Vulnerabilities

Exploitation of New Citrix Zero-Day Likely to Increase, Organizations Warned

Citrix has patched several vulnerabilities, including CVE-2023-3519, a critical remote code execution zero-day that has been exploited in attacks.

Citrix has patched several vulnerabilities, including CVE-2023-3519, a critical remote code execution zero-day that has been exploited in attacks.

Citrix on Tuesday announced patches for three vulnerabilities, including an actively exploited zero-day that allows remote code execution.

The zero-day, tracked as CVE-2023-3519 and rated ‘critical’, affects Citrix ADC and Gateway products. It can be exploited remotely without authentication, but only against appliances that are configured as a gateway or AAA virtual server. 

Citrix warned customers that it’s aware of attacks targeting CVE-2023-3519 on unmitigated appliances, and cybersecurity firm Rapid7 has warned organizations that exploitation is expected to quickly increase given the impacted products’ popularity. 

No details are available about the attacks, but Citrix product vulnerabilities have been known to be exploited by both profit-driven cybercriminals and state-sponsored threat actors, including ones linked to China

In addition to the zero-day, the latest Citrix ADC and Gateway updates address two high-severity vulnerabilities. 

One of them, CVE-2023-3466, is a reflected cross-site scripting (XSS) issue that can be exploited by getting the targeted user to click on a malicious link. The other is CVE-2023-3467, which allows an authenticated attacker to escalate privileges to root administrator. 

Patches for these security holes are included in NetScaler ADC and Gateway 13.1-49.13 and 13.0-91.13, and NetScaler ADC 13.1-FIPS 13.1-37.159, 12.1-FIPS 12.1-55.297, and ADC 12.1-NDcPP 12.1-55.297.

The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert for the Citrix vulnerabilities, warning organizations about the zero-day. 

Advertisement. Scroll to continue reading.

Related: Citrix Patches High-Severity Vulnerabilities in Windows, Linux Apps

Related: Citrix Patches Critical Vulnerability in Secure Access Client for Ubuntu

Related: Citrix Patches Critical Vulnerability in Gateway, ADC

Related Content

Vulnerabilities

A Chrome 124 update patches the second Chrome zero-day that has been found to be exploited in malicious attacks in 2024.

Nation-State

MITRE has shared more details on the recent hack, including the new malware involved in the attack and a timeline of the attacker’s activities.

Vulnerabilities

CISA says a critical GitLab password reset flaw is being exploited in attacks and roughly 1,400 servers have not been patched.

Malware & Threats

More than 1,400 CrushFTP servers remain vulnerable to an actively exploited zero-day for which PoC has been published.

Incident Response

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

Vulnerabilities

CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild.

Vulnerabilities

CrushFTP patches a zero-day vulnerability allowing unauthenticated attackers to escape the VFS and retrieve system files.

Malware & Threats

Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version