{"id":22524,"date":"2023-07-21T16:10:28","date_gmt":"2023-07-22T00:10:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/07\/21\/news-16254\/"},"modified":"2023-07-21T16:10:28","modified_gmt":"2023-07-22T00:10:28","slug":"news-16254","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/07\/21\/news-16254\/","title":{"rendered":"CISA: You&#8217;ve got two weeks to patch Citrix NetScaler vulnerability CVE-2023-3519"},"content":{"rendered":"<p>The Cybersecurity and Infrastructure Security Agency (CISA) has <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/07\/19\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"nofollow\">added<\/a> a critical unauthenticated remote code execution (RCE) vulnerability in Citrix NetScaler ADC and Citrix NetScaler Gateway to its&nbsp;<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" title=\"Known Exploited Vulnerabilities Catalog\" target=\"_blank\" rel=\"nofollow\">Known Exploited Vulnerabilities Catalog<\/a>, based on evidence of active exploitation. This means that Federal Civilian Executive Branch (FCEB) agencies need to remediate this vulnerability by August 9, 2023 to protect their networks against active threats. We urge everyone else to take it seriously too.<\/p>\n<p>The recommended actions are to apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Given the active exploitation, we would advise to do this as soon as possible.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The actively exploited CVE patched in this update is <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-3519\" target=\"_blank\" rel=\"nofollow\">CVE-2023-3519<\/a> a Citrix NetScaler ADC and NetScaler Gateway code injection vulnerability with a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS<\/a> score of 9.8 out of 10. The vulnerability can lead to unauthenticated RCE. It affects appliances configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or as an authentication, authorization and accounting (AAA)\u202fvirtual\u202fserver.<\/p>\n<p>Little information has been made available about the campaign that is exploiting this vulnerability. What we do know is that the criminals use web shells&mdash;a script that can be used by an attacker to run remote commands and maintain persistent access on an already compromised system.&nbsp;CISA has released&nbsp;a<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2023-07\/aa23-201a_csa_threat_actors_exploiting_citrix-cve-2023-3519_to_implant_webshells.pdf\"> cybersecurity advisory<\/a> about the tactics, techniques, and procedures (TTPs) of the currently active campaign.<\/p>\n<p><a href=\"https:\/\/www.thestack.technology\/critical-citrix-vulnerability-cve-2023-3519\/\" target=\"_blank\" rel=\"nofollow\">Reportedly<\/a>, there are around 38,000 Citrix Gateway appliances exposed to the public Internet and exploits against Citrix ADC have been discussed, including the sale of a Remote Code Execution (RCE) exploit, on a cybercrime forum.<\/p>\n<p>Citrix acknowledges the urgency by stating:<\/p>\n<blockquote><p>&ldquo;Exploits of CVE-2023-3519 on unmitigated appliances have been observed. Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible.&rdquo;<\/p><\/blockquote>\n<p>The <a href=\"https:\/\/support.citrix.com\/article\/CTX561482\/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467\" target=\"_blank\" rel=\"nofollow\">security bulletin by Citrix<\/a> about this vulnerability includes two more vulnerabilities. The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities:<\/p>\n<ul>\n<li>NetScaler ADC and NetScaler Gateway\u202f13.1\u202fbefore\u202f13.1-49.13<\/li>\n<li>NetScaler ADC and NetScaler Gateway\u202f13.0\u202fbefore 13.0-91.13<\/li>\n<li>NetScaler ADC 13.1-FIPS before 13.1-37.159<\/li>\n<li>NetScaler ADC 12.1-FIPS before 12.1-55.297<\/li>\n<li>NetScaler ADC 12.1-NDcPP before 12.1-55.297<\/li>\n<\/ul>\n<p>Citrix notes that NetScaler ADC and NetScaler Gateway version 12.1 have reached the end-of-life stage and customers should upgrade to a newer variant of the product.<\/p>\n<p>Customers using Citrix-managed cloud services or Citrix-managed Adaptive Authentication do not need to take any action.<\/p>\n<p>Malwarebytes blocks the IP addresses that are known indicators of compromise (IoCs) for the active campaign exploiting this vulnerability.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/easset_upload_file14352_274175_e.png\" alt=\"Malwarebytes blocks 216.41.162.172\" style=\"display: block; margin-left: auto; margin-right: auto;\" width=\"479\" height=\"305\" \/><\/p>\n<p style=\"text-align: center;\">216.41.162.172<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/easset_upload_file53980_274175_e.png\" alt=\"Malwarebytes blocks 216.51.171.17\" width=\"479\" height=\"305\" \/><\/p>\n<p style=\"text-align: center;\">216.51.171.17<\/p>\n<p>For administrators that would like to see whether their instance has been compromised and what they should do about it, I found <a href=\"https:\/\/www.deyda.net\/index.php\/en\/2023\/07\/19\/checklist-for-citrix-adc-cve-2023-3519\/\" target=\"_blank\" rel=\"nofollow\">this checklist<\/a>.<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on vulnerabilities&mdash;we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/citrix-netscaler-vulnerability-added-to-known-to-be-exploited-catalog\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: Citrix<\/p>\n<p>Tags:  NetScaler<\/p>\n<p>Tags:  CVE-2023-3519<\/p>\n<p>Tags:  web shell<\/p>\n<p>A critical unauthenticated remote code execution vulnerability in Citrix NetScaler ADC and Citrix NetScaler Gateway is being actively exploited<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/citrix-netscaler-vulnerability-added-to-known-to-be-exploited-catalog\" title=\"CISA: You've got two weeks to patch Citrix NetScaler vulnerability CVE-2023-3519\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/citrix-netscaler-vulnerability-added-to-known-to-be-exploited-catalog\">CISA: You&#8217;ve got two weeks to patch Citrix NetScaler vulnerability CVE-2023-3519<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20352,29842,22783,29841,32,16361],"class_list":["post-22524","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-citrix","tag-cve-2023-3519","tag-exploits-and-vulnerabilities","tag-netscaler","tag-news","tag-web-shell"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22524"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22524\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}