Security News > 2020 > December > Citrix confirms ongoing DDoS attack impacting NetScaler ADCs

Citrix has confirmed today that an ongoing 'DDoS attack pattern' using DTLS as an amplification vector is affecting Citrix Application Delivery Controller networking appliances with EDT enabled.
Reports of the attack have started trickling in on December 21st, with customers reporting an ongoing DDOS amplify attack over UDP/443 against Citrix Gateway devices.
The scope of the attack is limited to just "a small number of customers" at the moment according to Citrix and it impacts all ADCs with Enlightened Data Transport UDP Protocol enabled.
Based on current evidence there are no known Citrix vulnerabilities being actively exploited in this ongoing attack.
If information on products vulnerable to DDoS attacks due to software bugs is discovered during this investigation, it will be published by the Citrix Security Response Team in a separate security advisory.
News URL
Related news
- Cloudflare mitigated a record-breaking 5.6 Tbps DDoS attack (source)
- Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devices (source)
- Mirai botnet behind the largest DDoS attack to date (source)
- New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks (source)
- DDoS attacks reportedly behind DayZ and Arma network outages (source)
- Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks (source)
- New Eleven11bot botnet infects 86,000 devices for DDoS attacks (source)