Lucene search

K
saintSAINT CorporationSAINT:94CC80E080B7FF680EFB0AEC3D170D8B
HistoryAug 09, 2023 - 12:00 a.m.

Citrix ADC nsppe buffer overflow

2023-08-0900:00:00
SAINT Corporation
my.saintcorporation.com
63
citrix adc
buffer overflow
nsppe process
unauthenticated attacker
http get request
arbitrary commands
upgrade
citrix vpx
linux

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.912 High

EPSS

Percentile

98.9%

Added: 08/09/2023
CVE: CVE-2023-3519

Background

Citrix ADC (formerly NetScaler ADC) is an application delivery and load balancing platform.

Problem

A buffer overflow vulnerability in the **nsppe** process in Citrix ADC allows an unauthenticated attacker to execute arbitrary commands by making a specially crafted HTTP GET request.

Resolution

Upgrade to Citrix ADC 13.0-91.13 or 13.1-49.13 or higher.

References

<https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467&gt;

Limitations

Exploit works on Citrix VPX 13.1-48.47.

Platforms

Linux

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.912 High

EPSS

Percentile

98.9%