CVE-2023-6549
High
|7.5Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to crash the NetScaler application delivery controller or read sensitive data from memory without needing to log in. It can be exploited simply by sending specially crafted requests to the device, making it a significant risk for organizations using this product.
Technical Description
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 770 days
Quick Information
Published
Jan 17, 2024
about 2 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
citrix
Product
netscaler application delivery controller