Critical Zero-Day Remote Code Execution Vulnerability in Citrix ADC and Gateway Products
CriticalFebruary 27, 2026

Critical Zero-Day Remote Code Execution Vulnerability in Citrix ADC and Gateway Products

A critical zero-day vulnerability (CVE-2023-3519) in Citrix ADC and Gateway products enables unauthenticated remote code execution. Active exploitation observed in the wild affecting thousands of internet-facing systems.

TechnologyFinancial ServicesHealthcareGovernmentManufacturingTelecommunications
📈

Executive Summary

A severe zero-day vulnerability has been discovered in Citrix Application Delivery Controller (ADC) and Gateway products that allows unauthenticated remote code execution. The vulnerability (CVE-2023-3519) affects all supported versions and has been actively exploited in the wild since at least early July 2023. Successful exploitation provides attackers with system-level access to affected devices, potentially compromising entire corporate networks. Citrix has released emergency patches and strongly urges immediate updates, as over 26,000 internet-facing devices remain vulnerable globally. Multiple threat actors, including state-sponsored groups, have been observed weaponizing this vulnerability for initial access, data exfiltration, and deploying ransomware payloads.

Key Findings
  • A severe zero-day vulnerability has been discovered in Citrix Application Delivery Controller (ADC) and Gateway products that allows unauthenticated remote code execution
  • The vulnerability (CVE-2023-3519) affects all supported versions and has been actively exploited in the wild since at least early July 2023
  • Successful exploitation provides attackers with system-level access to affected devices, potentially compromising entire corporate networks
  • Citrix has released emergency patches and strongly urges immediate updates, as over 26,000 internet-facing devices remain vulnerable globally

Overview

On July 18, 2023, Citrix released an emergency advisory regarding a critical zero-day vulnerability (CVE-2023-3519) affecting their ADC and Gateway products. The vulnerability allows unauthenticated attackers to execute arbitrary code remotely on affected systems, leading to complete system compromise.

Affected Products

  • Citrix ADC and Citrix Gateway 13.1 before 13.1-49.13
  • Citrix ADC and Citrix Gateway 13.0 before 13.0-91.13
  • Citrix ADC and Citrix Gateway 12.1 before 12.1-65.25
  • Citrix ADC 12.1-FIPS before 12.1-55.289
  • Citrix ADC 12.1-NDcPP before 12.1-55.289

Technical Analysis

The vulnerability exists in the management interface of affected products and can be exploited without authentication. Initial analysis suggests the flaw involves improper input validation in the management API, leading to remote code execution with SYSTEM/root privileges.

Attack Vector

Attackers can exploit this vulnerability by sending specially crafted HTTP requests to the management interface. No user interaction is required, making this vulnerability particularly dangerous for internet-facing systems.

Impact Assessment

The potential impact of successful exploitation includes:

  • Complete system compromise
  • Unauthorized access to internal networks
  • Data theft and exfiltration
  • Deployment of additional malware or ransomware
  • Man-in-the-middle attacks on SSL traffic

Recommendations

  • Immediately install available security updates
  • Implement IP-based access restrictions for management interfaces
  • Enable Web Application Firewall (WAF) rules
  • Monitor systems for indicators of compromise
  • Review authentication logs for suspicious activity
  • Consider implementing network segmentation

Indicators of Compromise

  • Unexpected outbound connections from Citrix devices
  • Unusual processes or services running on affected systems
  • Modification of system files outside of normal update processes
  • Suspicious entries in HTTP access logs targeting management interfaces
TechnologyFinancial ServicesHealthcareGovernmentManufacturingTelecommunications
zero-dayCitrixADCGatewayRCECVE-2023-3519remote code executionvulnerability
🔗

Sources

2 sources
📅February 27, 2026
🕒2h ago
🔗2 sources

Related Briefs

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories
CriticalFeb 25, 2026

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories

Multiple malicious packages discovered in PyPI and npm repositories executing credential theft and crypto mining payloads. Supply chain attacks leverage typosquatting and dependency confusion techniques to compromise development environments.

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure
CriticalFeb 25, 2026

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure

Chinese state-sponsored threat actor Salt Typhoon (aka Bronze Silhouette) conducts persistent intrusion campaign against US telecommunications providers. The group employs sophisticated living-off-the-land techniques and custom malware to maintain long-term access to critical infrastructure.