Citrix is urging administrators to secure all NetScaler ADC and Gateway appliances against the CVE-2023-4966 vulnerability, which is actively exploited in attacks.
On October 10, Citrix published a related to a critical vulnerability, tracked as CVE-2023-4966, in Citrix NetScaler ADC/Gateway devices.
“Exploits of CVE-2023-4966 on unmitigated appliances have been observed.” reported Citrix. “Cloud Software Group strongly urges customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions of NetScaler ADC and NetScaler Gateway as soon as possible:
Note: NetScaler ADC and NetScaler Gateway version 12.1 is now End-of-Life (EOL). Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities.”
Researchers from Mandiant observed the exploitation of this vulnerability as a zero-day since late August.
Threat actors exploited this vulnerability to hijack existing authenticated sessions and bypass multifactor authentication or other strong authentication requirements. The researchers warn that these sessions may persist after the update to mitigate CVE-2023-4966 has been deployed.
Mandiant also observed threat actors hijacking sessions where session data was stolen prior to the patch deployment and subsequently used by the threat actor.
“The authenticated session hijacking could then result in further downstream access based upon the permissions and scope of access that the identity or session was permitted. A threat actor could utilize this method to harvest additional credentials, laterally pivot, and gain access to additional resources within an environment.” .
The attacks observed by Mandiant aimed at professional services, technology, and government organizations.
The security firm published the CVE-2023-4966 guidance document for remediating and reducing risks related to this flaw.
Citrix has now confirmed that it is aware of attacks in the wild exploiting this vulnerability.
“We now have reports of incidents consistent with session hijacking, and have received credible reports of targeted attacks exploiting this vulnerability.” reads the published by Citrix this week.
“If you are using affected builds and have configured NetScaler ADC as a gateway (VPN virtual server, ICA proxy, CVPN, RDP proxy) or as an AAA virtual server, we strongly recommend that you immediately because this vulnerability has been identified as critical. No workarounds are available for this vulnerability. In both this communication and the related , we are sharing limited technical details to protect our customers from exploits leveraging this vulnerability within NetScaler to conduct session hijacking of other systems.”
The company urges to install the updated builds and also recommends killing all active and persistent sessions using the following commands:
kill icaconnection -all
kill rdp connection -all
kill pcoipConnection -all
kill aaa session -all
clear lb persistentSessions
US CISA already to its Known Exploited and Vulnerabilities Catalog, ordering federal agencies to address the issue by November 8.
Follow me on Twitter: and and Mastodon
(SecurityAffairs – hacking, CVE-2023-4966)