DETECTION OVERVIEW
Risk Factors
Citrix NetScaler devices are exposed to the internet and the code that exploits this vulnerability is publicly available. An unauthenticated attacker can steal session tokens that help them bypass authentication and launch further attacks on additional networks.
Kill Chain
Risk Score
87
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway have a sensitive information disclosure vulnerability. To exploit this vulnerability, an unauthenticated attacker sends an HTTP request with a large amount of data (>21739 bytes) in the Host header. The victim processes the request, which results in a buffer overread. The memory beyond this buffer contains a global structure that can include a session token. When the victim sends a response with a 200 status code and a session token, the exploit is successful.