• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

You are here: Home / Cyber Security News / Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions.

The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0

It has been described as a case of improper privilege management that could result in authenticated privilege escalation if the NetScaler Console Agent is deployed and allows an attacker to execute post-compromise actions.

“The issue arises due to inadequate privilege management and could be exploited by an authenticated malicious actor to execute commands without additional authorization,” Netscaler noted.

“However, only authenticated users with existing access to the NetScaler Console can exploit this vulnerability, thereby limiting the threat surface to only authenticated users.”

The shortcoming affects the below versions –

  • NetScaler Console 14.1 before 14.1-38.53
  • NetScaler Console 13.1 before 13.1-56.18
  • NetScaler Agent 14.1 before 14.1-38.53
  • NetScaler Agent 13.1 before 13.1-56.18

It has been remediated in the below versions of the software –

  • NetScaler Console 14.1-38.53 and later releases
  • NetScaler Console 13.1-56.18 and later releases of 13.1
  • NetScaler Agent 14.1-38.53 and later releases
  • NetScaler Agent 13.1-56.18 and later releases of 13.1

“Cloud Software Group strongly urges customers of NetScaler Console and NetScaler Agent to install the relevant updated versions as soon as possible,” the company said, adding there are no workarounds to resolve the flaw.

That said, customers who are using Citrix-managed NetScaler Console Service do not need to take any action.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Microsoft Patches Actively Exploited CVE-2025-21355 RCE Vulnerability in Bing
Next Post: Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
  • 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub
  • FedRAMP at Startup Speed: Lessons Learned
  • Water Curse Hijacks 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign
  • Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

Copyright © 2025 · AllTech.News, All Rights Reserved.