Search
628 results for “neoscaler”
-
-
#Bürgerpflicht erfüllt, demokratisch gewählt. #btw25
-
« NetScaler ADC et Gateway – failles critiques
Publié le
26.08.2025
NetScaler ADC et NetScaler Gateway (anciennement Citrix ADC et Citrix Gateway) sont des solutions largement utilisées pour gérer le trafic réseau, fournir un accès distant sécurisé et améliorer la performance des applications.
Des failles critiques ont été découvertes et l’une d’entre elles est déjà activement exploitée par des cybercriminels, ce qui rend la mise à jour urgente. »
👇
https://www.vd.ch/actualites/actualite/news/25456-netscaler-adc-et-gateway-failles-critiques -
New Citrix #NetScaler 0day pokes its head above the wall. CVE-2025-7775 has been added to VulnCheck KEV (it's free!)
https://www.vulncheck.com/blog/new-citrix-netscaler-zero-day-vulnerability-exploited-in-the-wild
-
NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775) https://www.helpnetsecurity.com/2025/08/26/netscaler-adc-gateway-zero-day-exploited-by-attackers-cve-2025-7775/ #Don'tmiss #NetScaler #Hotstuff #backdoor #webshell #Citrix #0-day #News
-
NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775) https://www.helpnetsecurity.com/2025/08/26/netscaler-adc-gateway-zero-day-exploited-by-attackers-cve-2025-7775/ #Don'tmiss #NetScaler #Hotstuff #backdoor #webshell #Citrix #0-day #News
-
NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775) https://www.helpnetsecurity.com/2025/08/26/netscaler-adc-gateway-zero-day-exploited-by-attackers-cve-2025-7775/ #Don'tmiss #NetScaler #Hotstuff #backdoor #webshell #Citrix #0-day #News
-
NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775) https://www.helpnetsecurity.com/2025/08/26/netscaler-adc-gateway-zero-day-exploited-by-attackers-cve-2025-7775/ #Don'tmiss #NetScaler #Hotstuff #backdoor #webshell #Citrix #0-day #News
-
🚨 Over 3,300 Citrix NetScaler devices remain unpatched against the critical #CitrixBleed2 vulnerability (CVE-2025-5777), risking session hijacks & MFA bypass! Attackers can steal session tokens remotely. Patch now to avoid data breaches and network risks! 🔐🛡️ #newz
Details: https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/ #Cybersecurity #InfoSec #NetScaler
-
🚨 Over 3,300 Citrix NetScaler devices remain unpatched against the critical #CitrixBleed2 vulnerability (CVE-2025-5777), risking session hijacks & MFA bypass! Attackers can steal session tokens remotely. Patch now to avoid data breaches and network risks! 🔐🛡️ #newz
Details: https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/ #Cybersecurity #InfoSec #NetScaler
-
🚨 Over 3,300 Citrix NetScaler devices remain unpatched against the critical #CitrixBleed2 vulnerability (CVE-2025-5777), risking session hijacks & MFA bypass! Attackers can steal session tokens remotely. Patch now to avoid data breaches and network risks! 🔐🛡️ #newz
Details: https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/ #Cybersecurity #InfoSec #NetScaler
-
🚨 Over 3,300 Citrix NetScaler devices remain unpatched against the critical #CitrixBleed2 vulnerability (CVE-2025-5777), risking session hijacks & MFA bypass! Attackers can steal session tokens remotely. Patch now to avoid data breaches and network risks! 🔐🛡️ #newz
Details: https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/ #Cybersecurity #InfoSec #NetScaler
-
🚨 Over 3,300 Citrix NetScaler devices remain unpatched against the critical #CitrixBleed2 vulnerability (CVE-2025-5777), risking session hijacks & MFA bypass! Attackers can steal session tokens remotely. Patch now to avoid data breaches and network risks! 🔐🛡️ #newz
Details: https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/ #Cybersecurity #InfoSec #NetScaler
-
Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543) https://www.helpnetsecurity.com/2025/08/12/citrix-netscaler-exploitation-zero-day-cve-2025-6543/ #Shadowserver #Don'tmiss #NetScaler #Hotstuff #Fortinet #NCSC-NL #Citrix #Europe #News
-
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness -
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness -
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness -
Found a guide for NetScaler (Citrix ADC) CVE-2023-3519 that explains how to validate and check for (currently) known Indicators of Compromise (IoCs) on a local CITRIX device.
The full guide including the commands, can be found here: [Checklist for Citrix ADC CVE-2023-3519](https://www.deyda.net/index.php/en/2023/07/19/checklist-for-citrix-adc-cve-2023-3519/)
Please bear in mind that this is a guide "found on the internet". Although it appears to be reliable and it was mentioned by SANS stormcast, these devices are not my specific area of expertise. Use your brain and use at your own risk...
Here are some key points from the article:
1. **Log in with nsroot or another administrative account.**
2. **Find out the time of the last update.** - This command lists the details of the files in the /var/nsinstall directory, which can help determine when the last update occurred.
```
shell ls -ll /var/nsinstall
```3. **Check whether certain files have been adjusted since the last update.** - These commands find and list files in specified directories that have been modified since the last update.
```
shell
find /netscaler/ns_gui/ -type f -name *.php -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/vpn/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/netscaler/logon/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
find /var/python/ -type f -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```4. **Check for HTTP error log files.** - These commands search for .sh and .php entries in the HTTP error log files.
```
zgrep '\.sh' /var/log/httperror.log*
zgrep '\.php' /var/log/httperror.log*
```5. **Check for Shell log files.** - This command searches for entries related to '/flash/nsconfig/keys' in the shell log files.
```
grep '/flash/nsconfig/keys' /var/log/sh.log*
```6. **Check log files for known IOCs.** - This command finds and lists files with root permissions that have been modified since the last update.
```
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt {Timestamp of Installer Files +1} -exec ls -l {} \;
```7. **Check for Nobody processes.** - This command lists processes running under the 'nobody' user that are not associated with '/bin/httpd'.
```
shell ps aux | grep nobody | grep -v '/bin/httpd'
```
#NetScaler #CitrixADC #CVE20233519 #SecurityGuide #IndicatorsOfCompromise #IoCs #InfoSec #CyberSecurity #VulnerabilityManagement #SecurityInvestigation #SysAdminTips #NetworkSecurity #CyberThreats #ITSecurity #OnlineSecurity #CyberAware #TechSafety #SecureNetworking #VulnerabilityScanning #InfoSecAwareness -
Citrix NetScaler: CISA exige atualização urgente contra vulnerabilidade ativamente explorada
🔗 https://portal.tugatech.com.pt/2026/03/31/citrix-netscaler-cisa-exige-atualizacao-urgente-contra-vulnerabilidade-ativamente-explorada/ -
Citrix NetScaler RCE CVSSv4.0 9.3 - CVE-2026-3055 & CVE-2026-4368
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&articleTitle=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368 -
#Citrix Netscaler ADC und Gateway: Update schließt #CrossSiteScripting-Lücke | Security https://www.heise.de/news/Citrix-Netscaler-ADC-und-Gateway-Update-schliesst-Cross-Site-Scripting-Luecke-11077335.html #XSS #Patchday
-
В фокусе RVD: трендовые уязвимости августа
Хабр, привет! На связи команда инженер-аналитиков отдела по инструментальному анализу защищенности компании R-Vision. Мы подготовили свежий дайджест трендовых уязвимостей, обнаруженных в августе 2025 года. В нём собраны наиболее опасные уязвимости, которые уже сейчас активно эксплуатируются в атаках и их устранение должно быть в приоритете.
https://habr.com/ru/companies/rvision/articles/943020/
#уязвимости #информационная_безопасность #кибербезопасность #управление_уязвимостями #vulnerability_management #эксплуатация_уязвимостей #обновление_безопасности #winrar #citrix_netscaler
-
Citrix Netscaler schon wieder sehr hohes Risiko
Die Produktlinie NetScaler begann als Marke der US-Firma Citrix. Inzwischen sind beides getrennte Marken unter dem Dach einer Firma mit Namen Cloud Software Group (CSG). - Aktuell gibt es Warnungen vor drei Sicherheitslücken in mehreren NetScaler Produkten. Die schlimmste der Sicherheitslücken, CVE 2025-5777, wird mit einem Risiko von 9,3 (von 10) eingestuft. Oder sollte man sagen Hintertür? Die Sicherheitslücke beruht nämlich darauf, dass Eingaben nicht ausreichend geprüft werden ("insufficient input validation"). Ah, ja.
https://www.pc-fluesterer.info/wordpress/2025/06/25/citrix-netscaler-schon-wieder-sehr-hohes-risiko/
#Empfehlung #Warnung #exploits #foss #hersteller #hintertür #opensource #router #sicherheit #spionage #UnplugTrump #usa #vorbeugen #vpn #wissen #closedsource #proprietär #citrix
-
"🚨Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action🚨"
CISA warns of a critical security flaw in Citrix NetScaler ADC and Gateway devices being exploited to drop web shells on vulnerable systems. Immediate action is advised!🔒💻
Source: [The Hacker News](https://thehackernews.com/2023/07/citrix-netscaler-adc-and-gateway.html)
Tags: #CISA #Citrix #NetScaler #ADC #Gateway #Cybersecurity #Vulnerability #WebShells #InfoSec 🌐🔐🔍
-
"🚨Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action🚨"
CISA warns of a critical security flaw in Citrix NetScaler ADC and Gateway devices being exploited to drop web shells on vulnerable systems. Immediate action is advised!🔒💻
Source: [The Hacker News](https://thehackernews.com/2023/07/citrix-netscaler-adc-and-gateway.html)
Tags: #CISA #Citrix #NetScaler #ADC #Gateway #Cybersecurity #Vulnerability #WebShells #InfoSec 🌐🔐🔍
-
"🚨Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action🚨"
CISA warns of a critical security flaw in Citrix NetScaler ADC and Gateway devices being exploited to drop web shells on vulnerable systems. Immediate action is advised!🔒💻
Source: [The Hacker News](https://thehackernews.com/2023/07/citrix-netscaler-adc-and-gateway.html)
Tags: #CISA #Citrix #NetScaler #ADC #Gateway #Cybersecurity #Vulnerability #WebShells #InfoSec 🌐🔐🔍
-
"🚨Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action🚨"
CISA warns of a critical security flaw in Citrix NetScaler ADC and Gateway devices being exploited to drop web shells on vulnerable systems. Immediate action is advised!🔒💻
Source: [The Hacker News](https://thehackernews.com/2023/07/citrix-netscaler-adc-and-gateway.html)
Tags: #CISA #Citrix #NetScaler #ADC #Gateway #Cybersecurity #Vulnerability #WebShells #InfoSec 🌐🔐🔍
-
"🚨Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action🚨"
CISA warns of a critical security flaw in Citrix NetScaler ADC and Gateway devices being exploited to drop web shells on vulnerable systems. Immediate action is advised!🔒💻
Source: [The Hacker News](https://thehackernews.com/2023/07/citrix-netscaler-adc-and-gateway.html)
Tags: #CISA #Citrix #NetScaler #ADC #Gateway #Cybersecurity #Vulnerability #WebShells #InfoSec 🌐🔐🔍
-
Critical #Citrix #NetScaler memory flaw actively exploited in attacks