Etienne Coppin
-
Posts
20 -
Joined
-
Last visited
-
Days Won
1
Content Type
Forums
Articles
Labs
Videos
TechZone
Citrix Community Articles
Events
Profiles
Posts posted by Etienne Coppin
-
-
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031aPatch, scan, but certainly re-control for compromise
-
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031a -
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031a -
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031a -
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031a -
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031a -
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031a- 1
-
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031aPatch, scan but also proceed rigorous control for compromission
-
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we found some compromised appliances (mitigation proposed by Citrix has been implemented too late on 12/01/2020), we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the mitigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges.. Re-control everything after remediation.Read carefully these both articles for the verification steps and other recommandations
Read also this one, not so funny :
- 1
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we found some compromised appliance, we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the mitigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges.. Recontrol everything after remediation.Read carefully these both articles for the verification steps and other recommandations
Read also this one, not so funny :
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we found some compromised appliance, we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the mitigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges.. Recontrol everything after remediation.Read carefully these both articles for the verification steps and other recommandations
Read also this one, not so funny :
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we found some compromised appliance, we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the mitigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges.. Recontrol everything after remediation.Read carefully these both articles for the verification steps and other recommandations
Read also this one, not so funny :
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we found some compromised appliance, we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the mitigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges.. Recontrol everything after remediation.Read carefully these both articles for the verification steps and other recommandations
Read also this one, not so funny :
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the miyigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges.Read carefully these both articles for the verification steps
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the miyigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges.Read carefully these both articles for the verification steps
- 2
-
Patching and mitigation will be probably not enough. You have to re-check and control all your appliances.
In our case, we decide to restore instances (or re-image instances) from 1st week of december before the CVE-2019-19781 publication, implement the miyigation proposed by Citrix, revoke/renew certificates + reset of all passwords involved with NetScaler + reset of all administrative accounts with priviledges. Read carefully these both articles
CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller. Can Someone tell the effect of this Vulnerability on our Citrix devices.
in Core ADC use cases
Posted
CISA : AA20-031A: Detecting Citrix CVE-2019-19781
https://www.us-cert.gov/ncas/alerts/aa20-031a
Patch, scan, but certainly re-control for compromise