All the vulnerabilites related to Cloud Software Group - NetScaler ADC
cve-2023-4967
Vulnerability from cvelistv5
Published
2023-10-27 18:01
Modified
2024-08-02 07:44
Severity ?
EPSS score ?
Summary
Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cloud Software Group | NetScaler ADC |
Version: 14.1 Version: 13.1 Version: 13.0 Version: 13.1-FIPS Version: 12.1-FIPS Version: 12.1-NDcPP |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:44:53.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX579459/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NetScaler ADC", "vendor": "Cloud Software Group", "versions": [ { "lessThan": "8.50", "status": "affected", "version": "14.1", "versionType": "patch" }, { "lessThan": "49.15", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "92.19", "status": "affected", "version": "13.0", "versionType": "patch" }, { "lessThan": "37.164", "status": "affected", "version": "13.1-FIPS", "versionType": "patch" }, { "lessThan": "55.300", "status": "affected", "version": "12.1-FIPS", "versionType": "patch" }, { "lessThan": "55.300", "status": "affected", "version": "12.1-NDcPP", "versionType": "patch" } ] }, { "defaultStatus": "unaffected", "product": "NetScaler Gateway", "vendor": "Cloud Software Group", "versions": [ { "lessThan": "8.50", "status": "affected", "version": "14.1", "versionType": "patch" }, { "lessThan": "49.15", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "92.19", "status": "affected", "version": "13.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server" } ], "value": "Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-27T18:01:59.707Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX579459/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Denial of service", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2023-4967", "datePublished": "2023-10-27T18:01:59.707Z", "dateReserved": "2023-09-14T15:51:24.455Z", "dateUpdated": "2024-08-02T07:44:53.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6549
Vulnerability from cvelistv5
Published
2024-01-17 20:15
Modified
2024-08-02 08:35
Severity ?
EPSS score ?
Summary
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cloud Software Group | NetScaler ADC |
Version: 14.1 Version: 13.1 Version: 13.0 Version: 13.1-FIPS Version: 12.1-FIPS Version: 12.1-NDcPP |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:35:13.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NetScaler ADC\u202f", "vendor": "Cloud Software Group", "versions": [ { "lessThan": "12.35", "status": "affected", "version": "14.1", "versionType": "patch" }, { "lessThan": "51.15", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "92.21", "status": "affected", "version": "13.0 ", "versionType": "patch" }, { "lessThan": "37.176", "status": "affected", "version": " 13.1-FIPS", "versionType": "patch" }, { "lessThan": "55.302", "status": "affected", "version": "12.1-FIPS", "versionType": "patch" }, { "lessThan": "55.302", "status": "affected", "version": "12.1-NDcPP", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cb\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and\u0026nbsp;\u003c/span\u003e\u003c/b\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cb\u003eOut-Of-Bounds Memory Read\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and\u00a0Out-Of-Bounds Memory Read\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-10T17:29:28.138Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2023-6549", "datePublished": "2024-01-17T20:15:53.345Z", "dateReserved": "2023-12-06T11:01:58.256Z", "dateUpdated": "2024-08-02T08:35:13.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6548
Vulnerability from cvelistv5
Published
2024-01-17 20:11
Modified
2024-08-02 08:35
Severity ?
EPSS score ?
Summary
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cloud Software Group | NetScaler ADC |
Version: 14.1 Version: 13.1 Version: 13.0 Version: 13.1-FIPS Version: 12.1-FIPS Version: 12.1-NDcPP |
||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:14.1:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "14.1-12.35", "status": "affected", "version": "14.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "13.1-51.15", "status": "affected", "version": "13.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "13.0-92.21", "status": "affected", "version": "13.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:fips:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "13.1-37.176", "status": "affected", "version": "13.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:fips:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "12.1-55.302", "status": "affected", "version": "12.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:ndcpp:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "12.1-55.302", "status": "affected", "version": "12.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_gateway:14.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_gateway", "vendor": "citrix", "versions": [ { "lessThan": "14.1-12.35", "status": "affected", "version": "14.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_gateway:13.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_gateway", "vendor": "citrix", "versions": [ { "lessThan": "13.1-51.15", "status": "affected", "version": "13.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_gateway:13.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_gateway", "vendor": "citrix", "versions": [ { "lessThan": "13.0-92.21", "status": "affected", "version": "13.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-6548", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-18T14:00:57.375485Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-01-17", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-6548" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T17:14:26.335Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:35:14.029Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NetScaler ADC\u202f", "vendor": "Cloud Software Group", "versions": [ { "lessThan": "12.35", "status": "affected", "version": "14.1", "versionType": "patch" }, { "lessThan": "51.15", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "92.21", "status": "affected", "version": "13.0 ", "versionType": "patch" }, { "lessThan": "37.176", "status": "affected", "version": " 13.1-FIPS", "versionType": "patch" }, { "lessThan": "55.302", "status": "affected", "version": "12.1-FIPS", "versionType": "patch" }, { "lessThan": "55.302", "status": "affected", "version": "12.1-NDcPP", "versionType": "patch" } ] }, { "defaultStatus": "unaffected", "product": "NetScaler Gateway", "vendor": "Cloud Software Group", "versions": [ { "lessThan": "12.35", "status": "affected", "version": "14.1", "versionType": "patch" }, { "lessThan": "51.15", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "92.21", "status": "affected", "version": "13.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper Control of Generation of Code (\u0027Code Injection\u0027) in NetScaler ADC and NetScaler Gateway\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eallows an attacker with\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;access\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;to NSIP, CLIP or SNIP with management interface to perform\u003c/span\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAuthenticated (low privileged) remote code execution on Management Interface.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e" } ], "value": "Improper Control of Generation of Code (\u0027Code Injection\u0027) in NetScaler ADC and NetScaler Gateway\u00a0allows an attacker with\u00a0access\u00a0to NSIP, CLIP or SNIP with management interface to perform\u00a0Authenticated (low privileged) remote code execution on Management Interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T01:12:54.917Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2023-6548", "datePublished": "2024-01-17T20:11:18.462Z", "dateReserved": "2023-12-06T11:01:54.643Z", "dateUpdated": "2024-08-02T08:35:14.029Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }