ADC

Signature update version 172

New signatures rules are generated for the vulnerabilities identified in the week 2026-04-08. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 172 applicable for Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and description.

Signature rule CVE ID Description
998155 CVE-2025-6197 WEB-MISC Apache Grafana - Open Redirect Vulnerability via Absolute URL (CVE-2025-6197)
998156 CVE-2025-6197 WEB-MISC Apache Grafana - Open Redirect Vulnerability via Protocol Relative URL (CVE-2025-6197)
998157 CVE-2026-22200 WEB-MISC osTicket prior to 1.18.3 and 1.17.7 - Arbitrary File Read Vulnerability via reply (CVE-2026-22200)
998158 CVE-2026-22200 WEB-MISC osTicket prior to 1.18.3 and 1.17.7 - Arbitrary File Read Vulnerability via open (CVE-2026-22200)
998159 CVE-2025-6023 WEB-MISC Apache Grafana - Open Redirect Vulnerability (CVE-2025-6023)
998160 CVE-2026-20963 WEB-MISC Microsoft SharePoint - Deserialization of Untrusted Data Vulnerability (CVE-2026-20963)
998161 CVE-2026-33017 WEB-MISC Langflow Prior to 1.9.0 - Unauthenticated Remote Code Execution Vulnerability (CVE-2026-33017)
998162 CVE-2026-27493 WEB-MISC n8n Prior To 2.10.1, 2.9.3 and 1.123.22 - Remote Code Execution Vulnerability (CVE-2026-27493)
998163 CVE-2025-55183 WEB-MISC React Server Up to 19.0.1, 19.1.2 and 19.2.1 - Information Leak Vulnerability (CVE-2025-55183)
Signature update version 172