Citrix NetScaler bug protection: Close all active sessions, says Mandiant

Mandiant Consulting advised security teams that only applying the patch that was released to fix a recent Citrix NetScaler ADC and Gateway vulnerability was not enough — they need to close all active sessions to ensure that the vulnerable code is not resident in memory.    The vulnerability — CVE-2023-4966, which is rated a critical 9.4 by Citrix — lets attackers steal the token of recently connected users, allowing the attacker to gain access to whatever resources the user has permissions to access in Citrix.

Source: SC Magazine

 


Date:

Categorie(s):