First published: Tue Nov 12 2024(Updated: )
Authenticated user can access unintended user capabilities in NetScaler ADC and NetScaler Gateway if the appliance must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) with KCDAccount configuration for Kerberos SSO to access backend resources OR the appliance must be configured as an Auth Server (AAA Vserver) with KCDAccount configuration for Kerberos SSO to access backend resources
Credit: secure@citrix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix NetScaler Application Delivery Controller | ||
Citrix Netscaler Gateway Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8535 is considered a high-severity vulnerability due to its potential for unauthorized access to user capabilities.
Fixing CVE-2024-8535 involves applying the latest security patches provided by Citrix for the affected NetScaler ADC and NetScaler Gateway products.
CVE-2024-8535 affects users of Citrix NetScaler ADC and Citrix NetScaler Gateway configured for Kerberos SSO.
CVE-2024-8535 is vulnerable in configurations where the appliance is set as a Gateway with KCDAccount for Kerberos SSO.
The potential impacts of CVE-2024-8535 include unauthorized access to backend resources and exposure of sensitive user capabilities.