Security News > 2021 > January > Citrix Releases Updates to Prevent DDoS Attacks Abusing Its Appliances
Citrix on Monday informed customers that it released firmware updates for its Application Delivery Controller and Gateway products to prevent threat actors from abusing the appliances to launch and amplify distributed denial-of-service attacks.
Several people reported a few days before Christmas that they had started seeing DDoS attacks abusing their Citrix ADC and Gateway devices.
Citrix confirmed that malicious actors had been targeting its products in an advisory published on December 24 and the company promised to release updates that would prevent attacks by January 12.
"As part of this attack, an attacker or bots can overwhelm the Citrix ADC DTLS network throughput, potentially leading to outbound bandwidth exhaustion. The effect of this attack appears to be more prominent on connections with limited bandwidth," Citrix said in its advisory.
Marius Sandbu, one of the first people to spot the Citrix DDoS attacks, has published a blog post explaining the role of DTLS and why such attacks are possible.
In order to prevent abuse of its products for DDoS attacks, Citrix on Monday introduced a "Feature enhancement" for DTLS. Users can either enable this feature, or they can disable DTLS if it's not needed.
News URL
Related news
- CUPS vulnerabilities could be abused for DDoS attacks (source)
- Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps (source)
- Recently patched CUPS flaw can be used to amplify DDoS attacks (source)
- Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors (source)
- Largest Recorded DDoS Attack is 3.8 Tbps (source)
- New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries (source)
- U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks (source)
- New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration (source)