CVE-2023-6548

Published Jan 17, 2024

Last updated 10 months ago

Overview

Description
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
Source
secure@citrix.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
Exploit added on
Jan 17, 2024
Exploit action due
Jan 24, 2024
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

nvd@nist.gov
CWE-94
secure@citrix.com
CWE-94

Social media

Hype score
Not currently trending

Configurations