Citrix on Tuesday announced patches for three vulnerabilities, including an actively exploited zero-day that allows remote code execution.
The zero-day, tracked as CVE-2023-3519 and rated ‘critical’, affects Citrix ADC and Gateway products. It can be exploited remotely without authentication, but only against appliances that are configured as a gateway or AAA virtual server.
Citrix warned customers that it’s aware of attacks targeting CVE-2023-3519 on unmitigated appliances, and cybersecurity firm Rapid7 has warned organizations that exploitation is expected to quickly increase given the impacted products’ popularity.
No details are available about the attacks, but Citrix product vulnerabilities have been known to be exploited by both profit-driven cybercriminals and state-sponsored threat actors, including ones linked to China.
In addition to the zero-day, the latest Citrix ADC and Gateway updates address two high-severity vulnerabilities.
One of them, CVE-2023-3466, is a reflected cross-site scripting (XSS) issue that can be exploited by getting the targeted user to click on a malicious link. The other is CVE-2023-3467, which allows an authenticated attacker to escalate privileges to root administrator.
Patches for these security holes are included in NetScaler ADC and Gateway 13.1-49.13 and 13.0-91.13, and NetScaler ADC 13.1-FIPS 13.1-37.159, 12.1-FIPS 12.1-55.297, and ADC 12.1-NDcPP 12.1-55.297.
The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert for the Citrix vulnerabilities, warning organizations about the zero-day.
Related: Citrix Patches High-Severity Vulnerabilities in Windows, Linux Apps
Related: Citrix Patches Critical Vulnerability in Secure Access Client for Ubuntu
Related: Citrix Patches Critical Vulnerability in Gateway, ADC

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
- Johnson Controls Hit by Ransomware
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Government Shutdown Could Bench 80% of CISA Staff
- Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
- macOS 14 Sonoma Patches 60 Vulnerabilities
- New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
