ADC

Signature update version 171

New signatures rules are generated for the vulnerabilities identified in the week 2026-03-18. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 171 applicable for Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998164 CVE-2025-40553 WEB-MISC SolarWinds Web HelpDesk Prior to 2026.1 - Remote Code Execution Vulnerability Via ajax (CVE-2025-40553)
998165 CVE-2025-40553 WEB-MISC SolarWinds Web HelpDesk Prior to 2026.1 - Remote Code Execution Vulnerability Via wo (CVE-2025-40553)
998166 CVE-2026-27826 WEB-MISC mcp-atlassian Prior to 0.17.0 - SSRF Vulnerability via X-Atlassian-Jira-Url (CVE-2026-27826)
998167 CVE-2026-27826 WEB-MISC mcp-atlassian Prior to 0.17.0 - SSRF Vulnerability via X-Atlassian-Confluence-Url (CVE-2026-27826)
998168 CVE-2026-27825 WEB-MISC mcp-atlassian - Arbitrary File Read Vulnerability via Update Issue (CVE-2026-27825)
998169 CVE-2026-27825 WEB-MISC mcp-atlassian - Arbitrary File Read Vulnerability via Upload Attachments (CVE-2026-27825)
998170 CVE-2026-27825 WEB-MISC mcp-atlassian - Arbitrary File Read Vulnerability via Upload Attachment (CVE-2026-27825)
998171 CVE-2026-27825 WEB-MISC mcp-atlassian Prior to 0.17.0 - Arbitrary File Write Vulnerability via Download Content Attachments (CVE-2026-27825)
998172 CVE-2026-27825 WEB-MISC mcp-atlassian Prior to 0.17.0 - Arbitrary File Write Vulnerability via Download Attachment (CVE-2026-27825)
Signature update version 171