Citrix Patches Critical NetScaler Console Vulnerability

Citrix Patches Critical NetScaler Console Vulnerability

July 10, 2024 at 09:48AM

Citrix has released patches for critical security vulnerabilities in its NetScaler product line, including improper authorization and buffer overflow bugs. It recommends updating to specific versions to address these issues. The company also addressed vulnerabilities in other products such as NetScaler ADC and Workspace app, urging customers to update appliances promptly. The US cybersecurity agency CISA has issued an alert on these patches, highlighting potential exploitation risks.

From the meeting notes, it appears that Citrix has released patches to address several security vulnerabilities, including critical and high-severity issues in their NetScaler product line. The most severe issue is CVE-2024-6235, an improper authorization bug that may allow attackers to access sensitive information. Additionally, Citrix recommends updating to specific versions of NetScaler Console, Agent, and SVM products to address these vulnerabilities.

Patches have also been announced for NetScaler ADC and NetScaler Gateway to address high-severity flaws, which could lead to denial-of-service conditions and redirect users to arbitrary websites. Customers are strongly advised to update to supported versions as soon as possible, especially for NetScaler ADC and NetScaler Gateway version 12.1, which has been discontinued.

Furthermore, patches were released for flaws in the Workspace app for Windows, Virtual Delivery Agent for Windows, Citrix Provisioning, and Workspace app for HTML5. Citrix strongly recommends that customers update their appliances as soon as possible, and additional information can be found on the company’s security advisories page.

The US cybersecurity agency CISA has issued an alert regarding the Citrix patches, warning about the potential exploitation of these vulnerabilities by cyber threat actors to take control of affected systems.

It’s worth noting that Citrix has not mentioned any of these vulnerabilities being exploited in the wild, but the company is actively urging customers to update their appliances to ensure security.

For further details, please refer to the company’s security advisories page.

Full Article