Article Details
Scrape Timestamp (UTC): 2024-01-18 15:32:10.674
Source: https://www.theregister.com/2024/01/18/citrix_netscaler_bugs_attacked/
Original Article Text
Click to Toggle View
Two more Citrix NetScaler bugs exploited in the wild. Just when you thought you had recovered from Bleed. Two vulnerabilities in NetScaler's ADC and Gateway products have been fixed – but not before criminals found and exploited them, according to the vendor. CVE-2023-6548 could allow remote code execution (RCE) in the appliances' management interface. It received a 5.5 CVSS rating, which is low for an RCE bug. One reason for this may be because it does require the attacker to be authenticated, albeit with low-level privileges, and they must have access to NetScaler IP (NSIP), Subnet IP (SNIP), or cluster management IP (CLIP) with management interface access. In addition, this vulnerability cannot be exploited if the management console and related tech is not configured with exposure to the public internet, and NetScaler's configuration instructions recommend that it only be configured on a private network. TLDR: If you followed Citrix's instructions, your appliances should be safe. The bad news? According to Shadowserver, just over 1,400 Netscaler management interfaces are exposed on the internet as of Wednesday afternoon. The second bug, tracked as CVE-2023-6549, could allow a denial-of-service attack, and earned an 8.2 CVSS rating. A successful exploit requires the appliance be configured as a gateway (such as a VPN virtual server, ICA Proxy, CVPN or RDP Proxy) or as an AAA virtual server that provides authentication, authorization, and accounting controls. "Exploits of these CVEs on unmitigated appliances have been observed," according to a Tuesday security alert from Citrix. The flaws only affected customer-managed NetScaler ADC and NetScaler Gateway, so customers using Netscaler-managed services don't have to worry about any of this. Vulnerable products include: Citrix/Netscaler history Once Citrix merged with Tibco in 2022, Netscaler became one of the brands operated by the Cloud Software Group, which reconstituted it as a standalone business. However, the split wasn't entirely clean. Netscaler's security and support ops remain entangled with that of Citrix, which probably explains why flaws in Netscaler products are named for Citrix and technical docs about Netscaler products appear at Citrix.com. Customers should install updated versions: "We recommend immediate application of fixes," according to the vendor's guidance. In response to The Register's questions, Citrix said it is aware of "only a limited number of exploits in the wild." "The vulnerabilities only apply to customer-managed instances and do not apply to cloud managed services," the vendor added. "NetScaler recommends customers apply the fixes quickly before the exploitation becomes widespread." The US Cybersecurity and Infrastructure Security Agency has already added the two vulnerabilities to its Known Exploited Vulnerabilities Catalog. And while all of this feels very Citrix-Bleed-esque, the vendor assures us that these new bugs under attack are not related to that zero-day. Citrix Bleed, of course, is the critical information-disclosure bug that also affects NetScaler ADC and NetScaler Gateway. It was disclosed in October and abused to infect victims with ransomware and steal, among a ton of other data, millions of Comcast Xfinity subscribers' personal info. Unlike Citrix Bleed, the latest security flaws don't allow for data exfiltration, which makes them not quite as appealing to would-be digital thieves and ransomware crews. A couple of Tenable security research engineers weighed in on the vulnerabilities. Satnam Narang and Scott Caveza pointed out that although these are Citrix appliances' second and third zero-days in the last four months, "the impact from these two new zero-day vulnerabilities is not expected to be as significant as Citrix Bleed." "Nonetheless, organizations that do use these appliances in their networks should apply the available patches as soon as possible," the duo added.
Daily Brief Summary
Two new vulnerabilities in Citrix NetScaler ADC and Gateway products have been exploited in the wild before a fix was available.
CVE-2023-6548 allows for remote code execution, though it requires an authenticated user with low-level privileges and access to certain management IPs.
CVE-2023-6549 poses a denial-of-service threat with an 8.2 CVSS rating, impacting appliances configured as a gateway or AAA virtual server.
Even though Citrix's configuration instructions recommend keeping management interfaces private, over 1,400 interfaces were reportedly exposed online.
Only customer-managed NetScaler ADC and Gateway instances are affected; cloud-managed services are not vulnerable to these flaws.
Citrix and Tenable security researchers urge customers to apply the provided patches immediately to prevent widespread exploitation.
The US Cybersecurity and Infrastructure Security Agency has added both CVEs to its Known Exploited Vulnerabilities Catalog, underscoring the seriousness of these exploits.