citrix netscaler-gateway CVE-2023-6548 vulnerability in Citrix Products
Published on January 17, 2024

Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.

Vendor Advisory NVD

Known Exploited Vulnerability

This Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.

The following remediation steps are recommended / required by January 24, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2023-6548 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

What is a Code Injection Vulnerability?

The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE-2023-6548 has been classified to as a Code Injection vulnerability or weakness.


Products Associated with CVE-2023-6548

You can be notified by stack.watch whenever vulnerabilities like CVE-2023-6548 are published in these products:

 
 

What versions are vulnerable to CVE-2023-6548?