Protection for Citrix vulnerability CVE-2019-19781

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Protection for Citrix vulnerability CVE-2019-19781

L2 Linker

Hi,

 

Is there any official word when PA will get protection for CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller and Citrix Gateway?

https://support.citrix.com/article/CTX267027

 

Thanks.

6 REPLIES 6

L3 Networker

@RREALICA 

 

PA have not released signature for this vulnerability yet. But you can monitor it at threat vault.

 

https://threatvault.paloaltonetworks.com/

I don't see anything in threat vault for that CVE...is that because there is no signature yet and it will show up when there is one?

@zachzoom 

 

Yes, it will show up in Threat Vault when once PA defined signatures for it.

fyi in case anyone is interested: SANS Webcasst: What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-19781

 

https://www.sans.org/webcasts/about-critical-citrix-gateway-netscaler-vulnerability-cve-2019-19781-1...

 

 

Signature is released in content update 8224.

L0 Member

Hi,

 

As there is an signature sinds a couple of days, i indeed see some hits, and reset actions.  But i wonder how the palo will detect this vulnerability, because we don't have ssl decryption enabled, and our citrix is only available on https.

 

Does anyone have some theorie ?

 

Best regards,

Twan Hermans

  • 9878 Views
  • 6 replies
  • 6 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!