Lucene search

K
saintSAINT CorporationSAINT:7791C83F0DFA54368A4B59BE19D5ED30
HistoryAug 09, 2023 - 12:00 a.m.

Citrix ADC nsppe buffer overflow

2023-08-0900:00:00
SAINT Corporation
download.saintcorporation.com
83
citrix adc
buffer overflow
arbitrary command execution
http get request
upgrade
cve-2023-3519
vulnerability
citrix gateway

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.965 High

EPSS

Percentile

99.6%

Added: 08/09/2023
CVE: CVE-2023-3519

Background

Citrix ADC (formerly NetScaler ADC) is an application delivery and load balancing platform.

Problem

A buffer overflow vulnerability in the **nsppe** process in Citrix ADC allows an unauthenticated attacker to execute arbitrary commands by making a specially crafted HTTP GET request.

Resolution

Upgrade to Citrix ADC 13.0-91.13 or 13.1-49.13 or higher.

References

<https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467&gt;

Limitations

Exploit works on Citrix VPX 13.1-48.47.

Platforms

Linux

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.965 High

EPSS

Percentile

99.6%