Description:
Citrix released security advisories to address multiple vulnerabilities in Citrix products. An attacker could exploit these vulnerabilities by sending specially crafted requests to an affected system.
Affected Systems:
- Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 14.1 prior to version 14.1-25.53
- Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 13.1 prior to version 13.1-53.17
- Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 13.0 prior to version 13.0-92.31
- Citrix NetScaler Application Delivery Controller (ADC) 13.1-FIPS prior to version 13.1-37.183
- Citrix NetScaler Application Delivery Controller (ADC) 12.1-FIPS prior to version 12.1-55.304
- Citrix NetScaler Application Delivery Controller (ADC) 12.1-NDcPP prior to version 12.1-55.304
- Citrix NetScaler Agent 14.1 prior to version 14.1-25.53
- Citrix NetScaler Agent 13.1 prior to version 13.1-53.22
- Citrix NetScaler Agent 13.0 prior to version 13.0-92.31
- Citrix NetScaler Console 14.1 prior to version 14.1-25.53
- Citrix NetScaler Console 13.1 prior to version 13.1-53.22
- Citrix NetScaler Console 13.0 prior to version 13.0-92.31
- Citrix NetScaler SVM 14.1 prior to version 14.1-25.53
- Citrix NetScaler SVM 13.1 prior to version 13.1-53.17
- Citrix NetScaler SVM 13.0 prior to version 13.0-92.31
- Citrix Provisioning prior to version 2402
- Citrix Provisioning prior to version 2203 LTSR CU5
- Citrix Provisioning prior to version 1912 LTSR CU9
- Citrix Virtual Apps and Desktops prior to version 2402
- Citrix Virtual Apps and Desktops 2203 LTSR prior to CU5
- Citrix Virtual Apps and Desktops 1912 LTSR prior to CU9
- Citrix Workspace app for HTML5 prior to version 2404.1
- Citrix Workspace app for Windows versions prior to version 2403.1
- Citrix Workspace app for Windows versions prior to version 2402 LTSR
Please note that Citrix NetScaler ADC and NetScaler Gateway version 12.1 has reached End-Of-Life (EOL). As version 12.1 is vulnerable with no patches provided, system administrators should arrange to upgrade the NetScaler ADC and NetScaler Gateway to supported versions or migrate to other supported technologies.
Impact:
Successful exploitation of the vulnerabilities could lead to denial of service, information disclosure, privilege escalation, security restriction bypass or spoofing on an affected system.
Recommendation:
Patches for affected systems are now available. Administrators of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://support.citrix.com/article/CTX677944
- https://support.citrix.com/article/CTX677998
- https://support.citrix.com/article/CTX678025
- https://support.citrix.com/article/CTX678035
- https://support.citrix.com/article/CTX678036
- https://support.citrix.com/article/CTX678037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5491 (to CVE-2024-5492)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6148 (to CVE-2024-6151)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6235 (to CVE-2024-6236)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6286