Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6548: CWE-94 Improper Control of Generation of Code ('Code Injection') in Cloud Software Group NetScaler ADC

0
Medium
VulnerabilityCVE-2023-6548cvecve-2023-6548cwe-94
Published: Wed Jan 17 2024 (01/17/2024, 20:11:18 UTC)
Source: CVE Database V5
Vendor/Project: Cloud Software Group
Product: NetScaler ADC

Description

Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:01:17 UTC

Technical Analysis

CVE-2023-6548 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting Cloud Software Group's NetScaler ADC and NetScaler Gateway products. The flaw allows an attacker who has authenticated access with low privileges to the management interfaces (NSIP, CLIP, or SNIP) to execute arbitrary code remotely. This occurs because the software improperly controls the generation of code, enabling code injection attacks. The affected versions include 12.1-FIPS, 12.1-NDcPP, 13.0, 13.1, 13.1-FIPS, and 14.1. The vulnerability is rated medium severity with a CVSS 3.1 score of 5.5, reflecting that exploitation requires low privilege authentication and network access to management interfaces but does not require user interaction. The impact includes potential compromise of confidentiality, integrity, and availability of the affected systems. No public exploits or active exploitation have been reported yet. The vulnerability highlights the risk of exposing management interfaces to unauthorized or insufficiently trusted users and the importance of strict access controls and timely patching in critical network infrastructure devices.

Potential Impact

For European organizations, the impact of CVE-2023-6548 can be significant, particularly for those relying on NetScaler ADC and Gateway appliances for application delivery, load balancing, and secure remote access. Successful exploitation could lead to remote code execution on critical network infrastructure, potentially allowing attackers to manipulate traffic, intercept sensitive data, disrupt services, or pivot deeper into internal networks. Confidentiality could be compromised through unauthorized data access, integrity through manipulation of network traffic or configurations, and availability through service disruption or denial of service. Organizations in sectors such as finance, government, healthcare, and telecommunications, which often use Citrix NetScaler products, could face operational disruptions and data breaches. The requirement for authenticated access somewhat limits the attack surface but does not eliminate risk, especially if credential compromise or insider threats exist. The lack of known exploits in the wild provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Restrict access to NSIP, CLIP, and SNIP management interfaces strictly to trusted administrators and secure management networks using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all users accessing management interfaces to reduce the risk of credential compromise. 3. Monitor and audit access logs for unusual or unauthorized access attempts to management interfaces. 4. Apply vendor patches and updates promptly once available, as no patch links are currently provided, organizations should monitor Cloud Software Group advisories closely. 5. Disable or limit management interface exposure to the internet or untrusted networks wherever possible. 6. Employ intrusion detection and prevention systems (IDS/IPS) to detect anomalous behavior indicative of exploitation attempts. 7. Conduct regular security assessments and penetration testing focusing on management interface security. 8. Educate administrators on the risks of low-privilege authenticated access and the importance of credential hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Citrix
Date Reserved
2023-12-06T11:01:54.643Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9af247d717aace26860

Added to database: 10/21/2025, 7:06:23 PM

Last enriched: 10/21/2025, 8:01:17 PM

Last updated: 10/30/2025, 2:32:28 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats