Cybersecurity · · 1 min read

Cybersecurity Alert: Exploitation of Citrix Vulnerability CVE-2023-3519 by Threat Actors

Cybersecurity Alert: Exploitation of Citrix Vulnerability CVE-2023-3519 by Threat Actors

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory to alert network defenders about the exploitation of CVE-2023-3519, a remote code execution (RCE) vulnerability affecting NetScaler (formerly Citrix) Application Delivery Controller (ADC) and NetScaler Gateway. In June 2023, threat actors exploited this vulnerability as a zero-day to implant a webshell on a critical infrastructure organization’s non-production environment NetScaler ADC appliance.

The Exploit

The threat actors exploited the vulnerability to drop a webshell on the victim's ADC appliance. This enabled them to perform discovery on the victim’s active directory (AD) and collect and exfiltrate AD data. The actors attempted to move laterally to a domain controller but were blocked by network-segmentation controls for the appliance.

The victim organization identified the compromise and reported the activity to CISA and Citrix. Citrix released a patch for this vulnerability on July 18, 2023.

Recommendations

CISA encourages critical infrastructure organizations to use the detection guidance included in this advisory to determine system compromise. If potential compromise is detected, organizations should apply the incident response recommendations provided in this advisory. If no compromise is detected, organizations should immediately apply patches provided by Citrix.

Technical Details

The advisory provides detailed technical information about the threat actors’ activity, including the tactics, techniques, and procedures (TTPs) used, and detection methods shared with CISA by the victim. The advisory also provides a comprehensive list of MITRE ATT&CK tactics and techniques used by the threat actors.

Mitigations

CISA recommends all organizations to install the relevant updated version of NetScaler ADC and NetScaler Gateway as soon as possible. Organizations should follow best cybersecurity practices, including mandating phishing-resistant multifactor authentication (MFA) for all staff and for all services. As a longer-term effort, apply robust network-segmentation controls on NetScaler appliances, and other internet-facing devices.

Conclusion

This advisory serves as a reminder of the importance of maintaining up-to-date systems and implementing robust cybersecurity practices. Organizations are encouraged to review the advisory in detail and take the necessary steps to protect their systems and data.

Read next