{"id":174259578,"date":"2023-11-20T13:00:36","date_gmt":"2023-11-20T13:00:36","guid":{"rendered":"https:\/\/www.netscaler.com\/blog\/?p=174259578"},"modified":"2023-11-20T17:30:25","modified_gmt":"2023-11-20T17:30:25","slug":"netscaler-investigation-recommendations-for-cve-2023-4966","status":"publish","type":"post","link":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/","title":{"rendered":"NetScaler investigation recommendations for CVE-2023-4966\u00a0"},"content":{"rendered":"\n<p>On October 10, 2023, NetScaler published a security bulletin for CVE-2023-4966 \u2014 now dubbed by some as \u201cCitrixBleed\u201d&nbsp; \u2014 that affects customer-managed NetScaler ADC and NetScaler Gateway. This critical vulnerability was discovered by our internal team. At the time we published the security bulletin, we were unaware that this vulnerability had been exploited in the wild, and we recommended that customers upgrade as soon as possible to an updated version released simultaneously with the security bulletin to resolve this critical issue.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\">In the NetScaler blog post on CVE-2023-4966<\/a> published on October 23, 2023, we shared that the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Mandiant both reported that this vulnerability had been exploited by threat actors, leading to session hijacking. We also shared remediation guidance for clearing sessions immediately. We continued to encourage customers that had not patched to do so urgently. We also relayed important information concerning exploit reports from CISA and Mandiant.<\/p>\n\n\n\n<p>Until mid-October, we understood from public reporting and through very limited support cases that exploitation of CVE-2023-4966 was targeted and limited in nature. However, we learned of a concerning development when, on October 25, Shadowserver Foundation, a non-profit internet monitoring organization, posted on X (formerly known as Twitter) that there was a sharp increase in attempts to exploit this vulnerability in unpatched NetScaler ADCs.<\/p>\n\n\n\n<p>Now the media is reporting that the LockBit ransomware group is targeting unpatched NetScaler ADCs.&nbsp;<\/p>\n\n\n\n<p>We strongly urge NetScaler customers to review <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">the security bulletin<\/a>, <a href=\"https:\/\/www.netscaler.com\/blog\/news\/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway\/\">our October 23 blog post<\/a>, <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/11\/07\/cisa-releases-guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966\" target=\"_blank\" rel=\"noreferrer noopener\">CISA guidance<\/a>, and Mandiant\u2019s blogs on <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/remediation-netscaler-adc-gateway-cve-2023-4966\" target=\"_blank\" rel=\"noreferrer noopener\">remediation<\/a> and <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/session-hijacking-citrix-cve-2023-4966\" target=\"_blank\" rel=\"noreferrer noopener\">investigation<\/a>, and patch immediately.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Next step after upgrading<\/h2>\n\n\n\n<p>If you are using any of the affected builds listed in the <a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a>, you should upgrade immediately by installing the updated versions. After you upgrade, we recommend that you remove any active or persistent sessions using the following commands:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>kill aaa session -all\n\nkill icaconnection -all\n\nkill rdp connection -all\n\nkill pcoipConnection -all\n\nclear lb persistentSessions<\/code><\/pre>\n\n\n\n<p><em><strong>Note: <\/strong>Please ensure that the formatting remains intact as you copy and paste these commands.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Investigation recommendations<\/h2>\n\n\n\n<p>From our engagements with impacted customers, we\u2019re developing recommendations for investigations of exploits of CVE-2023-4966:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Look for patterns of suspicious session use in your organizations\u2019 monitoring and visibility tools, particularly relating to virtual desktops if you have these configured.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc\/current-release\/system\/audit-logging\/reliable-syslog#configuring-syslog-over-tcp-by-using-the-gui\" target=\"_blank\" rel=\"noreferrer noopener\">If you are forwarding NetScaler\u2019s logs<\/a> to a syslog server, review these for \u2018SSLVPN TCPCONNSTAT\u2019 logs that contain mismatching \u2018Client_ip\u2019 and \u2018Source\u2019 IP addresses. Note that there are legitimate scenarios where this might occur, such as a roaming user.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Review the \u2018SSLVPN TCPCONNSTAT\u2019 logs for the same \u2018Source\u2019 IP address accessing the sessions of multiple users (you can refer to the \u2018User\u2019 field in the log).<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Finally, if you are conducting your own forensic investigation on an unpatched instance, <a href=\"https:\/\/support.citrix.com\/article\/CTX207598\/how-to-generate-nsppe-core-dump-on-netscaler\" target=\"_blank\" rel=\"noreferrer noopener\">see NetScaler product documentation on collecting memory snapshots of the NSPPE process<\/a>. Note that this will require <a href=\"https:\/\/support.citrix.com\/article\/CTX207598\/how-to-generate-nsppe-core-dump-on-netscaler\" target=\"_blank\" rel=\"noreferrer noopener\">at least 5GB of space<\/a> on your NetScaler ADC, and more in some configurations. You should remove these core dumps, located in \/var\/core, afterwards to avoid filling the partition, which is needed for normal operation. Careful analysis of the memory snapshots of the unpatched instances would help identify if there have been any exploitation attempts.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Improved vulnerability management with ADM<\/h2>\n\n\n\n<p>If you use NetScaler Application Delivery Management (ADM), this is an ideal time to explore the security features in ADM. The first two features below can help reduce your mean time to patch, which we believe is critical in the current threat landscape:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security Advisory<\/strong> protects your infrastructure by highlighting NetScaler ADCs with CVE exposure, scheduling on-demand vulnerability scans, and suggesting remediations<\/li>\n\n\n\n<li><strong>Upgrade Advisory<\/strong> helps you with the lifecycle management of NetScaler ADCs<\/li>\n\n\n\n<li><strong>File Integrity Monitoring<\/strong> ensures the integrity of the files on NetScaler ADCs by determining if changes have been made to your NetScaler build files<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Learn more and stay up to date<\/h2>\n\n\n\n<p>Please note that we follow Product Security Incident Response Team (PSIRT) standards in disclosing vulnerabilities, and these standards include the opportunity for qualifying customers to sign up for and receive pre-notifications of vulnerabilities. We aim to provide these customers who opt-in for pre-notification with one to two weeks\u2019 advance notice of the vulnerability severity to allow planning for remediation. You can learn more about our pre-notification program after signing into your <a href=\"https:\/\/support.citrix.com\/user\/alerts\" target=\"_blank\" rel=\"noreferrer noopener\">Citrix account<\/a>.&nbsp;<\/p>\n\n\n\n<p>With the holidays and year-end change freezes approaching, we strongly urge NetScaler customers to follow our remediation guidance for CVE-2023-4966 and, more generally, our security best practices available via the links below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/support.citrix.com\/article\/CTX579459\/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967\" target=\"_blank\" rel=\"noreferrer noopener\">Read the security bulletin<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/support.citrix.com\/user\/alerts\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up for security bulletin notifications&nbsp;<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc-secure-deployment.html\" target=\"_blank\" rel=\"noreferrer noopener\">Consult the best practices deployment guide<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc-secure-deployment.html\" target=\"_blank\" rel=\"noreferrer noopener\">NetScaler security best practices<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-application-delivery-management-service\/instance-advisory\/security-advisory.html\" target=\"_blank\" rel=\"noreferrer noopener\">NetScaler Security Advisory and File Integrity Monitoring<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-application-delivery-management-service\/instance-advisory\/upgrade-advisory\" target=\"_blank\" rel=\"noreferrer noopener\">NetScaler Upgrade Advisory<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Technical assistance<\/h2>\n\n\n\n<p>NetScaler and Citrix are both business units of Cloud Software Group, and we share the same ticketing system. If you encounter issues when you are updating your affected builds, please <a href=\"https:\/\/www.citrix.com\/support\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact Citrix Customer Support<\/a>, irrespective of whether your product is NetScaler branded or Citrix branded.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On October 10, 2023, NetScaler published a security bulletin for CVE-2023-4966 \u2014 now dubbed by some as \u201cCitrixBleed\u201d&nbsp; \u2014 that affects customer-managed NetScaler ADC and NetScaler Gateway. This critical vulnerability was discovered by our internal team. At the time we published the security bulletin, we were unaware that this vulnerability had been exploited in the [&hellip;]<\/p>\n","protected":false},"author":1003,"featured_media":174259586,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[8],"tags":[41],"class_list":{"0":"post-174259578","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-application-security","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NetScaler Investigation Recommendations for CVE-2023-4966<\/title>\n<meta name=\"description\" content=\"Customer-managed NetScaler ADC and NetScaler Gateway are vulnerable to session hijacking. Find our recommendations here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NetScaler Investigation Recommendations for CVE-2023-4966\" \/>\n<meta property=\"og:description\" content=\"Customer-managed NetScaler ADC and NetScaler Gateway are vulnerable to session hijacking. Find our recommendations here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/\" \/>\n<meta property=\"og:site_name\" content=\"NetScaler Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-20T13:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-20T17:30:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anil Shetty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:site\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anil Shetty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/\"},\"author\":{\"name\":\"Anil Shetty\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59\"},\"headline\":\"NetScaler investigation recommendations for CVE-2023-4966\u00a0\",\"datePublished\":\"2023-11-20T13:00:36+00:00\",\"dateModified\":\"2023-11-20T17:30:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/\"},\"wordCount\":818,\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png\",\"keywords\":[\"Application security\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/\",\"name\":\"NetScaler Investigation Recommendations for CVE-2023-4966\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png\",\"datePublished\":\"2023-11-20T13:00:36+00:00\",\"dateModified\":\"2023-11-20T17:30:25+00:00\",\"description\":\"Customer-managed NetScaler ADC and NetScaler Gateway are vulnerable to session hijacking. Find our recommendations here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png\",\"width\":1200,\"height\":628,\"caption\":\"NetScaler investigation recommendations for CVE-2023-4966\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netscaler.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NetScaler investigation recommendations for CVE-2023-4966\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"name\":\"NetScaler Blog\",\"description\":\"Application delivery and security blog\",\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\",\"name\":\"NetScaler Blog\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"width\":2032,\"height\":486,\"caption\":\"NetScaler Blog\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NetScaler\",\"https:\/\/www.linkedin.com\/company\/netscaler\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59\",\"name\":\"Anil Shetty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g\",\"caption\":\"Anil Shetty\"},\"url\":\"https:\/\/www.netscaler.com\/blog\/author\/anil-shettycloud-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NetScaler Investigation Recommendations for CVE-2023-4966","description":"Customer-managed NetScaler ADC and NetScaler Gateway are vulnerable to session hijacking. Find our recommendations here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/","og_locale":"en_US","og_type":"article","og_title":"NetScaler Investigation Recommendations for CVE-2023-4966","og_description":"Customer-managed NetScaler ADC and NetScaler Gateway are vulnerable to session hijacking. Find our recommendations here.","og_url":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/","og_site_name":"NetScaler Blog","article_published_time":"2023-11-20T13:00:36+00:00","article_modified_time":"2023-11-20T17:30:25+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png","type":"image\/png"}],"author":"Anil Shetty","twitter_card":"summary_large_image","twitter_creator":"@NetScaler","twitter_site":"@NetScaler","twitter_misc":{"Written by":"Anil Shetty","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#article","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/"},"author":{"name":"Anil Shetty","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59"},"headline":"NetScaler investigation recommendations for CVE-2023-4966\u00a0","datePublished":"2023-11-20T13:00:36+00:00","dateModified":"2023-11-20T17:30:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/"},"wordCount":818,"publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png","keywords":["Application security"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/","url":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/","name":"NetScaler Investigation Recommendations for CVE-2023-4966","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png","datePublished":"2023-11-20T13:00:36+00:00","dateModified":"2023-11-20T17:30:25+00:00","description":"Customer-managed NetScaler ADC and NetScaler Gateway are vulnerable to session hijacking. Find our recommendations here.","breadcrumb":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#primaryimage","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966.png","width":1200,"height":628,"caption":"NetScaler investigation recommendations for CVE-2023-4966"},{"@type":"BreadcrumbList","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-investigation-recommendations-for-cve-2023-4966\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netscaler.com\/blog\/"},{"@type":"ListItem","position":2,"name":"NetScaler investigation recommendations for CVE-2023-4966\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.netscaler.com\/blog\/#website","url":"https:\/\/www.netscaler.com\/blog\/","name":"NetScaler Blog","description":"Application delivery and security blog","publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.netscaler.com\/blog\/#organization","name":"NetScaler Blog","url":"https:\/\/www.netscaler.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","width":2032,"height":486,"caption":"NetScaler Blog"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NetScaler","https:\/\/www.linkedin.com\/company\/netscaler\/"]},{"@type":"Person","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/95208d92d61d26d754d258cd8dcc4f59","name":"Anil Shetty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70d4ab8d6c35e47248907340933dd288ac3edc0e18c6a49d0f5144f9619c98d4?s=96&d=mm&r=g","caption":"Anil Shetty"},"url":"https:\/\/www.netscaler.com\/blog\/author\/anil-shettycloud-com\/"}]}},"featured_image_src":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966-600x400.png","featured_image_src_square":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/10\/netscaler-investigation-recommendations-cve-2023-4966-600x600.png","author_info":{"display_name":"Anil Shetty","author_link":"https:\/\/www.netscaler.com\/blog\/author\/anil-shettycloud-com\/"},"_links":{"self":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174259578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/users\/1003"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/comments?post=174259578"}],"version-history":[{"count":0,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174259578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media\/174259586"}],"wp:attachment":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media?parent=174259578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/categories?post=174259578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/tags?post=174259578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}