First published: Wed Jan 17 2024(Updated: )
Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.
Credit: secure@citrix.com secure@citrix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix NetScaler | ||
Citrix NetScaler SD-WAN | ||
Google Chrome | ||
Citrix NetScaler ADC | >=12.1<12.1-55.302 | |
Citrix NetScaler ADC | >=12.1<12.1-55.302 | |
Citrix NetScaler ADC | >=13.0<13.0-92.21 | |
Citrix NetScaler ADC | >=13.1<13.1-37.176 | |
Citrix NetScaler ADC | >=13.1<13.1-51.15 | |
Citrix NetScaler ADC | >=14.1<14.1-12.35 | |
Citrix Netscaler Gateway Firmware | >=13.0<13.0-92.21 | |
Citrix Netscaler Gateway Firmware | >=13.1<13.1-51.15 | |
Citrix Netscaler Gateway Firmware | >=14.1<14.1-12.35 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6548 has been classified as a high severity vulnerability due to its potential for authenticated remote code execution.
To fix CVE-2023-6548, you should apply the latest security patches provided by Citrix for the affected NetScaler products.
CVE-2023-6548 affects various versions of Citrix NetScaler ADC and NetScaler Gateway.
CVE-2023-6548 is categorized as a code injection vulnerability.
Yes, CVE-2023-6548 allows for authenticated remote code execution, which can be exploited from a remote location.