Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Posted on July 3, 2025July 3, 2025 By CWS

Citrix has issued an pressing advisory warning prospects of widespread authentication failures following current updates to NetScaler builds 14.1.47.46 and 13.1.59.19.

The updates, launched as a part of the corporate’s ongoing secure-by-design initiative, have inadvertently precipitated important disruption to enterprise authentication methods throughout a number of organizations worldwide.

The authentication failures manifest as damaged login pages and full lack of ability to entry NetScaler Gateway portals, notably affecting environments using DUO configurations based mostly on RADIUS authentication, SAML implementations, and customized Identification Supplier (IDP) configurations.

Organizations counting on these authentication strategies have reported full service outages, forcing IT groups to implement emergency workarounds to take care of enterprise continuity.

The basis trigger has been recognized as the automated enablement of Content material Safety Coverage (CSP) headers by default within the newest NetScaler builds.

Whereas CSP headers are designed to mitigate cross-site scripting (XSS) and code injection assaults, their sudden activation has created compatibility points with current authentication scripts and third-party integrations that had been functioning correctly earlier than the replace.

Citrix analysts recognized the problem stems from the strict CSP guidelines blocking authentic scripts and assets that had been beforehand allowed to execute with out restrictions.

The coverage’s restrictive nature, whereas enhancing safety in opposition to browser-based threats, has confirmed incompatible with many customized authentication configurations that enterprises have deployed over time, creating an sudden safety versus performance battle.

Technical Decision and Mitigation

To deal with the speedy disaster, Citrix has supplied a short lived workaround requiring directors to disable the default CSP header by means of the NetScaler command-line interface.

The decision includes executing particular instructions on affected methods:-

set aaa parameter -defaultCSPHeader DISABLED
save ns config

Moreover, directors should flush the cache utilizing the command flush cache contentgroup loginstaticobjects to make sure speedy implementation of modifications throughout all affected authentication methods.

Examine reside malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Auth, Authentication, Citrix, Failures, Fix, NetScaler, Update, Vulnerability, Warns

Post navigation

Previous Post: Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
Next Post: Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website

Related Posts

Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware Cyber Security News
China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure Cyber Security News
Windows Defender Enhancements for Advanced Threat Mitigation Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News
Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News
Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News