Citrix ADC/Gateway Triple Threat 

Written by Eric Dodge and Harish Segar of the Kudelski Security Threat Detection & Research Team


Summary

Citrix recently released a handful of vulnerabilities, for cross-site scripting, privilege escalation, and unauthenticated remote code execution. These target Citrix ADC (NetScaler ADC) and Citrix Gateway (NetScaler Gateway). All three have existing prerequisites for proper execution, with the most concerning being the remote code execution. Due to its more trivial requirements for execution, and not requiring authenticated access or user interaction. The vulnerabilities are scored as follows: XSS 8.3, Privilege Escalation 8, Unauthenticated RCE 9.8.  

Currently, there is no proposed workaround, but it is advised to patch any impacted systems as CVE 2023-3519 exploitation has already been observed.

Affected Applications

ProductAffected VersionsFixed versions
NetScaler ADC and NetScaler Gateway13.1 before 13.1-49.13 13.1-49.13 and later releases
NetScaler ADC and NetScaler Gateway13.0 before 13.0-91.13 13.0-91.13 and later releases of 13.0
NetScaler ADC13.1-FIPS before 13.1-37.15913.1-FIPS 13.1-37.159 and later releases of 13.1-FIPS  
NetScaler ADC12.1-FIPS before 12.1-65.36  12.1-FIPS 12.1-65.36 and later releases of 12.1-FIPS 
NetScaler ADC12.1-NDcPP before 12.65.36  12.1-NDcPP 12.1-65.36 and later releases of 12.1-NDcPP

Additionally, this only applies to impacted systems managed by customers, it does not impact Citrix managed cloud services or adaptive authentication. 

Technical Details

CVE-2023-3519 – Unauthenticated remote code execution

The RCE vulnerability, when executed properly, allows for potential execution of remote code while unauthenticated. The only requirements are that the impacted appliance must be configured as either a gateway or an AAA virtual server. In terms of the gateway, possible configurations include VPN virtual servers, ICA proxies, CVPN’s, and RDP proxies. The vulnerability targets a failure to control generation of code, IE code injection. This is typically possible when the product insufficiently filters the control-plane code from the user-controlled input, or the data plane, resulting in an attacker being able to craft specific code that alters the control flow. That in turn leads to the potential for arbitrary code execution. 

CVE-2023-3466 – Reflected cross-site scripting

The XSS vulnerability released has more stringent requirements in order to be effective. It hinges on a user navigating to a browser link that is in the control of the attackers. Additionally, this requires the victim to have connectivity to the NSIP. This vulnerability is based on improper input validation. Leading to potential malicious inputs to be utilized in order to alter control flow, arbitrary control or a resource, or arbitrary code execution.

CVE-2023-3467 – Privilege escalation to root administrator (nsroot)

The privilege escalation vulnerability requires authenticated access to either the NSIP or SNIP, to include access to the management interface. This means it requires an additional vector for initial access in order to be successful. Proper privilege management and monitoring can assist in detecting and preventing this from occurring.

Solution

Kudelski Security recommends identifying, validating, and implementing a security update for any affected systems as soon as possible. Administrators should move fast and implement the patch as soon as possible.

What the Cyber Fusion Center (CFC) is doing

The CFC will continue to keep up to date with this vulnerability to provide further updates as they become available.

Sources

Leave a Reply