#netscaler
Citrix Releases Security Updates for NetScaler and Citrix Session Recording (November 2024) https://groups.googl... #patchmanagement
November 12, 2024 at 6:54 PM
Someone upgraded a NetScaler from 13.1 to 13.0 then back to 13.1 and perl is now all kinds of broken.

This only helped me to get to the next error in fixing this problem.
When upgrading NetScaler getting error -bash: ./installns: /usr/bin/perl: bad interpreter
When upgrading NetScaler getting error -bash: ./installns: /usr/bin/perl: bad interpreter
support.citrix.com
February 11, 2024 at 10:08 AM
Citrix NetScaler ADC & Gateway Impacted by regreSSHion RCE Vulnerability
Citrix NetScaler ADC & Gateway Impacted by regreSSHion RCE Vulnerability
The Cloud Software Group has confirmed that several of its products, including NetScaler ADC and NetScaler Gateway, are impacted.
cybersecuritynews.com
July 12, 2024 at 8:46 AM
Macht Citrix jetzt "auf Broadcom"? Sieht so aus, als ob auf Citrix-Kunden (Virtual Desktop, Netscaler etc.) massive Steigerungen der Lizenzkosten zukommen - oder habe ich was falsch verstanden?

www.borncity.com/blog/2024/04...
April 7, 2024 at 11:45 PM
Citrix’s Patch Predicament: Fixing Vulnerabilities Breaks Logins!

Citrix warns: Patch NetScaler to fix vulnerabilities, but beware—your login page might get a makeover it didn't ask for!
thenimblenerd.com?p=1049517
Citrix’s Patch Predicament: Fixing Vulnerabilities Breaks Logins!
Citrix warns that patching new vulnerabilities on NetScaler appliances could result in broken login pages. The culprit? A Content Security Policy (CSP) header now enabled by default. While designed to block unauthorized scripts, it might inadvertently restrict legitimate ones, complicating life for admins. Proceed with caution, and maybe a prayer.
thenimblenerd.com
July 2, 2025 at 4:32 PM
~Cisa~
CISA added the actively exploited Citrix NetScaler ADC/Gateway vulnerability (CVE-2025-6543) to its KEV catalog.
-
IOCs: CVE-2025-6543
-
#CVE20256543 #Citrix #ThreatIntel
CISA Adds Citrix Vuln to KEV Catalog
www.cisa.gov
June 30, 2025 at 8:04 PM
CitrixBleed 2 exploits are now in the wild, so patch now Multiple researchers are warning about CitrixBleed 2, a critical-severity flaw in Citrix NetScaler ADC and NetScaler Gateway.. @cosmicmeta.io #Patch

https://u2m.io/sW6R4RGr
We've got some trouble | 403 - Access Denied
No description available.
www.techradar.com
July 8, 2025 at 10:07 AM
CitrixBleed 2: A New Threat or Just Déjà Vu for Cybersecurity?

CISA warns of Citrix NetScaler flaw CVE-2025-5777. It's back like a sequel no one asked for. Secure your systems before hackers steal your cookies!
thenimblenerd.com?p=1050118
CitrixBleed 2: A New Threat or Just Déjà Vu for Cybersecurity?
The U.S. CISA adds Citrix NetScaler ADC and Gateway flaw, dubbed CitrixBleed 2, to its Known Exploited Vulnerabilities catalog. This vulnerability, a sequel with a CVSS score of 9.3, lets attackers swipe session cookies. It's like the 2023 exploit, but back with more drama than a reality TV reunion.
thenimblenerd.com
July 11, 2025 at 9:34 AM
It looks like there are a bunch of broken (empty) NetScaler Console HDX / Gateway / Web Insight or Security Violations since the latest NS and NSC 14.1 47.46 Firmware.

Migrating to Analytics Profiles solved my issues. www.julianjakob.com/netscaler-hd...
NetScaler - HDX and Gateway Insight stopped working
Migrate from AppFlow Policies to Analytics Profiles to get HDX and Gateway Insight to work again with NetScaler Console.
www.julianjakob.com
July 23, 2025 at 2:41 PM
Die Schwachstelle in Citrix-Netscaler lässt die CISA aktiv werden.
Security-Behörde nennt Citrix-Lücke "unakzeptables Risiko"
Die Schwachstelle in Citrix-Netscaler lässt die CISA aktiv werden. US-Behörden müssen sofort handeln.
www.inside-it.ch
July 14, 2025 at 12:54 PM
2/ After compromising the NetScaler, the attackers not only dropped a webshell, but also customized the VPN login page to silently exfiltrate cleartext credentials to a domain under their control every time someone logged in.
July 27, 2025 at 8:24 PM
Allarme NetScaler ADC e Gateway: Due bug gravi mettono a rischio le aziende in tutto il mondo

📌 Link all'articolo : www.redhotcyber.com/post/all...

#redhotcyber #hacking #cti #ai #online #it #cybercrime #cybersecurity #technology #news #cyberthreatintelligence #innovation #privacy
June 19, 2025 at 5:26 AM
Critical vulnerability in Citrix Netscaler raises specter of exploitation wave: www.cybersecuritydive.com/news/critica... (by David Jones)
Critical vulnerability in Citrix Netscaler raises specter of exploitation wave
Threat researchers warn the flaw could open up a flood of attacks that rival the 2023 CitrixBleed crisis.
www.cybersecuritydive.com
June 25, 2025 at 7:00 PM
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC Jun 25, 2025Ravie LakshmananVulnerability / Network Security Citrix has released security updates to ad...

#Cyber #Security #actively #adc #Citrix #CVE20256543 #emergency […]

[Original post on zephyrnet.com]
June 26, 2025 at 2:24 AM
APT-Style Attacks Exploit CVE-2025-6543 in Dutch Critical Organizations The Dutch National Cyber Security Centre (NCSC) has confirmed that a serious vulnerability in Citrix NetScaler systems, ident...

#Firewall #Daily #Cyber #News #Vulnerabilities […]

[Original post on thecyberexpress.com]
August 14, 2025 at 7:08 AM
Citrix’s NetScaler is vulnerable—a memory overflow bug is letting attackers execute code remotely before you even have a chance to patch. Is your system at risk? Read on to find out what you can do now.
Understanding and Mitigating the CVE-2025-7775 Vulnerability in Citrix NetScaler | The DefendOps Diaries
Explore the critical CVE-2025-7775 vulnerability in Citrix NetScaler and learn how to mitigate this severe security threat.
thedefendopsdiaries.com
August 26, 2025 at 10:19 PM
Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June The vendor, which has been widely targeted, said the memory-overflow vulnerability can result in remote-...

#Cybercrime #Cybersecurity #Technology #Threats #Tenable […]

[Original post on cyberscoop.com]
Original post on cyberscoop.com
cyberscoop.com
August 27, 2025 at 6:02 PM
"Like other security frameworks, it can be misused, but it does not include pre-built zero-day exploits," the developer of HexStrike AI told me amid reports of criminals using the red-teaming tool against Citrix NetScaler bugs within hours of disclosure.
Crims boast of using HexStrike AI against Citrix bugs
: LLMs and 0-days - what could possibly go wrong?
www.theregister.com
September 3, 2025 at 10:55 PM
Crims claim HexStrike AI penetration tool makes quick work of Citrix bugs

LLMs and 0-days - what could possibly go wrong?
Attackers on underground forums claimed they were using HexStrike AI, an open-source red-teaming tool, against Citrix NetScaler vulnerabilities within …

#hackernews #llm #news
Crims claim HexStrike AI penetration tool makes quick work of Citrix bugs
LLMs and 0-days - what could possibly go wrong? Attackers on underground forums claimed they were using HexStrike AI, an open-source red-teaming tool, against Citrix NetScaler vulnerabilities within hours of disclosure, according to Check Point cybersecurity evangelist Amit Weigman.…
go.theregister.com
September 4, 2025 at 11:23 PM
For example using Netscaler or Big IP F5 for publishing owa in the internet. Here you could use radius for example to provide MFA. To be fair active sync won't work anymore, because active sync isn't working with mfa. But you should use a VPN on mobile devices anyway.
September 11, 2025 at 3:26 AM
Hackers Exploiting Critical Citrix NetScaler Zero-day Flaw To Deploy Webshells - https://cybersecuritynews.com/citrix-netscaler-hackers-webshells/
Hackers Exploiting Critical Citrix NetScaler Zero-day Flaw To Deploy Webshells
<p>The Cybersecurity and Infrastructure Security Agency (CISA) recently released a security advisory that indicates that threat actors have been exploiting a <a href="https://gbhackers.com/zero-day-vulnerability-citrix-netscaler/">Zero-day vulnerability in Citrix</a> ADC (Application Delivery Controller) and NetScaler Gateways. </p> <p>A vulnerability was discovered that enabled the placement of a webshell on a non-production environment of a critical infrastructure organization. This was reported to CISA and Citrix Systems.</p> <p>Threat actors exploited an unauthenticated, remote code execution vulnerability to drop these webshells on the environment and also attempted to laterally move to the domain controller. However, it was blocked due to network-segmentation controls.</p> <h2><strong><a href="https://gbhackers.com/citrix-secure-access-flaw/">CVE-2023-3519</a>: Code Injection Vulnerability</strong></h2> <p>This vulnerability can be exploited by a threat actor if the appliance is configured as a Gateway (VPN Virtual Server, RDP proxy etc.,) or Authentication, Authorization and Auditing (AAA) Server. The CVSS Score for this vulnerability is given as 9.8 (<strong>Critical</strong>).</p> <p>Citrix systems has <a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467">released patches</a> for fixing this vulnerability. </p> <h2><strong>Affected Products</strong></h2> <ul> <li>NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.13 </li> <li>NetScaler ADC and NetScaler Gateway 13.0 before 13.0-91.13</li> <li>NetScaler ADC and NetScaler Gateway version 12.1, now end of life</li> <li>NetScaler ADC 13.1-FIPS before 13.1-37.159</li> <li>NetScaler ADC 12.1-FIPS before 12.1-65.36</li> <li>NetScaler ADC 12.1-NDcPP before 12.65.36</li> </ul> <h2><strong>Technical Analysis</strong></h2> <p>Threat actors uploaded a malicious TGZ file on the ADC appliance, which consisted of setuid binary, generic webshell and discovery script for conducting an SMB scan on the ADC. Furthermore, AD enumeration and data exfiltration were performed with the webshell. Additional activities performed by the threat actors include,</p> <ul> <li>Viewing of NetScaler Configuration file (Contains encrypted passwords)</li> <li>Viewing NetScaler Decryption Keys (Used for decrypting extracted passwords from Config file)</li> <li>Conducting LDAP search via decrypted AD credentials and extracted data like Users, Computers, Groups, Subnets, Organisational Units, Contacts, Partitions, and Trusts </li> </ul> <div> <blockquote><p lang="en" dir="ltr"><a href="https://twitter.com/hashtag/Citrix?src=hash&amp;ref_src=twsrc%5Etfw">#Citrix</a> <a href="https://twitter.com/hashtag/Vulnerability?src=hash&amp;ref_src=twsrc%5Etfw">#Vulnerability</a><br><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f6a8.png" alt="🚨">We have developed a simple scan script for CVE-2023-3519. It looks for HTTP header "Last Modified" <img src="https://s.w.org/images/core/emoji/14.0.0/72x72/23f2.png" alt="⏲">timestamps from known patched systems that we have collected as they are always the same. It may not work with reverse proxies or heavily modified pages. <a href="https://t.co/Jcvj7L2LSl">pic.twitter.com/Jcvj7L2LSl</a></p>— Deutsche Telekom CERT (@DTCERT) <a href="https://twitter.com/DTCERT/status/1682032701430452233?ref_src=twsrc%5Etfw">July 20, 2023</a></blockquote> </div> <div> <blockquote><p lang="en" dir="ltr">Now sharing info on likely CVE-2023-3519 vulnerable Citrix ADC/Gateway instances in our Vulnerable HTTP report: <a href="https://t.co/qxv0Gv6cAK">https://t.co/qxv0Gv6cAK</a><br><br>At least 11170 unique IPs found, most in the US (4.1K).<br><br>Make sure to patch: <a href="https://t.co/EHskF4kLdt">https://t.co/EHskF4kLdt</a><br><br>Dashboard stats: <a href="https://t.co/zbdpCDDaOF">https://t.co/zbdpCDDaOF</a> <a href="https://t.co/bJs1e32dIX">pic.twitter.com/bJs1e32dIX</a></p>— Shadowserver (@Shadowserver) <a href="https://twitter.com/Shadowserver/status/1682022404825182214?ref_src=twsrc%5Etfw">July 20, 2023</a></blockquote> </div> <p>Other queries by the threat actors were unsuccessful as the organization implemented a segmented environment for the ADC appliance. The exfiltration queries that failed are as follows</p> <ul> <li>Execution of subnet-wide curl command for scanning internal network as well as checking for potential lateral movement targets</li> <li>Outbound network connectivity with a ping command to google.com</li> <li>Subnet-wide host commands for DNS lookup </li> </ul> <p>Nevertheless, the threat actors also deleted the authorization config file <em>/etc/auth.conf</em> to prevent privileged users from logging in remotely. If an attempt by the organization was made to regain access to the server by rebooting into single user mode, it would delete the threat actors’ artifacts.</p> <p>CISA has released a <a href="https://www.cisa.gov/sites/default/files/2023-07/aa23-201a_csa_threat_actors_exploiting_citrix-cve-2023-3519_to_implant_webshells.pdf">complete report</a> about the MITRE ATT&amp;CK framework, detection methods, mitigation and prevention steps. It is recommended for organizations to follow them and mitigate these kinds of breaches by threat actors.</p> <p>The post <a href="https://cybersecuritynews.com/citrix-netscaler-hackers-webshells/">Hackers Exploiting Critical Citrix NetScaler Zero-day Flaw To Deploy Webshells</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
cybersecuritynews.com
July 21, 2023 at 3:06 PM
February 21, 2025 at 6:58 AM