• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
NetScaler Blog

NetScaler Blog

Application delivery and security blog

Application delivery and security blog
  • Application delivery
  • Application and API security
  • Application modernization
  • Observability
  • News

CVE-2024-8534 and CVE-2024-8535: High severity security updates for NetScaler ADC and NetScaler Gateway 

November 21, 2024 by Anil Shetty

CVE-2024-8534 and CVE-2024-8535: Critical security updates for NetScaler ADC and NetScaler Gateway

On November 12, 2024, Cloud Software Group released builds to fix CVE-2024-8534 and CVE-2024-8535, which affect NetScaler ADC and NetScaler Gateway. 

CVE-2024-8534

This vulnerability is a memory safety vulnerability, and successful exploitation can lead to memory corruption and denial of service. In order for this vulnerability to be exploited any of the following conditions must be met:

  1. The ADC must be configured as a gateway (VPN vServer) and the RDP feature must be enabled
  2. The ADC must be configured as a gateway (VPN vServer) and the RDP Proxy Server Profile needs to be created and set to gateway (VPN vServer) 
  3. The ADC must be configured as an authentication server (AAA vServer) with the RDP feature enabled 

The CVSS score for this vulnerability is 8.4. 

By inspecting the ns.conf file for the specified strings, you can determine if you have an ADC configured as a gateway (VPN vServer or AAA vServer) with either the RDP feature enabled or an RDP Proxy Server Profile created:

A gateway (VPN Vserver) with the RDP feature enabled:

enable ns feature.*rdpproxy

add vpn vserver 

A gateway (VPN Vserver) with an RDP Proxy Server Profile created and set to the Gateway (VPN Vserver):

add rdp serverprofile

add vpn vserver 

An authentication server (AAA Vserver) with the RDP feature enabled:

enable ns feature.*rdpproxy

add authentication vserver

No mitigation is available for this vulnerability, so we strongly recommend that you immediately install the recommended builds if you’re using the affected builds.

CVE-2024-8535

This vulnerability arises due to a race condition leading to an authenticated user getting unintended user capabilities. In order for this vulnerability to be exploited, any of the following conditions must be met:

  1. The ADC must be configured as a gateway (SSL VPN, ICA Proxy, CVPN, or RDP Proxy) with KCDAccount configuration for Kerberos SSO to access backend resources.
  2. The ADC must be configured as an authentication server (AAA vServer) with KCDAccount configuration for Kerberos SSO to access backend resources.

 The CVSS score for this vulnerability is 5.8.

You can determine if you have an ADC with KCDAccount configuration for Kerberos SSO to access backend resources by inspecting the ns.conf file for the following string: 

add aaa kcdaccount

No mitigation is available for this vulnerability, so we strongly recommend that you immediately install the recommended builds if you’re using the affected builds.

Additionally, after upgrading to the fixed version, you must modify the device configuration to ensure that all previously created sessions are flushed out of system memory if the appliances have been configured in HA or cluster mode. Here’s the shell command to do that:

nsapimgr_wr.sh -ys call=ns_aaa_flush_kerberos_tickets

If NetScaler ADCs have been configured in HA mode, then the provided shell command must be executed in HA mode: first on the primary node and later on the secondary node.

If NetScaler ADCs have been configured in a cluster, then the provided shell command must be executed on each node post-upgrade.

For both CVE-2024-8534 and CVE 2024-8535, the following versions of NetScaler ADC and NetScaler Gateway are impacted:

  • NetScaler ADC and NetScaler Gateway 14.1 before 14.1-29.72
  • NetScaler ADC and NetScaler Gateway 13.1 before 13.1-55.34
  • NetScaler ADC 13.1-FIPS before 13.1-37.207
  • NetScaler ADC 12.1-FIPS before 12.1-55.321
  • NetScaler ADC 12.1-NDcPP before 12.1-55.321

Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the following updated versions as soon as possible.

  • NetScaler ADC  and NetScaler Gateway 14.1-29.72 and later releases
  • NetScaler ADC and NetScaler Gateway   13.1-55.34 and later releases of 13.1
  • NetScaler ADC 13.1-FIPS 13.1-37.207 and later releases of 13.1-FIPS  
  • NetScaler ADC 12.1-FIPS 12.1-55.321 and later releases of 12.1-FIPS  
  • NetScaler ADC 12.1-NDcPP 12.1-55.321 and later releases of 12.1-NDcPP 

You can find more details in the security bulletin. Additionally, please also refer to the updated NetScaler Security Advisory. 

Update installation

Download permanent fixes for NetScaler ADC and NetScaler Gateway

NetScaler and Citrix are both part of Cloud Software Group, and we share the same ticketing system. If you encounter issues when you are updating your affected builds, please contact Citrix Customer Support, irrespective of whether your product includes NetScaler branding or Citrix branding. 

Learn more and stay up to date

  • Read the security bulletin
  • Sign up for security bulletin notifications
  • Consult your TAM for enrolling in pre-notifications for security bulletins
  • See the NetScaler deployment best practices guide

Categories: News Tagged With: NetScaler security updates

Primary Sidebar

Popular posts

NetScaler Next-Gen API

Introducing NetScaler Next-Gen API: The declarative API for application developers 

June 17, 2024

Terraform provider for NetScaler SDX

Introducing the Terraform provider for NetScaler SDX

May 30, 2024

NetScaler now accepting GitHub community contributions

May 2, 2024

Introducing NetScaler CPX Express: A DevOps-friendly, free Kubernetes ingress proxy 

March 28, 2024

NetScaler: The power of one

NetScaler: The power of one

March 5, 2024

New utility converts NetScaler configurations into IaC for greater automation

New utility converts NetScaler configurations into IaC for greater automation

April 3, 2025

NetScaler 13.1-FIPS achieves NDcPP certification from NIAP and the CCCS

NetScaler 13.1-FIPS achieves NDcPP certification

February 27, 2025

CVE-2024-12284: High-severity security update for NetScaler Console

CVE-2024-12284: High-severity security update for NetScaler Console

February 18, 2025

Footer

Product resources

  • NetScaler editions
  • Integrations
  • Documentation
  • GitHub
  • Downloads

Support

  • Ask the community
  • Contact support

Company

  • NetScaler.com
  • About NetScaler
  • Contact us
  • Newsroom
  • Careers

  • Legal
  • Do not sell my personal information
  • Cookie preferences
© 2023 Cloud Software Group, Inc. All rights reserved.