First published: Tue Oct 10 2023(Updated: )
Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
Credit: secure@citrix.com secure@citrix.com secure@citrix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix NetScaler Application Delivery Controller | >=12.1<12.1-55.300 | |
Citrix NetScaler Application Delivery Controller | >=12.1<12.1-55.300 | |
Citrix NetScaler Application Delivery Controller | >=13.0<13.0-92.19 | |
Citrix NetScaler Application Delivery Controller | >=13.1<13.1-37.164 | |
Citrix NetScaler Application Delivery Controller | >=13.1<13.1-49.15 | |
Citrix NetScaler Application Delivery Controller | >=14.1<14.1-8.50 | |
Citrix NetScaler Gateway | >=13.0<13.0-92.19 | |
Citrix NetScaler Gateway | >=13.1<13.1-49.15 | |
Citrix NetScaler Gateway | >=14.1<14.1-8.50 | |
Citrix NetScaler ADC | ||
Citrix NetScaler Gateway | ||
Citrix NetScaler ADC and NetScaler Gateway | ||
>=12.1<12.1-55.300 | ||
>=12.1<12.1-55.300 | ||
>=13.0<13.0-92.19 | ||
>=13.1<13.1-37.164 | ||
>=13.1<13.1-49.15 | ||
>=14.1<14.1-8.50 | ||
>=13.0<13.0-92.19 | ||
>=13.1<13.1-49.15 | ||
>=14.1<14.1-8.50 |
Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/] OR discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4966 is a buffer overflow vulnerability in Citrix NetScaler ADC and NetScaler Gateway that allows for sensitive information disclosure when configured as a Gateway or AAA virtual server.
Citrix NetScaler ADC and NetScaler Gateway versions 12.1-55.300 to 14.1-8.50 are affected by CVE-2023-4966.
CVE-2023-4966 has a severity rating of 7.5 (Critical).
Citrix has released security bulletins and patches for CVE-2023-4966. It is recommended to apply the relevant patches or updates provided by Citrix.
You can find more information about CVE-2023-4966 on the official Citrix support website: https://support.citrix.com/article/CTX579459