The threat landscape has been intensified due to the recent disclosure of critical vulnerabilities affecting Citrix NetScaler. The two disclosed vulnerabilities, CVE-2024-8534 and CVE-2024-8535, were announced in November 2024. A surge in brute-force attacks is currently targeting Citrix NetScaler devices across various organizations, as attackers are exploiting misconfigured and outdated systems. CVE-2024-8534 is a memory safety flaw that may cause memory corruption and denial of service, while CVE-2024-8535 allows authenticated users to access unintended capabilities due to a race condition. As revealed by Ethan Fite, the Director of Managed Services Operations at Cyderes, the attackers are using a distributed brute-force strategy where the IP addresses and Autonomous System Numbers (ASNs) are changed after each attempt. This makes it challenging for security teams to identify and mitigate these attacks. As reported by the German Federal Office for Information Security (BSI), the brute-force attacks are highly common, especially within the critical infrastructure sector and other international organizations. Cybersecurity professionals advises urgent measures to be taken by cutting off high-risk IP range belonging to the cloud company from Hong Kong and installing updates and upgrades in patches on the NetScaler box and checking configurations that point out to safe setting through Remote Desktop Protocol, also. Citrix already publishes the security updates fixing vulnerability issues, but some others, like 12.1 and 13.0, are unsupported today and remain vulnerable. Experts further recommend that geographic blocking, monitoring for unusual activity, and the prompt application of security patches be implemented to further protect systems. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also issued alerts on these vulnerabilities, highlighting the risks of exploitation. Organizations using Citrix NetScaler are advised to take swift action to protect their systems against these ongoing and evolving threats.
The Apache Software Foundation has issued a new security advisory detailing three vulnerabilities affecting Apache Kylin, a high-concurrency OLAP engine used widely in big data ana...
NVIDIA has released a critical security update to address several vulnerabilities discovered in its NVIDIA App software for Windows. These flaws, if exploited, could allow local at...
The security of the open-source supply chain was tested again when researchers from JFrog discovered a malicious PyPI package called SoopSocks (XRAY-725599). Ostensibly advertised ...