Article 4Y5SZ As attacks begin, Citrix ships patch for VPN vulnerability

As attacks begin, Citrix ships patch for VPN vulnerability

by
Sean Gallagher
from Ars Technica - All content on (#4Y5SZ)
GettyImages-1085875628-800x600.jpg

Enlarge (credit: Igor Golovniov/SOPA Images/LightRocket via Getty Images)

On January 19, Citrix released some permanent fixes to a vulnerability on the company's Citrix Application Delivery Controller (ADC) and Citrix Gateway virtual private network servers that allowed an attacker to remotely execute code on the gateway without needing a login. The vulnerability affects tens of thousands of known VPN servers, including at least 260 VPN servers associated with US federal, state, and local government agencies-including at least one site operated by the US Army.

The patches are for versions 11.1 and 12.0 of the products, formerly marketed under the NetScaler name. Other patches will be available on January 24. These patches follow instructions for temporary fixes the company provided to deflect the crafted requests associated with the vulnerability, which could be used by an attacker to gain access to the networks protected by the VPNs.

Fermin J. Serna, chief information security officer at Citrix, announced the fixes in a blog post on Sunday. At the same time, Serna revealed that the vulnerability-and the patches being released-also applied to Citrix ADC and Citrix Gateway Virtual Appliances hosted on virtual machines on all commercially available virtualization platforms, as well as those hosted in Azure, Amazon Web Services, Google Compute Platform, and Citrix Service Delivery Appliances (SDXs).

Read 5 remaining paragraphs | Comments

index?i=nnqNoWW4KR0:8An-Nxoe0Qc:V_sGLiPB index?i=nnqNoWW4KR0:8An-Nxoe0Qc:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments