CVE-2018-5314 - Authentication Bypass Vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway

Related Vulnerabilities: CVE-2018-5314  

Description of Problem

A vulnerability has been identified in the management interface of Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway that, if exploited, could allow an unauthenticated attacker with access to the NetScaler management interface to bypass authentication controls and execute arbitrary, read only commands on the NetScaler appliance.

This vulnerability has been assigned the following CVE number:

  • CVE-2018-5314: Authentication Bypass Vulnerability in Citrix NetScaler ADC and NetScaler Gateway Management Interface

This vulnerability affects the following product versions:

  • Citrix NetScaler ADC and NetScaler Gateway version 12.0 builds 41.16, 41.22, 41.24, 51.24 & 53.6
  • Citrix NetScaler ADC and NetScaler Gateway version 11.1 builds 51.21, 51.26, 52.13, 53.11, 54.14, 54.16 & 55.10
  • Citrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.12 

This vulnerability also affects the NetScaler Load Balancing instance distributed with Citrix NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition version 9.3.0


Mitigating Factors

In order to exploit this vulnerability, an attacker would require access to the management interface of the NetScaler. In situations where customers have deployed their NetScaler ADC and NetScaler Gateway appliances in line with industry best practice, network access to this interface should already be restricted.


What Customers Should Do

This vulnerability has been addressed in the following versions of Citrix NetScaler ADC and NetScaler Gateway:

  • Citrix NetScaler ADC and NetScaler Gateway version 12.0 build 53.13 and later
  • Citrix NetScaler ADC and NetScaler Gateway version 11.1 build 55.13 and later
  • Citrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.16 and later
  • Citrix NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition version 9.3.1 and later

Citrix recommends that customers impacted by this vulnerability upgrade to a version of the Citrix NetScaler ADC, NetScaler Gateway and NetScaler SD-WAN/Cloudbridge that contains a fix for this issue as soon as possible.

These versions are available on the Citrix website at the following addresses:

https://www.citrix.com/downloads/netscaler-adc/

https://www.citrix.com/downloads/netscaler-gateway/

https://www.citrix.com/downloads/netscaler-sd-wan/

In line with industry best practice, Citrix also recommends that customers limit access to the management interface to trusted traffic only. Citrix has published additional guidance on the secure configuration of NetScaler management interfaces. This can be found at the following location:

https://support.citrix.com/article/CTX228148


Acknowledgements

Citrix thanks xcuter, blankcon, nullbr4in, loupos, koredge of NAVER BUSINESS PLATFORM - IT Security (https://www.nbp-corp.com) for working with us to protect Citrix customers


What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/.


Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at https://www.citrix.com/support/open-a-support-case.html


Reporting Security Vulnerabilities

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – Reporting Security Issues to Citrix


Changelog

Date  Change
28th February 2018  Initial publishing