CISA Urges Immediate Action on Critical Citrix Vulnerability, Recommends Attention to Second Bug

0
42

This week, two bugs in Citrix technology have caught the attention of the Cybersecurity and Infrastructure Security Agency (CISA). One of the vulnerabilities, labeled CVE-2023-6548, must be patched by federal agencies by January 24, while the other bug, labeled CVE-2023-6549, must be fixed by February 7. This quick fix timeline is unusual for CISA, but they have not provided a reason for the urgency.

The vulnerabilities are in Citrix‘s NetScaler ADC and NetScaler Gateway, which are used for managing network traffic and remote access. CISA issued a warning about these bugs after adding them to a catalog of known exploited vulnerabilities, and Citrix also released a bulletin addressing the issues.

CVE-2023-6548 is a code injection vulnerability, while CVE-2023-6549 allows attackers to overflow the memory buffer and take Citrix services offline. These vulnerabilities are similar to a previous vulnerability known as “Citrix Bleeding,” which was exploited by ransomware gangs in high-profile attacks on vulnerable devices exposed to the internet.

Eric Goldstein, CISA’s deputy executive director of cybersecurity, has warned over 300 entities about their exposure to these vulnerabilities. He used Boeing’s experience with the attacks as an example of how security teams should address vulnerability. CISA alerts, although directed at federal agencies, also serve as general warnings to the public.

The urgency of patching these vulnerabilities underscores the importance of staying up to date with cybersecurity measures and promptly addressing any known issues. It is crucial for organizations to prioritize security and take proactive measures to protect their systems from potential threats.

Citrix-bugs-immediate-attention-for-one”>Source link