The Citrix NetScaler Situation Just Got Worse
Mass exploitation of CVE-2024-8534 is ongoing. Notes from helping clients figure out if they're compromised.
On this page
Three clients called last week. Two more this week. All the same thing: Citrix NetScaler alerts.
We’re in the middle of another mass exploitation wave. Here’s what’s happening.
Background
CVE-2024-8534 (and related issues) in Citrix NetScaler Gateway and ADC. Authentication bypass and remote code execution. The patches dropped in November, but we’re seeing the exploitation peak now.
Why the delay? Attackers were quietly exploiting for weeks before ramping up to mass scanning. The organizations that patched quickly are fine. The ones that waited… aren’t.
Affected:
- NetScaler ADC and Gateway 14.1 before 14.1-29.72
- NetScaler ADC and Gateway 13.1 before 13.1-55.34
- NetScaler ADC 13.1-FIPS before 13.1-37.207
- NetScaler ADC 12.1-FIPS before 12.1-55.321
If you’re running Gateway or ADC exposed to the internet and haven’t patched: assume compromise until proven otherwise.
What I’m Seeing
Webshells Everywhere
The primary payload is webshell deployment. Attackers get code execution, drop a PHP or ASPX webshell, use it for persistence and further access.
Common locations we’ve found:
/var/nslog/ns.log.php
/var/vpn/bookmark/*.php
/netscaler/ns_gui/vpn/scripts/*.php
Filenames trying to blend in. Sometimes timestamped. Sometimes mimicking legitimate files.
Credential Harvesting
Once in, they’re grabbing:
- VPN user credentials (often visible in configs or logs)
- Admin credentials
- Session tokens
- Anything in the ns.conf file
If your NetScaler was compromised, assume every credential that touched it is burned.
Lateral Movement Setup
Several compromises I’ve seen: attackers didn’t immediately do anything visible. They grabbed creds, mapped the network, maybe set up a tunnel. Then waited.
The “wait” is concerning. Suggests preparation for ransomware or targeted intrusion. Immediate commodity attacks are easier to spot than patient ones.
Post-Exploitation Tools
Seen deployed:
- Cobalt Strike beacons
- Custom reverse shells
- Network scanning tools
- Credential dumping utilities
This isn’t script kiddies. It’s organized groups with playbooks.
Triage Steps
If you have NetScaler devices:
1. Check Version
show ns version
Are you patched? If not, stop reading and go patch.
2. Look for Webshells
find /var /netscaler -name "*.php" -type f -newer /var/nsconfig/ns.conf
find /var /netscaler -name "*.aspx" -type f
Anything unexpected? Investigate.
3. Check Running Processes
ps aux | grep -v "^root\|^nobody\|^nsroot"
Unknown processes? Unknown parent processes for known ones? Red flag.
4. Review Access Logs
Look for:
- Unusual source IPs accessing management interfaces
- Requests to unexpected URLs
- POST requests to static file paths (webshell activity)
- Authentication from unexpected locations
5. Check Scheduled Tasks
crontab -l
cat /etc/crontab
ls -la /etc/cron.*
Persistence often shows up here.
6. Review ns.conf Changes
diff /nsconfig/ns.conf /nsconfig/ns.conf.backup
Any unexpected changes to configuration?
If You’re Compromised
Found evidence of compromise? Here’s the playbook:
Immediate:
- Isolate the device (don’t power off - you want forensics)
- Revoke all credentials that touched the device
- Block attacker IPs at perimeter (if identified)
- Check other internet-facing assets for similar compromise
Investigation:
- Take forensic images before changing anything
- Analyze webshell/malware functionality
- Determine what data was accessed
- Map lateral movement (if any)
- Check for persistence mechanisms
Recovery:
- Rebuild NetScaler from known-good image (don’t just patch)
- Apply all patches
- Rotate all credentials (including service accounts)
- Reset VPN user passwords
- Review and harden configuration
Don’t just patch a compromised device. If they had code execution, they may have persistence you haven’t found. Rebuild.
The Pattern Continues
This is the same story we keep living:
- Critical vulnerability in edge device
- Patch released
- Slow patching due to change management/scheduling
- Mass exploitation begins
- Scramble
Citrix. Fortinet. Palo Alto. Ivanti. Cisco. Every major vendor. Every year.
The edge device model is broken. These devices are:
- Exposed to the internet by design
- Running complex code with limited visibility
- Critical infrastructure that’s hard to patch quickly
- Targets for sophisticated attackers
And we keep being surprised when they get owned.
Longer Term
After this is cleaned up, consider:
1. Reduce internet-facing exposure
Does the management interface really need to be on the internet? Can VPN authentication use additional controls?
2. Monitoring for edge devices
These devices don’t run EDR. You need network and log-based detection. Monitor for:
- Unusual outbound connections
- New files in suspicious locations
- Unexpected administrative access
3. Faster patching process
What’s your time-to-patch for critical vulns in edge devices? If it’s more than 48-72 hours, that’s too slow for the current threat landscape.
4. Assume breach planning
If your NetScaler gets owned tomorrow, what’s the blast radius? Network segmentation? Credential isolation? The answer should be “limited” not “everything.”
Current Status
As of this writing, exploitation is ongoing. Attackers are scanning for unpatched devices constantly. New compromises happening daily.
If you haven’t checked your NetScaler devices this week, do it now.
The lesson from every edge device vulnerability is the same: patch faster, monitor better, assume breach. We keep learning it the hard way.
Related Articles
Ivanti Connect Secure Under Mass Exploitation - What We Know So Far
Critical authentication bypass vulnerabilities in Ivanti's VPN appliances are being actively exploited. Here's the timeline, technical details, and what you should do right now.
HPE OneView's CVSS 10.0: An Unauthenticated API Endpoint That Runs Commands
CVE-2025-37164 is a maximum-severity RCE in HPE OneView. An unauthenticated REST API endpoint executes arbitrary commands. 40,000+ exploit attempts on day one.
React2Shell: The CVSS 10.0 That Hit 85,000 Servers
CVE-2025-55182 turned React Server Components into a one-request RCE. Nation-states and criminals moved within hours.