Hackers Scan for Vulnerable Citrix ADC Systems

Weeks after Citrix revealed a critical vulnerability impacting its Application Delivery Controller (ADC) and Gateway products, hackers have started to scan the Internet for vulnerable systems, security researchers report.


Tracked as CVE-2019-19781 and featuring a CVSS score of 9.8, the vulnerability has existed since 2014. Exploitation could result in attackers gaining unauthorized access to internal network resources and executing arbitrary code.


“All supported versions of the product, and all supported platforms” are impacted by the security flaw, Positive Technologies, the company that discovered the bug, says. The affected products were previously known as NetScaler ADC and NetScaler Gateway.


On December 17, Citrix published its own security bulletin on this vulnerability, but hasn’t released a patch as of now. However, the company did publish a support article detailing configuration changes that organizations should make to mitigate the impact of this vulnerability.


Now, only three weeks later, security researchers are already observing online scans for vulnerable systems, as well as exploitation attempts targeting CVE-2019-19781.


“In my Citrix ADC honeypot, CVE-2019-19781 is being probed with attackers reading sensitive credential config files remotely using ../ directory traversal (a variant of this issue). So this is in the wild, active exploitation starting up,” security researcher Kevin Beaumont said on Twitter.


Johannes B. Ullrich, dean of research at the SANS Technology Institute, who also noticed that people are scanning for vulnerable systems, says the scans do not appear sophisticated. The source IPs scanning his honeypot are located on the networks of China M ..

Support the originator by clicking the read the rest link below.