Threat Advisory

Ransomware gangs are actively exploiting the Citrix Bleed vulnerability Citrix NetScaler ADC and NetScaler Gateway

December 15, 2023 | By Accorian

In a joint cybersecurity advisory, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and other international agencies warn that ransomware gangs are actively exploiting the Citrix Bleed vulnerability. This can potentially affect organizations that use Citrix NetScaler ADC and NetScaler Gateway.

Review the security advisory below and take action accordingly:

OVERVIEW:

  • CISA and other partner agencies are responding to active, targeted exploitation of a vulnerability, CVE-2023-4966, affecting Citrix NetScaler ADC and NetScaler Gateway. The vulnerability is also known as Citrix Bleed. The affected products contain a buffer overflow vulnerability that discloses sensitive information when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Customers using Citrix-managed cloud services or Citrix-managed Adaptive Authentication are not impacted.
  • Affiliates of at least two ransomware groups, LockBit and Medusa, have exploited Citrix Bleed as part of attacks against organizations. Both are globally significant and ranked first and sixth most active groups.
  • Exploiting this vulnerability could disclose sensitive information, including session authentication token information that may allow a threat actor to “hijack” a user’s session. 

TECHNICAL DETAILS:

  • On Oct. 10, 2023, Citrix released security updates to address CVE-2023-4966 in NetScaler ADC and NetScaler Gateway.
  • On Oct. 17, Citrix updated its Alert to include “Exploits of CVE-2023-4966 on unmitigated appliances have been observed.”
  • On Oct. 18, CISA added an entry for CVE-2023-4966 to its Known Exploited Vulnerabilities (KEV) catalog, which contains detection and mitigation guidance for observed exploitations of CVE-2023-4966.
  • On Oct. 23, Citrix released a blog, providing recommended next steps and a link to Mandiant’s Oct. 17 guidance for remediating and reducing risks related to CVE-2023-4966: Remediation for Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966).

CISA urges organizations to update unmitigated appliances to the versions listed below, hunt for malicious activity, and report any positive findings to CISA:

  • NetScaler ADC and NetScaler Gateway 14.1-8.50 and later releases
  • NetScaler ADC and NetScaler Gateway 13.1-49.15 and later releases of 13.1
  • NetScaler ADC and NetScaler Gateway 13.0-92.19 and later releases of 13.0
  • NetScaler ADC 13.1-FIPS 13.1-37.164 and later releases of 13.1-FIPS
  • NetScaler ADC 12.1-FIPS 12.1-55.300 and later releases of 12.1-FIPS
  • NetScaler ADC 12.1-NDcPP 12.1-55.300 and later releases of 12.1-NDcPP

Note: NetScaler ADC and NetScaler Gateway version 12.1 are now End-of-Life (EOL). Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities.

MITIGATION:

Citrix strongly recommends users of NetScaler ADC and NetScaler Gateway to install the relevant updated versions of NetScaler ADC and NetScaler Gateway as soon as possible:

  • NetScaler ADC and NetScaler Gateway 14.1-8.50 and later releases
  • NetScaler ADC and NetScaler Gateway 13.1-49.15 and later releases of 13.1
  • NetScaler ADC and NetScaler Gateway 13.0-92.19 and later releases of 13.0
  • NetScaler ADC 13.1-FIPS 13.1-37.164 and later releases of 13.1-FIPS
  • NetScaler ADC 12.1-FIPS 12.1-55.300 and later releases of 12.1-FIPS
  • NetScaler ADC 12.1-NDcPP 12.1-55.300 and later releases of 12.1-NDcPP

Note: NetScaler ADC and NetScaler Gateway version 12.1 are now End-of-Life (EOL). Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities.

• Cloud Software Group has published a related blog at

https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/ , which contains a further context.

• Cloud Software Group has published an additional blog at https://www.netscaler.com/blog/news/netscaler-investigation-recommendations-for-cve-2023-4966/ with recommendations for investigating this vulnerability.

ACCORIAN’S vCISO ADVICE: 

Besides patching, I encourage organizations to assess Citrix software and their systems for evidence of compromise and to hunt for malicious activity. If compromise is suspected or detected, organizations should assume that threat actors hold full administrative access and can perform all tasks associated with the web management software and install malicious code.

HOW TO AVOID RANSOMWARE: 

  • Block Common Forms of Entry: Create a plan for quickly patching vulnerabilities in internet-facing systems; disable or harden remote access like RDP and VPNs.
  • Prevent Intrusions: Stop threats early before they infiltrate or infect your endpoints. Use endpoint security software to prevent exploits and malware to deliver ransomware. 
  • Detect Intrusions: Make it more challenging for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.
  • Stop Malicious Encryption: Deploy Endpoint Detection and Response software that uses multiple detection techniques to identify ransomware and ransomware rollback to restore damaged system files. 
  • Create Offsite, Offline Backups: Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly. 
  • Don’t Get Attacked Twice. Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their entry methods to avoid being attacked again.

For any further assistance, kindly reach out to us on info@accorian.com

Threat Advisory

Team Accorian

Recent Post

Ready to Start?

Ready to Start?​


Drop your CVs to joinourteam@accorian.com

Interested Position

Download Case study

Download SOC2 Guide