Exploited Unauthenticated RCE Vulnerability CVE-2023-6548 in Citrix NetScaler ADC and NetScaler Gateway
New intelligence shows that exploitation of this RCE vulnerability does not require authentication
Summary
New intelligence shows that exploitation of this RCE vulnerability does not require authentication
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2023-6548
Citrix has reported that CVE-2023-6548 is actively being exploited in the wild.
Introduction
The NHS England National Cyber Security Operations Centre (CSOC) is aware of intelligence provided by CrowdStrike that contrary to Citrix’s initial disclosure, the vulnerability known as CVE-2023-6548 does not require user privileges for exploitation. NHS England National CSOC now assesses CVE-2023-6548 as a critical vulnerability that can allow a remote, unauthenticated attacker to execute remote code on a vulnerable NetScaler Gateway or NetScaler ADC device.
CVE-2023-6548 has two different CVSSv3 scores attributed to it. The NIST National Vulnerability Database (NVD) has classified it as having a score of 8.8, while Citrix rates the vulnerability at 5.5. The weakness is Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway and could allow a remote, unauthenticated attacker with access to the management interface to execute arbitrary code.
Reassessment of CVE-2023-6548
Citrix originally published a security advisory for CVE-2023-6548 and CVE-2023-6549 in January 2024, and Cyber Alert CC-4439 was published with medium severity. Following intelligence supplied by CrowdStrike, this Cyber Alert is being published at high severity reflecting the increased risk presented by the vulnerability.
The remediation advice given in January 2024 was to update to the most current versions of software listed in the CTX584986. As other builds have been released since then, the revised remediation is to update to the most recent version of the software.
Remediation advice
Due to the change of severity of this vulnerability, affected organisations must update to the most recent version available, which for July 2024 include:
- 14.1 build 25.56
- 13.1 build 53.24
- 13.0 build 92.31
Affected organisations are also highly encouraged to review and implement the guidance provided in Citrix’s NetScaler Secure Deployment Guide
Remediation steps
Type | Step |
---|---|
Patch |
Release notes for NetScaler software version 14.1 https://docs.netscaler.com/en-us/citrix-adc/current-release/citrix-adc-release-notes.html |
Patch |
Release notes for NetScaler software version 13.1 https://docs.netscaler.com/en-us/citrix-adc/13-1/citrix-adc-release-notes.html |
Patch |
Release notes for NetScaler software version 13.0 https://docs.netscaler.com/en-us/citrix-adc/13/citrix-adc-release-notes.html |
Definitive source of threat updates
Last edited: 17 July 2024 1:05 pm