{"id":174259565,"date":"2023-10-23T15:56:15","date_gmt":"2023-10-23T15:56:15","guid":{"rendered":"https:\/\/www.netscaler.com\/blog\/?p=174259565"},"modified":"2023-11-20T05:43:09","modified_gmt":"2023-11-20T05:43:09","slug":"cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway","status":"publish","type":"post","link":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/","title":{"rendered":"CVE-2023-4966: Critical security update now available for NetScaler ADC and NetScaler Gateway"},"content":{"rendered":"\n<p>On October 10, 2023, Cloud Software Group released builds to fix CVE-2023-4966, which affects NetScaler ADC and NetScaler Gateway. If exploited, CVE-2023-4966 can result in unauthorized data disclosure. This vulnerability was discovered by our internal team, and at the time of disclosure, we were not aware of any exploits in the wild.&nbsp;<\/p>\n\n\n\n<p>We now have reports of incidents consistent with session hijacking, and have received credible reports of targeted attacks exploiting this vulnerability.<\/p>\n\n\n\n<p>You can find details in the <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a>.&nbsp;<\/p>\n\n\n\n<p>If you are using affected builds and have configured NetScaler ADC as a gateway (VPN virtual server, ICA proxy, CVPN, RDP proxy) or as an AAA\u202fvirtual\u202fserver, we strongly recommend that you <em>immediately<\/em> <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">install the recommended builds<\/a> because this vulnerability has been identified as critical. No workarounds are available for this vulnerability.<\/p>\n\n\n\n<p>In both this communication and the related <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a>, we are sharing limited technical details to protect our customers from exploits leveraging this vulnerability within NetScaler to conduct session hijacking of other systems.<\/p>\n\n\n\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) has added an <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">entry for CVE-2023-4966<\/a> to its Known Exploited and Vulnerabilities Catalog, which contains detection and mitigation guidance for observed exploitations of CVE-2023-4966 by threat actors against NetScaler ADC and NetScaler Gateway. Additionally, Mandiant has <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/remediation-netscaler-adc-gateway-cve-2023-4966\" target=\"_blank\" rel=\"noreferrer noopener\">provided guidance<\/a>. If you are a Citrix-managed cloud service or Citrix-managed Adaptive Authentication customer, no action is required. This guidance applies to customer-managed NetScaler ADC or NetScaler Gateway only.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recommended next steps<\/h2>\n\n\n\n<p>If you are using any of the affected builds listed in the <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a>, you should update&nbsp; immediately by installing the recommended builds. In addition, we also recommend killing all active and persistent sessions using the following commands:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>kill icaconnection -all\n\nkill rdp connection -all\n\nkill pcoipConnection -all\n\nkill aaa session -all\n\nclear lb persistentSessions<\/code><\/pre>\n\n\n\n<p><em><strong>Note: <\/strong>Please ensure that the formatting remains intact as you copy and paste these commands.<\/em><\/p>\n\n\n\n<p>If you are using NetScaler ADC or NetScaler Gateway instances on SDX hardware, you will need to upgrade VPX instances (the underlying SDX hardware, itself, is not affected).&nbsp;<\/p>\n\n\n\n<p>NetScaler ADC and NetScaler Gateway appliances that are <strong><em>not <\/em><\/strong>configured as a gateway (VPN virtual server, ICA proxy, CVPN, or RDP proxy) or as an<em> <\/em>AAA virtual\u202fserver (traditional load balancing configurations, for example) and related products such as NetScaler Application Delivery Management (ADM) and Citrix SD-WAN are <strong><em>not<\/em><\/strong> affected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Update installation<\/h3>\n\n\n\n<p>Permanent fixes are available to download for NetScaler ADC and NetScaler Gateway:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.citrix.com\/downloads\/citrix-adc\/\" target=\"_blank\" rel=\"noreferrer noopener\">Update NetScaler ADC&nbsp;<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.citrix.com\/downloads\/citrix-gateway\/\" target=\"_blank\" rel=\"noreferrer noopener\">Update NetScaler Gateway<\/a><\/li>\n<\/ul>\n\n\n\n<p>For an overview of the steps to identify and remediate vulnerable NetScaler ADCs through NetScaler Application Delivery Management (formerly Citrix ADM), please <a href=\"https:\/\/www.youtube.com\/watch?v=aKcWZPcbTjo\" target=\"_blank\" rel=\"noreferrer noopener\">watch this video<\/a>.<\/p>\n\n\n\n<p>We recommend following the <a href=\"https:\/\/docs.citrix.com\/en-us\/citrix-adc-secure-deployment.html\" target=\"_blank\" rel=\"noreferrer noopener\">NetScaler secure configuration and deployment guide<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learn more and stay up to date<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">Read the security bulletin<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/support.citrix.com\/user\/alerts\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up for security bulletin notifications<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc-secure-deployment.html\" target=\"_blank\" rel=\"noreferrer noopener\">Consult the best practices deployment guide<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Technical assistance<\/h2>\n\n\n\n<p>NetScaler and Citrix are both business units of Cloud Software Group, and we share the same ticketing system. If you encounter issues when you are updating your affected builds, please <a href=\"https:\/\/www.citrix.com\/support\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact Citrix Customer Support<\/a>, irrespective of whether your product includes NetScaler branding or Citrix branding.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FAQs<\/h2>\n\n\n\n<p><strong>As a NetScaler customer, what should I do now?<br><\/strong>Exploits of this vulnerability have been reported. If you are using the affected builds of NetScaler ADC and NetScaler Gateway, we strongly urge you to install the updated builds as soon as possible, as instructed in the <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a>.<\/p>\n\n\n\n<p><strong>When did Mandiant discover the incident and report it to Cloud Software Group?<br><\/strong>Mandiant reported an apparent exploitation of the vulnerability to Cloud Software Group after our October 10 disclosure of CVE-2023-4966. As Mandiant conducted intrusion investigations after October 10, Mandiant discovered evidence that resulted in its public report on October 17 that the zero-day exploitation occurred in late August 2023.<\/p>\n\n\n\n<p><strong>What is the impact of this vulnerability?<br><\/strong>An unauthenticated attacker can perform unauthorized data disclosure and possibly session hijacking. Please <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">refer to the security bulletin<\/a>.<\/p>\n\n\n\n<p><strong>Is Cloud Software Group planning to deliver a code fix?<br><\/strong>Yes, Cloud Software Group has delivered a code fix. Please <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">refer to the security bulletin<\/a>.<\/p>\n\n\n\n<p><strong>Is there a workaround or mitigation that I can use instead of updating?<br><\/strong>No workarounds or mitigations are available beyond upgrading to a build that addresses the vulnerability as described in the <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>How urgent is it for me to fix my deployment?<\/strong><strong><br><\/strong>If you are using an affected build, we urge you to install the recommended updates <em>immediately,<\/em> as this vulnerability has been identified as critical. We are aware of targeted attacks in the wild using this vulnerability.<\/p>\n\n\n\n<p><strong>Does this vulnerability affect only on-premises deployments or are cloud services also impacted?<\/strong><strong><br><\/strong>This bulletin only applies to customer-managed NetScaler ADC and NetScaler Gateway appliances. Customers using Citrix-managed cloud services or Citrix-managed Adaptive Authentication do not need to take any action.<\/p>\n\n\n\n<p><strong>Can I fix this vulnerability using NetScaler Web Application Firewall signatures?<\/strong><strong><br><\/strong>No, it is not possible to fix the vulnerability with NetScaler Web Application Firewall signatures.<\/p>\n\n\n\n<p><strong>How will I know if my device is already compromised?<\/strong><strong><br><\/strong>Cloud Software Group is unable to provide forensic analysis to determine if a system may have been compromised.<\/p>\n\n\n\n<p><strong>What is the CVSS score for this issue?<\/strong><strong><br><\/strong>The CVSS score of CVE-2023-4966 is 9.4.&nbsp;<\/p>\n\n\n\n<p><strong>Are there additional details on the NetScaler ADC and NetScaler Gateway vulnerability that are not in the security bulletin?<br><\/strong>No. Cloud Software Group is limiting information to the details contained in its <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>Does Cloud Software Group provide forensic analysis?<\/strong>Cloud Software Group is unable to provide forensic analysis to determine if a system may have been compromised.<\/p>\n\n\n\n<p><strong>Why did Cloud Software Group not reach out directly to me in advance?<br><\/strong>To best protect all of our customers, Cloud Software Group releases security bulletins to customers and the public simultaneously. This is standard industry practice to ensure that all customers can upgrade as soon as possible. We provided notifications to customers who had signed up to receive security bulletins. If you are not receiving NetScaler security bulletins, <a href=\"https:\/\/support.citrix.com\/user\/alerts\" target=\"_blank\" rel=\"noreferrer noopener\">update your support alert settings.&nbsp;<\/a><\/p>\n\n\n\n<p><strong>How can I get support?<br><\/strong>If you encounter any issues during your update, please <a href=\"https:\/\/www.citrix.com\/support\/open-a-support-case\" target=\"_blank\" rel=\"noreferrer noopener\">contact Citrix Customer Support<\/a>. NetScaler and Citrix are both business units of Cloud Software Group, and we share the same ticketing system.<\/p>\n\n\n\n<p><strong>Where can I learn more about this vulnerability?<br><\/strong>You can find more details in the <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a><\/p>\n\n\n\n<p><strong>How do I stay up to date on the latest security updates?<\/strong><strong><br><\/strong><a href=\"https:\/\/support.citrix.com\/user\/alerts\">Sign up for security bulletin notifications<\/a>.<\/p>\n\n\n\n<p><strong>How do I learn more about reporting any potential security vulnerabilities?<br><\/strong>Cloud Software Group welcomes input regarding the security of its products and takes any potential vulnerabilities seriously. For details on our vulnerability response process and guidance on how to report security-related issues to Cloud Software Group, please <a href=\"https:\/\/www.citrix.com\/about\/trust-center\/vulnerability-process.html\" target=\"_blank\" rel=\"noreferrer noopener\">visit our trust center<\/a>.<\/p>\n\n\n\n<p>Cloud Software Group is committed to incorporating your feedback as we adapt our communication and customer support offerings. To provide feedback, <a href=\"https:\/\/www.citrix.com\/support\/open-a-support-case\" target=\"_blank\" rel=\"noreferrer noopener\">contact Citrix Customer Support<\/a>.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On October 10, 2023, Cloud Software Group released builds to fix CVE-2023-4966, which affects NetScaler ADC and NetScaler Gateway. If exploited, CVE-2023-4966 can result in unauthorized data disclosure. This vulnerability was discovered by our internal team, and at the time of disclosure, we were not aware of any exploits in the wild.&nbsp; We now have [&hellip;]<\/p>\n","protected":false},"author":1003,"featured_media":174259568,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[8],"tags":[41],"class_list":{"0":"post-174259565","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-application-security","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVE-2023-4966: NetScaler Critical Security Update Now Available<\/title>\n<meta name=\"description\" content=\"CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2023-4966: NetScaler Critical Security Update Now Available\" \/>\n<meta property=\"og:description\" content=\"CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\" \/>\n<meta property=\"og:site_name\" content=\"NetScaler Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-23T15:56:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-20T05:43:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anil Shetty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:site\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anil Shetty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\"},\"author\":{\"name\":\"Anil Shetty\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59\"},\"headline\":\"CVE-2023-4966: Critical security update now available for NetScaler ADC and NetScaler Gateway\",\"datePublished\":\"2023-10-23T15:56:15+00:00\",\"dateModified\":\"2023-11-20T05:43:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\"},\"wordCount\":1155,\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png\",\"keywords\":[\"Application security\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\",\"name\":\"CVE-2023-4966: NetScaler Critical Security Update Now Available\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png\",\"datePublished\":\"2023-10-23T15:56:15+00:00\",\"dateModified\":\"2023-11-20T05:43:09+00:00\",\"description\":\"CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png\",\"width\":1200,\"height\":628,\"caption\":\"CVE-2023-4966 NetScaler Critical Security Update Now Available\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netscaler.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2023-4966: Critical security update now available for NetScaler ADC and NetScaler Gateway\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"name\":\"NetScaler Blog\",\"description\":\"Application delivery and security blog\",\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\",\"name\":\"NetScaler Blog\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"width\":2032,\"height\":486,\"caption\":\"NetScaler Blog\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NetScaler\",\"https:\/\/www.linkedin.com\/company\/netscaler\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59\",\"name\":\"Anil Shetty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g\",\"caption\":\"Anil Shetty\"},\"url\":\"https:\/\/www.netscaler.com\/blog\/author\/anil-shettycloud-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2023-4966: NetScaler Critical Security Update Now Available","description":"CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2023-4966: NetScaler Critical Security Update Now Available","og_description":"CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.","og_url":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/","og_site_name":"NetScaler Blog","article_published_time":"2023-10-23T15:56:15+00:00","article_modified_time":"2023-11-20T05:43:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png","type":"image\/png"}],"author":"Anil Shetty","twitter_card":"summary_large_image","twitter_creator":"@NetScaler","twitter_site":"@NetScaler","twitter_misc":{"Written by":"Anil Shetty","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#article","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/"},"author":{"name":"Anil Shetty","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59"},"headline":"CVE-2023-4966: Critical security update now available for NetScaler ADC and NetScaler Gateway","datePublished":"2023-10-23T15:56:15+00:00","dateModified":"2023-11-20T05:43:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/"},"wordCount":1155,"publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png","keywords":["Application security"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/","url":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/","name":"CVE-2023-4966: NetScaler Critical Security Update Now Available","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png","datePublished":"2023-10-23T15:56:15+00:00","dateModified":"2023-11-20T05:43:09+00:00","description":"CVE-2023-4966 affects NetScaler ADC and NetScaler Gateway and, if exploited, could result in unauthorized data disclosure. Learn more.","breadcrumb":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#primaryimage","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update.png","width":1200,"height":628,"caption":"CVE-2023-4966 NetScaler Critical Security Update Now Available"},{"@type":"BreadcrumbList","@id":"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netscaler.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CVE-2023-4966: Critical security update now available for NetScaler ADC and NetScaler Gateway"}]},{"@type":"WebSite","@id":"https:\/\/www.netscaler.com\/blog\/#website","url":"https:\/\/www.netscaler.com\/blog\/","name":"NetScaler Blog","description":"Application delivery and security blog","publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.netscaler.com\/blog\/#organization","name":"NetScaler Blog","url":"https:\/\/www.netscaler.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","width":2032,"height":486,"caption":"NetScaler Blog"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NetScaler","https:\/\/www.linkedin.com\/company\/netscaler\/"]},{"@type":"Person","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59","name":"Anil Shetty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g","caption":"Anil Shetty"},"url":"https:\/\/www.netscaler.com\/blog\/author\/anil-shettycloud-com\/"}]}},"featured_image_src":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update-600x400.png","featured_image_src_square":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/CVE-2023-4966-NetScaler-Critical-Security-Update-600x600.png","author_info":{"display_name":"Anil Shetty","author_link":"https:\/\/www.netscaler.com\/blog\/author\/anil-shettycloud-com\/"},"_links":{"self":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174259565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/users\/1003"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/comments?post=174259565"}],"version-history":[{"count":0,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174259565\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media\/174259568"}],"wp:attachment":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media?parent=174259565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/categories?post=174259565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/tags?post=174259565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}