Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Posted on July 3, 2025July 3, 2025 By CWS

Citrix has issued an pressing advisory warning prospects of widespread authentication failures following current updates to NetScaler builds 14.1.47.46 and 13.1.59.19.

The updates, launched as a part of the corporate’s ongoing secure-by-design initiative, have inadvertently precipitated important disruption to enterprise authentication methods throughout a number of organizations worldwide.

The authentication failures manifest as damaged login pages and full lack of ability to entry NetScaler Gateway portals, notably affecting environments using DUO configurations based mostly on RADIUS authentication, SAML implementations, and customized Identification Supplier (IDP) configurations.

Organizations counting on these authentication strategies have reported full service outages, forcing IT groups to implement emergency workarounds to take care of enterprise continuity.

The basis trigger has been recognized as the automated enablement of Content material Safety Coverage (CSP) headers by default within the newest NetScaler builds.

Whereas CSP headers are designed to mitigate cross-site scripting (XSS) and code injection assaults, their sudden activation has created compatibility points with current authentication scripts and third-party integrations that had been functioning correctly earlier than the replace.

Citrix analysts recognized the problem stems from the strict CSP guidelines blocking authentic scripts and assets that had been beforehand allowed to execute with out restrictions.

The coverage’s restrictive nature, whereas enhancing safety in opposition to browser-based threats, has confirmed incompatible with many customized authentication configurations that enterprises have deployed over time, creating an sudden safety versus performance battle.

Technical Decision and Mitigation

To deal with the speedy disaster, Citrix has supplied a short lived workaround requiring directors to disable the default CSP header by means of the NetScaler command-line interface.

The decision includes executing particular instructions on affected methods:-

set aaa parameter -defaultCSPHeader DISABLED
save ns config

Moreover, directors should flush the cache utilizing the command flush cache contentgroup loginstaticobjects to make sure speedy implementation of modifications throughout all affected authentication methods.

Examine reside malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Auth, Authentication, Citrix, Failures, Fix, NetScaler, Update, Vulnerability, Warns

Post navigation

Previous Post: Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
Next Post: Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

Related Posts

Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads Cyber Security News
2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability Cyber Security News
1inch rolls out expanded bug bounties with rewards up to $500K Cyber Security News
Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News