ADC

Signature update version 168

New signatures rules are generated for the vulnerabilities identified in the week 2026-01-08. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 168 applicable for Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998188 CVE-2024-8248, CVE-2024-10513 WEB-MISC anything-llm Prior To 1.2.2 - Path Traversal Vulnerability (CVE-2024-8248,CVE-2024-10513)
998189 CVE-2024-5211 WEB-MISC anything-llm Prior To 1.0.0 - Path Traversal Vulnerability (CVE-2024-5211)
998190 CVE-2024-13059 WEB-MISC anything-llm Prior To 1.3.1 - Path Traversal Vulnerability (CVE-2024-13059)
998191 CVE-2024-6825 WEB-MISC BerriAI LiteLLM - Remote Code Execution Vulnerability (CVE-2024-6825)
998192 CVE-2025-45809 WEB-MISC BerriAI LiteLLM - SQL Injection Vulnerability Via /key/unblock (CVE-2025-45809)
998193 CVE-2025-45809 WEB-MISC BerriAI LiteLLM - SQL Injection Vulnerability Via /key/block (CVE-2025-45809)
998194 CVE-2024-0759 WEB-MISC anything-llm Prior To 1.0.0 - SSRF Vulnerability (CVE-2024-0759)
998195 CVE-2024-6842 WEB-MISC anything-llm 1.5.5 - Information Disclosure Vulnerability (CVE-2024-6842)
Signature update version 168