On Oct 10, 2023, Citrix released a security bulletin for two previously unknown zero-day vulnerabilities: CVE-2023-4966 and CVE-2023-4967. These vulnerabilities affect the NetScaler ADC and NetScaler Gateway products. When exploited, they allow an attacker to take over an active session, effectively impersonating a trusted user.
Citrix recommends the following actions to mitigate the vulnerabilities:
In addition to performing the recommended actions from Citrix, potentially impacted organizations should take the following precautions as part of their incident response process:
Note: The following response steps should be performed before upgrading the vulnerable products to avoid overwriting pertinent artifacts. Once the artifacts are preserved, continue with upgrading the vulnerable products.
Additional steps for mitigation if abnormal access is identified:
Additional Resources
Check out IronGate’s Digital Forensics and Incident Response capabilities:
|
Joseph Marra brings over 10 years of experience in the cybersecurity industry with a key focus on ransomware investigations, business email compromise, advanced persistent threat intrusions, and insider threat investigations. Joseph has played a vital role in contributing to the foundation of multiple forensic labs and incident response infrastructures. |