ADC

Signature update version 152

New signatures rules are generated for the vulnerabilities identified in the week 2025-05-07. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 152 applicable for Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998300 CVE-2025-32103 WEB-MISC CrushFTP Prior to 10.8.4 and 11.3.1 - getAdminXMLListing SMB Attacks Vulnerability (CVE-2025-32103)
998301 CVE-2025-22457 WEB-MISC Ivanti Connect Secure Prior to 22.7R2.6 - Remote Code Execution Vulnerability (CVE-2025-22457)
998302 CVE-2024-8517 WEB-MISC SPIP Multiple Versions - Unauthenticated RCE Vulnerability (CVE-2024-8517)
998303 CVE-2025-32102 WEB-MISC CrushFTP Prior to 10.8.4 and 11.3.1 - Server Side Request Forgery Vulnerability (CVE-2025-32102)
998304 CVE-2025-32432 WEB-MISC Craft CMS Multiple Versions - Remote Code Execution Vulnerability via URL (CVE-2025-32432)
998305 CVE-2025-32432 WEB-MISC Craft CMS Multiple Versions - Remote Code Execution Vulnerability via FORM (CVE-2025-32432)
998306 CVE-2024-36409 WEB-MISC SuiteCRM Prior To 7.14.4 and 8.6.1 - SQLi Vulnerability Via Tree Data entry point (CVE-2024-36409)
Signature update version 152