First published: Tue Nov 12 2024(Updated: )
Memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway if the appliance must be configured as a Gateway (VPN Vserver) with RDP Feature enabled OR the appliance must be configured as a Gateway (VPN Vserver) and RDP Proxy Server Profile is created and set to Gateway (VPN Vserver) OR the appliance must be configured as a Auth Server (AAA Vserver) with RDP Feature enabled
Credit: secure@citrix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix NetScaler Application Delivery Controller | ||
Citrix NetScaler Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8534 is classified as a memory safety vulnerability that can lead to memory corruption and Denial of Service.
To fix CVE-2024-8534, ensure that your Citrix NetScaler ADC or Gateway is updated to the latest security patches provided by Citrix.
CVE-2024-8534 affects Citrix NetScaler ADC and Citrix Gateway when configured with RDP features enabled.
Exploiting CVE-2024-8534 can lead to memory corruption and result in a Denial of Service, impacting service availability.
The exploitability of CVE-2024-8534 depends on the specific configuration of the affected Citrix products, particularly if RDP is enabled.