Global NewsHigh Priority (9/10)

Critical Citrix NetScaler Vulnerability Under Active Exploitation Less Than a Week After Disclosure

Security researchers warn that in-the-wild exploitation of a critical Citrix NetScaler vulnerability has begun, with evidence of attacks starting within days of public disclosure.

Key Points

  • Critical Citrix NetScaler vulnerability now being exploited in the wild
  • Flaw allows memory leakage to obtain authenticated administrative session IDs
  • Exploitation evidence dates back to March 27, just days after disclosure
  • Compared to infamous CitrixBleed and CitrixBleed2 vulnerabilities

Full Details

In-the-wild exploitation of a critical-severity Citrix NetScaler vulnerability has started less than a week after public disclosure, according to attack surface management firm WatchTowr. The critical flaw allows attackers to leak application memory and can be exploited to obtain authenticated administrative session IDs. Immediately after Citrix disclosed the security defect, WatchTowr warned that threat actors would likely start exploiting it shortly and compared it with the infamous CitrixBleed and CitrixBleed2 bugs that have been heavily exploited in the past. The vulnerability covers multiple memory overread issues that can be exploited using crafted requests to leak sensitive memory from the application. According to WatchTowr, evidence suggests that in-the-wild exploitation of vulnerable NetScaler instances started by at least March 27, just days after the vulnerability became public.

Why It Matters

The rapid exploitation of Citrix NetScaler vulnerabilities following disclosure highlights the need for extremely fast patching cycles for network infrastructure devices, as threat actors actively monitor for new vulnerabilities.

Sourcesecurityweek.com

Get stories like this delivered daily

AI-curated news, personalized to your interests. Zero noise.

Start 7-Day Free Trial →

More in Global News