• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Citrix NetScaler ADC and NetScaler Gateway Exploit Attempt - CVE-2023-3519

Risk Factors

Vulnerable devices are exposed to the internet and code that exploits the vulnerability is publicly available. An unauthenticated attacker can easily exploit this vulnerability to create a denial of service (DoS) scenario or gain complete control of a device by running arbitrary code with root privileges.

Kill Chain

Exploitation

Risk Score

87

Detection diagram
Next in Exploitation: Citrix ShareFile Storage Zones Controller Exploit Attempt - CVE-2023-24489

Attack Background

The Citrix products, NetScaler Application Delivery Controller (formerly Citrix ADC), and NetScaler Gateway (formerly Citrix Gateway), have an HTTPS web application that includes a DoS and remote code execution (RCE) vulnerability. An unauthenticated attacker sends a malicious HTTP request to the victim. This request includes a path that ends with /gwtest/formssso. The request also includes query parameters with two specific key-value pairs: the event key is paired with the start value and the target key is paired with a malicious payload. The payload content is tailored to the specific version and desired outcome. For example, successful DoS requires a payload that must be at least 167 characters long. Successful RCE requires a slightly longer payload and malicious code. After receiving the request, the victim runs the malicious payload with root privileges.

Mitigation Options

Install relevant updates

MITRE ATT&CK ID

What else can RevealX do for you?