Lucene search

K
saintSAINT CorporationSAINT:7791C83F0DFA54368A4B59BE19D5ED30
HistoryAug 09, 2023 - 12:00 a.m.

Citrix ADC nsppe buffer overflow

2023-08-0900:00:00
SAINT Corporation
download.saintcorporation.com
110
citrix adc
buffer overflow
arbitrary command execution
http get request
upgrade
cve-2023-3519
vulnerability
citrix gateway

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.966

Percentile

99.7%

Added: 08/09/2023
CVE: CVE-2023-3519

Background

Citrix ADC (formerly NetScaler ADC) is an application delivery and load balancing platform.

Problem

A buffer overflow vulnerability in the **nsppe** process in Citrix ADC allows an unauthenticated attacker to execute arbitrary commands by making a specially crafted HTTP GET request.

Resolution

Upgrade to Citrix ADC 13.0-91.13 or 13.1-49.13 or higher.

References

<https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467&gt;

Limitations

Exploit works on Citrix VPX 13.1-48.47.

Platforms

Linux

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.966

Percentile

99.7%