Vulnerability Description
Unauthenticated remote code execution
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citrix | Netscaler Application Delivery Controller | >= 12.1, < 12.1-55.297 |
| Citrix | Netscaler Gateway | >= 13.0, < 13.0-91.13 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-ExeExploitThird Party AdvisoryVDB Entry
- https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-securVendor Advisory
- http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-ExeExploitThird Party AdvisoryVDB Entry
- https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-securVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-US Government Resource
FAQ
What is CVE-2023-3519?
CVE-2023-3519 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Unauthenticated remote code execution
How severe is CVE-2023-3519?
CVE-2023-3519 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-3519?
Check the references section above for vendor advisories and patch information. Affected products include: Citrix Netscaler Application Delivery Controller, Citrix Netscaler Gateway.