Citrix Confirms Ongoing DDoS Attack Impacting NetScaler ADCs

Citrix has confirmed today that an ongoing ‘DDoS attack pattern’ using DTLS as an amplification vector is affecting Citrix Application Delivery Controller (ADC) networking appliances with EDT enabled.

Datagram Transport Layer Security (DTLS) is a communications protocol for securing delay-sensitive apps and services that use datagram transport.

DTLS is based on the Transport Layer Security (TLS) protocol and it is designed to prevent eavesdropping and tampering, and to protect data privacy.

Reports of the attack have started trickling in on December 21st, with customers reporting an ongoing DDOS amplify attack over UDP/443 against Citrix (NetScaler) Gateway devices.

Source: Marco Hofmann

Also Read: Limiting Location Data Exposure: 8 Best Practices

Small number of customers affected

“As part of this attack, an attacker or bots can overwhelm the Citrix ADC DTLS network throughput, potentially leading to outbound bandwidth exhaustion,” the company explained in a threat advisory published earlier today.

“The effect of this attack appears to be more prominent on connections with limited bandwidth.”

The scope of the attack is limited to just “a small number of customers” at the moment according to Citrix and it impacts all ADCs with Enlightened Data Transport UDP Protocol (EDT) enabled.

Furthermore, based on current evidence there are no known Citrix vulnerabilities being actively exploited in this ongoing attack.

If information on products vulnerable to DDoS attacks due to software bugs is discovered during this investigation, it will be published by the Citrix Security Response Team in a separate security advisory.

Update to remove attack vector under development

“Citrix is working on a feature enhancement in DTLS to eliminate the susceptibility to this attack,” the company added.

“Citrix expects to have this enhancement available on the Citrix downloads page for all supported versions on Jan 12, 2021.”

Customers impacted by this DDoS attack can temporarily mitigate it by temporarily disabling DTLS, the amplification vector used by the attackers.

To disable DTLS on your Citrix ADC you will have to issue the following command from the command line interface:

set vpn vserver -dtls OFF

“Disabling the DTLS protocol may lead to limited performance degradation to real time applications using DTLS in your environment,” Citrix added.

Also Read: 10 Practical Benefits of Managed IT Services

“The extent of degradation depends on multiple variables. If your environment does not use DTLS, disabling the protocol temporarily will have no performance impact.”

Customers who can’t immediately disable DTLS in their environment are advised to reach out to Citrix Technical Support.

Privacy Ninja provides GUARANTEED quality and results for the following services: 
DPO-As-A-Service (Outsourced DPO Subscription)
PDPA Compliance Training
P
DPA Compliance Audit
Dig
ital Transformation Consultancy
Data Protection Trustmarks Certification Readiness Consultancy

PDPA Data Protection Software
Vulnerability Assessment & Penetration Testing (VAPT)
Smart Contract Audit

Like & Subscribe:
Facebook
LinkedIn
Twitter
YouTube
Podcast


0 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *