Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Citrix Addresses High-Severity NetScaler Console Privilege Escalation Flaw


Citrix has released security updates to address a high-severity privilege escalation vulnerability in its NetScaler Console (formerly NetScaler ADM) and NetScaler Agent products, which could allow authenticated attackers to escalate privileges under certain conditions. Customers are advised to update their products as soon as possible due to the lack of workarounds available to address this vulnerability.

  • Citrix has released security updates to address a high-severity privilege escalation vulnerability in its NetScaler Console and NetScaler Agent products.
  • The vulnerability, CVE-2024-12284, carries a CVSS score of 8.8 and can be exploited by authenticated attackers with existing access to the NetScaler Console.
  • The issue is due to inadequate privilege management in the affected products, allowing malicious actors to execute commands without additional authorization.
  • Customers are advised to update their products as soon as possible, as there are currently no workarounds available to address this vulnerability.



  • Citrix has recently released security updates to address a high-severity privilege escalation vulnerability impacting its NetScaler Console (formerly NetScaler ADM) and NetScaler Agent products. The vulnerability, tracked as CVE-2024-12284, carries a CVSS score of 8.8 and is considered a significant threat due to the potential for authenticated attackers to escalate privileges under certain conditions.

    According to Citrix's advisory, the issue arises from inadequate privilege management in the affected products. This allows malicious actors with existing access to the NetScaler Console to execute commands without additional authorization, thereby exploiting their privileged position. However, it is worth noting that only authenticated users with existing access to the NetScaler Console can exploit this vulnerability, thereby limiting the threat surface to only those with legitimate credentials.

    Cloud Software Group, Citrix's parent company, has taken proactive measures to address this issue by releasing security updates for affected products. The updated versions include:

    * NetScaler Console 14.1-38.53 and later releases
    * NetScaler Console 13.1-56.18 and later releases of 13.1
    * NetScaler Agent 14.1-38.53 and later releases
    * NetScaler Agent 13.1-56.18 and later releases of 13.1

    Customers are strongly advised to update their products as soon as possible, as there are currently no workarounds available to address this vulnerability.

    The company emphasizes that configuring external authentication for the NetScaler Console is a recommended best practice to further mitigate the risk associated with this vulnerability. Additionally, the potential impact on self-managed NetScaler Console instances is considered minimal due to the deployment of the NetScaler Agent feature, which significantly reduces the blast radius.

    Pierluigi Paganini is a security researcher and the founder of Security Affairs, a website dedicated to providing news, analysis, and research on cybersecurity topics. He can be found on Twitter at @securityaffairs and Facebook at @SecurityAffairsOfficial.



    Related Information:

  • https://securityaffairs.com/174425/security/citrix-addressed-netscaler-console-privilege-escalation-flaw.html

  • https://nvd.nist.gov/vuln/detail/CVE-2024-12284

  • https://www.cvedetails.com/cve/CVE-2024-12284/


  • Published: Thu Feb 20 05:36:39 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us