fkie_cve-2024-12284
Vulnerability from fkie_nvd
Published
2025-02-20 00:15
Modified
2025-07-25 19:16
Severity ?
Summary
Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| citrix | netscaler_agent | * | |
| citrix | netscaler_agent | * | |
| citrix | netscaler_agent | 13.0-58.30 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 13.1 | |
| citrix | netscaler_console | 14.1 | |
| citrix | netscaler_console | 14.1 | |
| citrix | netscaler_console | 14.1 | |
| citrix | netscaler_console | 14.1 | |
| citrix | netscaler_console | 14.1 | |
| citrix | netscaler_console | 14.1 | |
| citrix | netscaler_console | 14.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:-:*:*:*",
"matchCriteriaId": "50F009DC-47A2-4366-81DF-A2F923BF93C3",
"versionEndExcluding": "13.1-56.18",
"versionStartIncluding": "13.1-4.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_agent:*:*:*:*:-:*:*:*",
"matchCriteriaId": "EAE55DAD-34F8-4B34-855D-D13BAFD4A133",
"versionEndExcluding": "14.1-38.53",
"versionStartIncluding": "14.1-4.42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_agent:13.0-58.30:*:*:*:-:*:*:*",
"matchCriteriaId": "A84CD230-F26C-4E2D-AA9C-70BB679FA896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build12.50:*:*:*:*:*:*",
"matchCriteriaId": "527D1878-0C2B-434F-A1D6-DF7A3D675A32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build17.42:*:*:*:*:*:*",
"matchCriteriaId": "838758F6-D771-4D0B-A546-749106C25C22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build21.53:*:*:*:*:*:*",
"matchCriteriaId": "DDAA78E3-0C5E-45BD-B533-D0B45D5CFB78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build24.38:*:*:*:*:*:*",
"matchCriteriaId": "11C375C3-9D70-415D-98AE-701781ED30B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build27.62:*:*:*:*:*:*",
"matchCriteriaId": "6B42BCE1-E54E-4200-B5DF-433CF305154E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build30.52:*:*:*:*:*:*",
"matchCriteriaId": "9B9CF88F-C690-4E1C-8E51-7BDAA28D3666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build33.50:*:*:*:*:*:*",
"matchCriteriaId": "6191E4B9-B834-45F2-BB15-A04D6EBAED95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build37.38:*:*:*:*:*:*",
"matchCriteriaId": "9D9E3754-72B5-435A-ADA0-BD2FFD7F2898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build4.43:*:*:*:*:*:*",
"matchCriteriaId": "B4F0BCBB-F395-4F00-B91C-287D39A87667",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build42.47:*:*:*:*:*:*",
"matchCriteriaId": "5ED3480C-D055-42C7-AAC1-6736606CACB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build45.61:*:*:*:*:*:*",
"matchCriteriaId": "F8075841-E12D-4C43-A1A2-BC5E6FFB7EB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build48.47:*:*:*:*:*:*",
"matchCriteriaId": "5E907D22-46A0-4C7F-94BF-8E9C186839CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build49.13:*:*:*:*:*:*",
"matchCriteriaId": "B20B6A3F-758D-4C7C-AAD3-619FD8FEA4C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build50.23:*:*:*:*:*:*",
"matchCriteriaId": "B46219C9-8BA8-472C-831F-5F65310BF579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build51.14:*:*:*:*:*:*",
"matchCriteriaId": "A1D23E60-E279-4BB8-AEFB-44F586A72D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build52.19:*:*:*:*:*:*",
"matchCriteriaId": "434E5007-D75E-42F4-B1EA-F909C073F741",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build53.22:*:*:*:*:*:*",
"matchCriteriaId": "CCDB957F-D87B-489B-A1E1-478A9A0E4591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build53.24:*:*:*:*:*:*",
"matchCriteriaId": "F0710246-66E7-429F-93E1-1A2EB3A32225",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build54.29:*:*:*:*:*:*",
"matchCriteriaId": "AEFD9728-312E-4E12-9B6A-1C5E0DF0851A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:13.1:build55.29:*:*:*:*:*:*",
"matchCriteriaId": "B37F4601-7314-43AA-AEA7-FEEB29F9CCB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:14.1:build12.34:*:*:*:*:*:*",
"matchCriteriaId": "7242C119-6545-41FF-9A0C-ECF51B52A6AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:14.1:build17.38:*:*:*:*:*:*",
"matchCriteriaId": "B5CD7FA6-9084-457B-BEB8-38BF4CBD4743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:14.1:build21.60:*:*:*:*:*:*",
"matchCriteriaId": "B88BABA6-7FB7-4D9D-AAF1-78A78FFA62A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:14.1:build25.53:*:*:*:*:*:*",
"matchCriteriaId": "E7BC70E9-5466-4A86-A21F-5AAF8BB4B1A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:14.1:build25.56:*:*:*:*:*:*",
"matchCriteriaId": "87A64984-3867-4336-970A-ABF9F1784A1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:14.1:build29.63:*:*:*:*:*:*",
"matchCriteriaId": "D6D997DC-A4E6-4D96-AA19-70186C4681DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:citrix:netscaler_console:14.1:build34.43:*:*:*:*:*:*",
"matchCriteriaId": "A2FA3D8F-AE48-4A08-8305-82E28F9F1055",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Authenticated privilege escalation in\u00a0NetScaler Console and NetScaler Agent allows."
},
{
"lang": "es",
"value": "La escalada de privilegios autenticado en NetScaler Console and NetScaler Agent permiten."
}
],
"id": "CVE-2024-12284",
"lastModified": "2025-07-25T19:16:00.603",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "ADJACENT",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "secure@citrix.com",
"type": "Secondary"
}
]
},
"published": "2025-02-20T00:15:19.360",
"references": [
{
"source": "secure@citrix.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.citrix.com/s/article/CTX692579-netscaler-console-and-netscaler-agent-security-bulletin-for-cve202412284?language=en_US"
}
],
"sourceIdentifier": "secure@citrix.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "secure@citrix.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…