SecurNerd
    What's Hot

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    SecurNerd
    • Home
    • AI
    • General News
    • Science
    • Tech
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cybersecurity»Unpatched Citrix Servers Remain Vulnerable to CVE-2023-3519 RCE Attacks: Over 15,000 at Risk
    Cybersecurity

    Unpatched Citrix Servers Remain Vulnerable to CVE-2023-3519 RCE Attacks: Over 15,000 at Risk

    securnerdBy securnerdJuly 25, 2023Updated:July 25, 202303 Mins Read16 Views
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Reddit Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The cybersecurity world was shaken as Shadowserver Foundation, a cyber threat intelligence organization, disclosed that more than 15,000 Citrix servers remain vulnerable to a critical remote code execution (RCE) attack due to an unauthenticated critical RCE bug, tracked as CVE-2023-3519. This flaw was previously exploited by cybercriminals to inject a web shell into an integral infrastructure organization’s NetScaler ADC, leading to exfiltration of active directory (AD) data.

    The foundation’s researchers noted that even with the effectiveness of network segmentation controls in preventing lateral movement of threat actors to the domain controller, the security risk remains significant. In response to the situation, the Cybersecurity and Infrastructure Security Agency (CISA) has released a cybersecurity advisory (CSA) echoing this concern.

    According to the Shadowserver Foundation, “Any instance that still displays version hashes can be assumed to be unupdated and potentially vulnerable.” The foundation further acknowledged the likelihood of undercounting the vulnerability, as revisions known to be susceptible but without version hashes have not been counted in the total number of exposed servers.

    In an effort to address the growing cybersecurity threat, Citrix released security updates on July 18th, stating that “exploits of CVE-2023-3519 on unmitigated appliances have been observed.” The company is urging its customers to apply these patches promptly to prevent potential exploitation. The firm further noted that unpatched Netscaler appliances that serve as gateways (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or authentication virtual servers (AAA server) are particularly susceptible to attacks.

    Earlier in July, an advertisement for the CVE-2023-3519 RCE zero-day appeared on a hacker forum, sparking speculation that the flaw was being marketed online. BleepingComputer confirmed that Citrix had been alerted to the advertisement and was working on a patch even before the official disclosure.

    In addition to addressing CVE-2023-3519, Citrix simultaneously patched two other high-severity vulnerabilities, CVE-2023-3466 and CVE-2023-3467. The former enables attackers to execute reflected cross-site scripting (XSS) attacks, while the latter allows privilege escalation to root permissions. However, the latter requires authenticated access to the vulnerable appliances’ management interface via an IP or a SubNet IP (SNIP) address, limiting its potential impact.

    Responding to these cybersecurity threats, CISA has directed U.S. federal agencies to fortify their Citrix servers against further attacks by August 9th, following a security breach at a U.S. critical infrastructure organization traced back to the CVE-2023-3519 flaw. “The webshell enabled the actors to perform discovery on the victim’s active directory (AD) and collect and exfiltrate AD data. The actors attempted to move laterally to a domain controller but network-segmentation controls for the appliance blocked movement,” CISA said in a separate advisory.

    Trending
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    securnerd
    • Website
    • Facebook
    • Twitter
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Top Posts

    Apple Takes Stand Against U.K. Surveillance Proposals, Considers Withdrawal of iMessage and FaceTime Services

    July 22, 20232,637 Views

    Apple’s Market Value Skyrockets by $71 Billion Amid Speculation of In-house ‘Apple GPT’ to Challenge OpenAI

    July 23, 2023894 Views

    Android Malware Developers Utilize Stealthy APK Compression to Bypass Detection Measures

    August 20, 2023810 Views

    Apple Store Blocks Twitter’s iOS App Rebranding to ‘X’ Due to Minimum Character Regulations

    July 29, 2023760 Views
    Don't Miss
    2 Mins Read

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    By securnerdDecember 8, 2023

    Google recently unveiled Gemini, its latest suite of powerful AI models, but the tech giant…

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 2023
    Stay In Touch
    • Facebook
    • Twitter
    • Instagram
    • LinkedIn
    • Telegram
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Popular Post

    Microsoft’s Ongoing Struggles with Cybersecurity: A $2.4 Trillion Giant’s Failures

    September 23, 20231 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20231 Views

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 20231 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20232 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20232 Views

    Nigerian Man Admits Guilt in $6 Million Business Email Compromise Scheme

    September 24, 20233 Views

    Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response

    October 23, 20233 Views

    Meta Introduces Ad-Free Subscriptions in Europe, Adapting to Privacy Regulations

    October 31, 20234 Views

    Ukraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies

    August 10, 20235 Views

    Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

    September 20, 20235 Views
    Facebook Twitter Instagram LinkedIn Telegram
    © 2023 SecurNerd. Powered by Codelivly.

    Type above and press Enter to search. Press Esc to cancel.