ADC

Signature update version 129

New signatures rules are generated for the vulnerabilities identified in the week 2024-05-14. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 129 applicable for NetScaler 11.1, NetScaler 12.0, Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998492 CVE-2024-31136 WEB-MISC JetBrains TeamCity Prior to 2024.03 - Two-Factor Authentication Bypass Vulnerability (CVE-2024-31136)
998493 CVE-2024-25600 WEB-WORDPRESS Bricks Builder Prior to 1.9.6.1 - RCE Vulnerability Via AJAX content parameter (CVE-2024-25600)
998494 CVE-2024-25600 WEB-WORDPRESS Bricks Builder Prior to 1.9.6.1 - RCE Vulnerability Via AJAX element and elements parameters (CVE-2024-25600)
998495 CVE-2024-25600 WEB-WORDPRESS Bricks Builder Prior to 1.9.6.1 - RCE Vulnerability Via REST API render_element Via rest_route (CVE-2024-25600)
998496 CVE-2024-25600 WEB-WORDPRESS Bricks Builder Prior to 1.9.6.1 - RCE Vulnerability Via REST API render_element (CVE-2024-25600)
998497 CVE-2023-46302 WEB-MISC Apache Submarine Prior To 0.8.0 - Deserialization of Untrusted Data Vulnerability (CVE-2023-46302)
Signature update version 129