It is really now or under no circumstances to reduce your business servers managing susceptible versions of Citrix software delivery, load balancing, and Gateway remedies from finding hacked by remote attackers.
Why the urgency? Previously today, various groups publicly released weaponized evidence-of-idea exploit code [1, 2] for a just lately disclosed distant code execution vulnerability in Citrix’s NetScaler ADC and Gateway items that could let anybody to leverage them to just take whole command in excess of prospective business targets.
Just in advance of the previous Christmas and 12 months-conclusion vacations, Citrix introduced that its Citrix Software Shipping Controller (ADC) and Citrix Gateway are susceptible to a vital path traversal flaw (CVE-2019-19781) that could allow for an unauthenticated attacker to perform arbitrary code execution on vulnerable servers.
Citrix verified that the flaw influences all supported edition of the application, which include:
- Citrix ADC and Citrix Gateway version 13. all supported builds
- Citrix ADC and NetScaler Gateway model 12.1 all supported builds
- Citrix ADC and NetScaler Gateway version 12. all supported builds
- Citrix ADC and NetScaler Gateway model 11.1 all supported builds
- Citrix NetScaler ADC and NetScaler Gateway model 10.5 all supported builds
The corporation created the disclose with no releasing any safety patches for susceptible program instead, Citrix provided mitigation to assistance directors guard their servers against likely remote attacks—and even at the time of crafting, there’s no patch out there nearly 23 days immediately after disclosure.
Via the cyberattacks from susceptible servers were being to start with observed in the wild very last 7 days when hackers made non-public exploit soon after reverse engineering mitigation data, the community release of weaponized PoC would now make it simpler for low-skilled script kiddies to launch cyberattacks against vulnerable organizations.
In accordance to Shodan, at the time of creating, there are about 125,400 Citrix ADC or Gateway servers publicly accessible and can be exploited overnight if not taken offline or shielded applying obtainable mitigation.
While speaking about technological facts of the flaw in a site put up released yesterday, MDSsec also produced a video clip demonstration of the exploit they designed but selected not to release it at this second.
Aside from implementing the advised mitigation, Citrix ADC directors are also recommended to check their machine logs for assaults.