8.2

CVE-2023-6549

Warnung

Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CitrixNetscaler Application Delivery Controller SwEditionfips Version >= 12.1 < 12.1-55.302
CitrixNetscaler Application Delivery Controller SwEditionndcpp Version >= 12.1 < 12.1-55.302
CitrixNetscaler Application Delivery Controller SwEdition- Version >= 13.0 < 13.0-92.21
CitrixNetscaler Application Delivery Controller SwEditionfips Version >= 13.1 < 13.1-37.176
CitrixNetscaler Application Delivery Controller SwEdition- Version >= 13.1 < 13.1-51.15
CitrixNetscaler Application Delivery Controller SwEdition- Version >= 14.1 < 14.1-12.35
CitrixNetScaler Gateway Version >= 13.0 < 13.0-92.21
CitrixNetScaler Gateway Version >= 13.1 < 13.1-51.15
CitrixNetScaler Gateway Version >= 14.1 < 14.1-12.35

17.01.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability

Schwachstelle

Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

Beschreibung

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 16.34% 0.946
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
secure@citrix.com 8.2 3.9 4.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.