Citrix Gateway / ADC Sensitive Information Exposure

high Web App Scanning Plugin ID 114100

Synopsis

Citrix Gateway / ADC Sensitive Information Exposure

Description

Citrix ADC and Gateway 13.0-x < 13.0-92.19, 13.1-x < 13.1-49.15, 14.1-x < 14.1-8.50, and ADC (FIPS/NDcPP) 12.1-x < 12.1-55.300 suffer from a Sensitive Information Disclosure. By crafting a specific query, a remote and unauthenticated attacker can leverage this vulnerability to obtain a valid session token.

Solution

Upgrade to Citrix ADC or Gateway 13.0-92.19, 13.1-49.15, 14.1-8.50 or latest. For FIPS / NDcPP versions, upgrade to version 12.1-55.300 or latest.

See Also

https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967

Plugin Details

Severity: High

ID: 114100

Type: remote

Published: 10/30/2023

Updated: 10/30/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2023-4966

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: CVE-2023-4966

Vulnerability Information

CPE: cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/10/2023

Vulnerability Publication Date: 10/10/2023

CISA Known Exploited Vulnerability Due Dates: 11/8/2023

Reference Information

CVE: CVE-2023-4966