• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Citrix NetScaler ADC and NetScaler Gateway Exploit - CVE-2023-4966

Risk Factors

Citrix NetScaler devices are exposed to the internet and the code that exploits this vulnerability is publicly available. An unauthenticated attacker can steal session tokens that help them bypass authentication and launch further attacks on additional networks.

Kill Chain

Exploitation

Risk Score

87

Detection diagram
Next in Exploitation: Citrix NetScaler ADC and NetScaler Gateway Exploit Attempt - CVE-2023-3519

Attack Background

Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway have a sensitive information disclosure vulnerability. To exploit this vulnerability, an unauthenticated attacker sends an HTTP request with a large amount of data (>21739 bytes) in the Host header. The victim processes the request, which results in a buffer overread. The memory beyond this buffer contains a global structure that can include a session token. When the victim sends a response with a 200 status code and a session token, the exploit is successful.

Mitigation Options

Upgrade to a fixed version

MITRE ATT&CK ID

What else can RevealX do for you?