🚨⚠️IMPORTANT: High Severity vulnerabilities affecting Citrix ADC/NetScaler⚠️🚨
Dear Customer,
Citrix just released a security advisory identifying two security vulnerabilities affecting Citrix ADC/NetScaler.
Affected Versions
The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities:
Note: NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are now End Of Life (EOL) and are vulnerable. Customers are recommended to upgrade their appliances to one of the supported versions that address the vulnerabilities.
Customers can determine if they have an appliance configured as one of the following by inspecting their ns.conf file for the specified strings
Recommended by LinkedIn
CVE-2024-8535:
Customers can determine if they have an appliance configured as one of the following by inspecting their ns.conf file for the specified strings
In addition, upon upgrading to the fixed version, customers must perform the shell commands mentioned below: nsapimgr_wr.sh -ys call=ns_aaa_flush_kerberos_tickets
Note: In case of High Availability (HA) or Cluster setup of the NetScaler appliances, the above operation should be performed after upgrading all the appliances.
Should you require assistance upgrading your NetScaler/ADC instances or anything else, please feel free to contact us at support@thintech.co.uk
More details on the link below: