CVE-2023-6549

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to crash the NetScaler application delivery controller or read sensitive data from memory without needing to log in. It can be exploited simply by sending specially crafted requests to the device, making it a significant risk for organizations using this product.

Technical Description

Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and Out-Of-Bounds Memory Read

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 770 days

Quick Information

Published

Jan 17, 2024

about 2 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

citrix

Product

netscaler application delivery controller