Unauthenticated remote code execution
Published: 2023-07-18
Citrix has released a patch fixing a remote code execution vulnerability in several versions of Netscaler ADC and Netscaler Gateway that has been exploited. Organizations are urged to patch immediately.
https://www.theregister.com/2025/03/05/china_silk_typhoon_update/
https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/
https://www.darkreading.com/remote-workforce/china-silk-typhoon-it-supply-chain-attacks
https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html
https://www.security.com/threat-intelligence/ransomware-trends-2025
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
https://www.reliaquest.com/blog/inc-ransom-attack-analysis-extortion-methodologies/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a
https://securityaffairs.com/164838/breaking-news/excobalt-cybercrime-group-targets-russian-orgs.html
https://services.google.com/fh/files/misc/m-trends-2024.pdf
https://therecord.media/xerox-xbs-cyberattack?&web_view=true
Published: 2023-07-19
Updated: 2025-03-10
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.91405
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Concern