Monday, March 24, 2025
HomeCVE/vulnerabilityCISA Releases Test Tool for Citrix ADC and Gateway Vulnerability - Sysadmins...

CISA Releases Test Tool for Citrix ADC and Gateway Vulnerability – Sysadmins Can Test Now

Published on

SIEM as a Service

Follow Us on Google News

CISA has released a new tool for administrators and users to check for Citrix Application Delivery Controller (ADC) and Citrix Gateway vulnerability.

The vulnerability can be tracked as CVE-2019-19781, it allows an unauthenticated remote attacker to execute arbitrary code on the vulnerable system.

Tool for Testing

CISA has published a tool that allows users and administrators to check their Citrix Application Delivery Controller (ADC) and Citrix Gateway vulnerable to CVE-2019-19781.

The tool can be downloaded from GitHub, to execute it requires Python versions 3.6 and above.

To scan a host:

cve-2019-19781 citrix.example.org

If the system is vulnerable it shows the message as “2020-01-10 22:11:46,312 WARNING citrix.example.org appears to be vulnerable.”

Active Scans & PoC Published

The vulnerability was discovered in December, A couple of days before researchers spotted active scans targeting the vulnerability.

Citrix earlier released a security advisory detailing steps to mitigate the execution vulnerability.

Last weekend a group of security researchers published working exploit code for the vulnerability online. More details can be found here.

After the public release, there is a huge spike detected on honeypots, attackers started using public exploits to install backdoors.

https://twitter.com/MalwareTechBlog/status/1217027608417669120
https://twitter.com/bad_packets/status/1216941115342905344

Patch to be Published

Citrix says that patch to be published with the end of January 2020, in the meantime users are strongly recommended to deploy a responder policy to mitigate the issue in the interim until a permanent fix is available.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

FCC Investigates Chinese Entities on US Government’s Prohibited List

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...

WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits

A critical vulnerability in the popular WordPress plugin GamiPress has been uncovered, leaving users...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...

WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits

A critical vulnerability in the popular WordPress plugin GamiPress has been uncovered, leaving users...