ADC

Signature update version 169

New signatures rules are generated for the vulnerabilities identified in the week 2026-02-02. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 169 applicable for Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998180 CVE-2025-53967, CVE-2025-15061 LLM Figma-Context-MCP Prior to 0.6.3 - OS Command Injection Vulnerability Via nodeId (CVE-2025-53967, CVE-2025-15061)
998181 CVE-2025-53967, CVE-2025-15061 LLM Figma-Context-MCP Prior to 0.6.3 - OS Command Injection Vulnerability Via fileKey (CVE-2025-53967, CVE-2025-15061)
998182 CVE-2025-68613 WEB-MISC n8n Prior To 1.120.4, 1.121.1 and 1.122.0 - Remote Code Execution Vulnerability (CVE-2025-68613)
998183 CVE-2025-59155 LLM HackMD MCP Server Prior To 1.5.0 - Server-Side Request Forgery Vulnerability via form (CVE-2025-59155)
998184 CVE-2025-59155 LLM HackMD MCP Server Prior To 1.5.0 - Server-Side Request Forgery Vulnerability via header (CVE-2025-59155)
998185 CVE-2026-23760 WEB-MISC SmarterTools SmarterMail Prior to Build 9511 - Authentication Bypass Vulnerability (CVE-2026-23760)
998186 CVE-2025-59377 LLM Feiskyer Mcp-kubernetes-server Prior to 0.1.12 - OS Command Injection Vulnerability (CVE-2025-59377)
998187 CVE-2026-21858 WEB-MISC n8n Prior To 1.121.0 - Arbitrary File Read Vulnerability (CVE-2026-21858)
Signature update version 169