Citrix on Tuesday announced patches for three vulnerabilities, including an actively exploited zero-day that allows remote code execution.
The zero-day, tracked as CVE-2023-3519 and rated ‘critical’, affects Citrix ADC and Gateway products. It can be exploited remotely without authentication, but only against appliances that are configured as a gateway or AAA virtual server.
Citrix warned customers that it’s aware of attacks targeting CVE-2023-3519 on unmitigated appliances, and cybersecurity firm Rapid7 has warned organizations that exploitation is expected to quickly increase given the impacted products’ popularity.
No details are available about the attacks, but Citrix product vulnerabilities have been known to be exploited by both profit-driven cybercriminals and state-sponsored threat actors, including ones linked to China.
In addition to the zero-day, the latest Citrix ADC and Gateway updates address two high-severity vulnerabilities.
One of them, CVE-2023-3466, is a reflected cross-site scripting (XSS) issue that can be exploited by getting the targeted user to click on a malicious link. The other is CVE-2023-3467, which allows an authenticated attacker to escalate privileges to root administrator.
Patches for these security holes are included in NetScaler ADC and Gateway 13.1-49.13 and 13.0-91.13, and NetScaler ADC 13.1-FIPS 13.1-37.159, 12.1-FIPS 12.1-55.297, and ADC 12.1-NDcPP 12.1-55.297.
The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert for the Citrix vulnerabilities, warning organizations about the zero-day.