@simontsui Good question. It's not that simple :)

I agree with all of your observations. Personally, I like #CVE_2023_4966 the best for readability.

The cvecrowd crawler searches for #CVE20234966, #CVE2023_4966, #CVE_20234966, #CVE_2023_4966 just to not miss anything. However, the thing that makes it complicated is searching for the hashtags used. There are too many CVE numbers to search for all of them regularly.

When searching for #CVE results do not include ANY of the above formats. Ironically, what it does find is #CVE-2023-4966.

In addition to hashtags, I also use full text search. When searching for "CVE" it finds CVE-2023-4966, but not when its written as a hashtag.

So a reliable way to get my crawler to find CVE posts is to use either the word "CVE", perhaps in combination with a CVE ID as described above, or the hashtag #CVE.

#Citrix #CVE20234966, #Citrixbleed #Netscaler anybody? Make sure you have the patches/updates installed. And use the
software from #Greenbone, a customer of Feilner-IT and world market leader in
opensource vulnerability management. (They are the enterprise distribution of
OpenVAS, former Nessus - the old ones will remember - and they come with a
great recommendation from the BSI... there's an special openVAS page. :-)
English:

https://www.greenbone.net/en/blog/critical-vulnerability-in-citrix-netscaler/

German:

https://www.greenbone.net/blog/kritische-sicherheitsluecke-in-citrix-netscaler/

Critical vulnerability in Citrix Netscaler: Greenbone customers are safe. - Greenbone

There are hundreds of affected devices reported in Germany alone, and probably more than 30,000 worldwide, with a rapidly increasing trend because of an critical vulnerability in Citrix Netscaler. The vulnerability, which has been actively exploited since the end of August, has been reported in numerous media outlets. Users should install the patches provided by Citrix as soon as possible.

Greenbone
exploits/citrix/CVE-2023-4966 at main · assetnote/exploits

Repository to store exploits created by Assetnotes Security Research team - assetnote/exploits

GitHub

For those with Citrix NetScaler ADC/Gateway you’ll want to patch for CVE-2023-4966 released 10th Oct and actively exploited. Details:

https://www.mandiant.com/resources/blog/remediation-netscaler-adc-gateway-cve-2023-4966

#CVE20234966

Remediation for Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966) | Mandiant

Mandiant

"🚨 Critical Flaws in Citrix NetScaler Expose Data & Enable DoS Attacks 🚨"

Citrix NetScaler has been hit with two critical vulnerabilities, CVE-2023-4966 and CVE-2023-4967, exposing sensitive data and enabling DoS attacks. The former, with a CVSS score of 9.4, allows remote exploitation without high-level access, while the latter, scoring 8.2, enables a Denial of Service attack on vulnerable devices. Citrix has rolled out security upgrades, urging customers to update to safeguard their systems. 🛡️🌐

CVE-2023-4966: This one's pretty severe and could allow unauthorized access to sensitive data without needing high-level access or user involvement.
CVE-2023-4967: Another biggie, this could enable a ‘Denial of Service attack’, basically shutting down our systems.

Source: GBHackers by Divya

Tags: #Citrix #NetScaler #Vulnerability #CyberSecurity #DataExposure #DoSAttack #CVE20234966 #CVE20234967 #CyberAttack #InfoSec

🔗 MITRE CVE-2023-4966
🔗 MITRE CVE-2023-4967

Multiple Citrix NetScaler Flaw Leads to DoS Attack and Data Exposure

Critical vulnerabilities in citrix NetScaler ADC and NetScaler Gateway have been found, resulting in sensitive information exposure and a denial of service attack.

GBHackers - Latest Cyber Security News | Hacker News