Citrix has issued a plea to customers using NetScaler ADC and NetScaler Gateway to take immediate action by installing updated versions of the products. Failure to do so has left these customers exposed to potential information disclosure and denial-of-service (DoS) attacks.
NetScaler ADC and NetScaler Gateway were developed to improve the performance, security, and availability of applications and services in networks. On October 10, Citrix had initially disclosed the presence of two vulnerabilities in these products, namely CVE-2023-4966 and CVE-2023-4967. These vulnerabilities were classified as “unauthenticated buffer-related” flaws.
Of the two vulnerabilities, CVE-2023-4966 is considered the most severe, with a CVSS score of 9.4. This vulnerability allows for the disclosure of critical information and poses a significant risk to the affected systems. Cybersecurity firm AssetNote has even gone so far as to publish a proof-of-concept (POC) exploit for this vulnerability, which they have named Citrix Bleed. AssetNote is also offering customers the opportunity to test their systems for exposure to this vulnerability.
Citrix has confirmed that there have been observed instances of exploits targeting unmitigated devices affected by CVE-2023-4966. In response, Cloud Software Group, in conjunction with Citrix, strongly advises customers using NetScaler ADC and NetScaler Gateway to install the updated versions of the products as soon as possible. Timely installation of these updates is crucial to safeguarding against potential attacks exploiting the vulnerabilities.
The second vulnerability, CVE-2023-4967, has thus far seen fewer instances of active exploitation. However, it still poses a risk, as it allows malicious actors to launch DoS attacks. This vulnerability has been assigned a CVSS score of 8.2. Unlike CVE-2023-4966, there have been no reported instances of widely observed active exploits targeting this particular vulnerability.
In the latest update on these vulnerabilities, Citrix has emphasized the importance of installing the updated versions of the affected devices. Numerous versions of NetScaler ADC and NetScaler Gateway are impacted by these vulnerabilities. For a comprehensive list of affected versions, customers are urged to refer to Citrix’s most recent security bulletin.
As the prevalence of cyber threats continues to rise, it is paramount for organizations to prioritize the security of their network infrastructure. Prompt action in updating vulnerable systems plays a critical role in proactively mitigating the risks associated with these vulnerabilities. Failure to do so may expose organizations and their valuable data to potential breaches and attacks.
Citrix’s proactive approach in addressing these vulnerabilities serves as a reminder to both customers and organizations alike that maintaining up-to-date systems and promptly installing security patches are crucial in safeguarding against potential threats. By taking these necessary precautions, organizations can better fortify their defenses and minimize the impact of potential attacks.

