.NetScaler.ADC.Gateway.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Citrix NetScaler ADC and NetScaler Gateway.
The vulnerability is due to insufficient validation when processing a user-supplied HTTP request parameter. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request.
Affected Products
NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.13
NetScaler ADC and NetScaler Gateway 13.0 before 13.0-91.13
NetScaler ADC 13.1-FIPS before 13.1-37.159
NetScaler ADC 12.1-FIPS before 12.1-55.297
NetScaler ADC 12.1-NDcPP before 12.1-55.297
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |