Description
Memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway if the appliance must be configured as a Gateway (VPN Vserver) with RDP Feature enabled OR the appliance must be configured as a Gateway (VPN Vserver) and RDP Proxy Server Profile is created and set to Gateway (VPN Vserver) OR the appliance must be configured as a Auth Server (AAA Vserver) with RDP Feature enabled
Published: 2024-11-12
Score: 8.4 High
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-49549 Memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway if the appliance must be configured as a Gateway (VPN Vserver) with RDP Feature enabled OR the appliance must be configured as a Gateway (VPN Vserver) and RDP Proxy Server Profile is created and set to Gateway (VPN Vserver) OR the appliance must be configured as a Auth Server (AAA Vserver) with RDP Feature enabled
History

Fri, 25 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Citrix
Citrix netscaler Application Delivery Controller
Citrix netscaler Gateway
Weaknesses CWE-787
CPEs cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*
cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
Vendors & Products Citrix
Citrix netscaler Application Delivery Controller
Citrix netscaler Gateway
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Wed, 13 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Netscaler
Netscaler adc
Netscaler gateway
Netscaler netscaler-adc 12.1-fips
Netscaler netscaler-adc 12.1-ndcpp
Netscaler netscaler-adc 13.1-fips
CPEs cpe:2.3:a:netscaler:adc:*:*:*:*:*:*:*:*
cpe:2.3:a:netscaler:gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:netscaler:netscaler-adc_12.1-fips:12.1:*:*:*:*:*:*:*
cpe:2.3:a:netscaler:netscaler-adc_12.1-ndcpp:12.1:*:*:*:*:*:*:*
cpe:2.3:a:netscaler:netscaler-adc_13.1-fips:*:*:*:*:*:*:*:*
Vendors & Products Netscaler
Netscaler adc
Netscaler gateway
Netscaler netscaler-adc 12.1-fips
Netscaler netscaler-adc 12.1-ndcpp
Netscaler netscaler-adc 13.1-fips
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 Nov 2024 18:30:00 +0000

Type Values Removed Values Added
Description Memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway if the appliance must be configured as a Gateway (VPN Vserver) with RDP Feature enabled OR the appliance must be configured as a Gateway (VPN Vserver) and RDP Proxy Server Profile is created and set to Gateway (VPN Vserver) OR the appliance must be configured as a Auth Server (AAA Vserver) with RDP Feature enabled
Title Memory safety vulnerability leading to memory corruption and Denial of Service
Weaknesses CWE-119
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:L'}


Subscriptions

Citrix Netscaler Application Delivery Controller Netscaler Gateway
Netscaler Adc Gateway Netscaler-adc 12.1-fips Netscaler-adc 12.1-ndcpp Netscaler-adc 13.1-fips
cve-icon MITRE

Status: PUBLISHED

Assigner: Citrix

Published:

Updated: 2024-11-21T16:19:44.438Z

Reserved: 2024-09-06T17:18:25.789Z

Link: CVE-2024-8534

cve-icon Vulnrichment

Updated: 2024-11-13T14:38:28.898Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-12T19:15:18.907

Modified: 2025-07-25T18:42:21.863

Link: CVE-2024-8534

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses