1 min read

Citrix Zero-Day Vulnerability Update

Citrix Zero-Day Vulnerability Update

Take these important actions now to mitigate vulnerabilities in NetScaler ADC and NetScaler Gateway products

On Oct 10, 2023, Citrix released a security bulletin for two previously unknown zero-day vulnerabilities: CVE-2023-4966 and CVE-2023-4967. These vulnerabilities affect the NetScaler ADC and NetScaler Gateway products. When exploited, they allow an attacker to take over an active session, effectively impersonating a trusted user.

Citrix recommends the following actions to mitigate the vulnerabilities:

  1. Kill all active sessions to the NetScaler ADC and Gateway products.
  2. Immediately upgrade vulnerable products to unimpacted versions.

In addition to performing the recommended actions from Citrix, potentially impacted organizations should take the following precautions as part of their incident response process:

Note: The following response steps should be performed before upgrading the vulnerable products to avoid overwriting pertinent artifacts. Once the artifacts are preserved, continue with upgrading the vulnerable products.

  1. Preserve log and appliance information:
    1. Create a snapshot of the NetScaler products including its memory.
    2. Preserve log information from the NetScaler products, Web Application Firewalls, Load Balancers, and any other devices in front of the NetScaler products.
  2. Review logs for abnormal web requests originating from suspicious IP addresses.
    1. Geolocate IP addresses to determine if non-authorized users attempted connection.
    2. Look for requests to ‘oauth/idp/.well-known/openid-configuration’ or other configuration and administration URLs.
    3. Correlate sessions to IP addresses to identify if a single session has more than one associated IP address.
  3. Depending on the above findings, additional forensic analysis may be necessary to examine internal host systems to identify additional post-exploitation activity.

Additional steps for mitigation if abnormal access is identified:

  • Consider changing all NetScaler ADC and Gateway passwords.
  • Revoke and reissue SSL certificates.
  • Change Active Directory NetScaler account passwords.
  • Consider performing a user account audit of Active Directory.

Additional Resources


Check out IronGate’s Digital Forensics and Incident Response capabilities:

Marra

 

Joseph Marra brings over 10 years of experience in the cybersecurity industry with a key focus on ransomware investigations, business email compromise, advanced persistent threat intrusions, and insider threat investigations. Joseph has played a vital role in contributing to the foundation of multiple forensic labs and incident response infrastructures.

 


ConnectWise Vulnerability Update

5 min read

ConnectWise Vulnerability Update

Vulnerable organizations should follow the recommended actions from ConnectWise, plus several other key precautions

Read More
Evolution in Crisis Communications & Public Relations

1 min read

Evolution in Crisis Communications & Public Relations

January 23, 2024 IronGate CEO Steve Ramey is a featured panelist at NetDiligence® CyberRisk Summit in Miami

Read More
How to Embed Defense in Your Cloud and DevOps Management

1 min read

How to Embed Defense in Your Cloud and DevOps Management

October 24, 2023 IronGate CEO Steve Ramey a Featured Speaker at The QA Financial E-commerce Forum in New York

Read More