=====================================================================

                                   CERT-Renater

                       Note d'Information No. 2024/VULN035
_____________________________________________________________________

DATE                : 17/01/2024

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Citrix NetScaler ADC and
                   NetScaler Gateway versions prior to 14.1-12.35,
                               13.1-51.15, 13.0-92.21,
                NetScaler ADC versions prior to 13.1-FIPS 13.1-37.176,
                     12.1-FIPS 12.1-55.302, 12.1-NDcPP 12.1-55.302.

=====================================================================
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549
_____________________________________________________________________

CTX584986
NetScaler ADC and NetScaler Gateway Security Bulletin for
CVE-2023-6548 and CVE-2023-6549
Security Bulletin | Severity: High
Applicable Products

     NetScaler Gateway NetScaler


Description of Problem

Two vulnerabilities have been discovered in NetScaler ADC (formerly
Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway).

Affected Versions:
The following supported versions of NetScaler ADC and NetScaler
Gateway are affected by the vulnerabilities:
     NetScaler ADC and NetScaler Gateway 14.1 before 14.1-12.35
     NetScaler ADC and NetScaler Gateway 13.1 before 13.1-51.15
     NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.21
     NetScaler ADC 13.1-FIPS before 13.1-37.176
     NetScaler ADC 12.1-FIPS before 12.1-55.302
     NetScaler ADC 12.1-NDcPP before 12.1-55.302

Note: NetScaler ADC and NetScaler Gateway version 12.1 is now
End Of Life (EOL) and is vulnerable.

This bulletin only applies to customer-managed NetScaler ADC and
NetScaler Gateway products. Customers using Citrix-managed cloud
services or Citrix-managed Adaptive Authentication do not need to
take any action.


Summary:
NetScaler ADC and NetScaler Gateway contain the vulnerabilities
described below.

CVE ID 	Description 	Pre-requisites 	CWE 	CVSS

CVE-2023-6548 	Authenticated (low privileged) remote code execution
on Management Interface 	Access to NSIP, CLIP or SNIP with
management interface access 	CWE-94 	5,5

CVE-2023-6549 	Denial of Service 	Appliance must be configured
as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)
OR AAA virtual server 	CWE-119 	8,2


Mitigating Factors

CVE- 2023- 6548 only impacts the management interface. Cloud Software
Group strongly recommends that network traffic to the appliance’s
management interface is separated, either physically or logically,
from normal network traffic. In addition, we recommend that you do
not expose the management interface to the internet, as explained in
the secure deployment guide. Removing such exposure to the internet
greatly reduces the risk of exploitation of this issue. See
NetScaler secure deployment guide
( 
https://docs.citrix.com/en-us/citrix-adc/citrix-adc-secure-deployment/secure-deployment-guide.html)
for more information.


What Customers Should Do

Exploits of these CVEs on unmitigated appliances have been observed.
*Cloud Software Group strongly urges affected customers of NetScaler
ADC and NetScaler Gateway to install the relevant updated versions as
soon as possible.
     NetScaler ADC and NetScaler Gateway 14.1-12.35 and later releases
     NetScaler ADC and NetScaler Gateway  13.1-51.15 and later releases 
of 13.1
     NetScaler ADC and NetScaler Gateway 13.0-92.21 and later releases 
of 13.0      NetScaler ADC 13.1-FIPS 13.1-37.176 and later releases of 
13.1-FIPS      NetScaler ADC 12.1-FIPS 12.1-55.302 and later releases of 
12.1-FIPS      NetScaler ADC 12.1-NDcPP 12.1-55.302 and later releases 
of 12.1-NDcPP
Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End
Of Life (EOL). Customers are recommended to upgrade their appliances
to one supported version that addresses the vulnerabilities.
Please use the following link for downloading the builds:
https://www.citrix.com/downloads/

  What Citrix is Doing
Citrix is notifying customers and channel partners about this potential
security issue through the publication of this security bulletin on the
Citrix Knowledge Center at https://support.citrix.com/securitybulletins.


Obtaining Support on This Issue
If you require technical assistance with this issue, please contact
Citrix Technical Support. Contact details for Citrix Technical Support
are available at https://www.citrix.com/support/open-a-support-case.


Subscribe to Receive Alerts
Citrix strongly recommends that all customers subscribe to receive
alerts when a Citrix security bulletin is created or modified at
https://support.citrix.com/user/alerts.


Reporting Security Vulnerabilities to Citrix
Citrix welcomes input regarding the security of its products and
considers any and all potential vulnerabilities seriously. For
details on our vulnerability response process and guidance on how
to report security-related issues to Citrix, please see the
following webpage:
https://www.citrix.com/about/trust-center/vulnerability-process.html.


Disclaimer
This document is provided on an "as is" basis and does not imply any
kind of guarantee or warranty, including the warranties of
merchantability or fitness for a particular use. Your use of the
information on the document is at your own risk. Citrix reserves
the right to change or update this document at any time. Customers
are therefore recommended to always view the latest version of this
document directly from the Citrix Knowledge Center.


Changelog
2024-01-16 T 17:00:00Z 	Initial Publication
2024-01-16 T 17:00:00Z 	Added direct link to download the builds


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
