CVSS 9.3CRITICAL
The severity rating is CRITICAL due to the high impact on data confidentiality, integrity, and availability. Real-world exploitability in both homelab and production environments is significant; patches are available but need to be thoroughly tested before deployment to ensure no disruptions occur.

A critical vulnerability has been identified in Citrix NetScaler ADC that impacts systems configured as a SAML Identity Provider (IDP). The vulnerability allows an attacker to exploit the system by sending crafted requests, potentially leading to unauthorized access and data breaches. This issue is particularly severe for environments where NetScalers are deployed as gateways or AAA virtual servers, which handle authentication and authorization processes. Engineers and sysadmins must prioritize patching their systems immediately to mitigate this risk. The broader security implications include the potential exposure of sensitive user data and compromise of network integrity.

Affected Systems
  • Citrix NetScaler ADC
Affected Versions: All versions before the latest update
Remediation
  • Apply the latest security patch from Citrix as per their official guidance at https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300.
  • Verify that the NetScaler is configured correctly by checking the IDP settings and ensuring no unauthorized access points exist.
  • Review network logs for any suspicious activity indicative of exploitation attempts.
Stack Impact

This vulnerability has a significant impact on common homelab stacks where Citrix NetScaler ADC is used as part of the infrastructure. Specifically, systems with SAML IDP configurations are at risk and need immediate attention to prevent unauthorized access.

Source →