CVE-2019-19781 Report Request
This critical vulnerability allows unauthenticated remote attackers to execute commands (RCE) on targeted Citrix Application Delivery Controller (ADC) and Citrix Gateway (also known as NetScaler Gateway) servers after chaining an arbitrary file read/write (directory traversal) flaw. Further exploitation can allow threat actors to gain a foothold inside private networks and conduct further malicious activity, such as spreading ransomware.
Bad Packets™ summary report is available here:
The list of vulnerable Citrix ADC and NetScaler Gateway servers is freely available for authorized government CERT, CSIRT, ISAC, and law enforcement teams to review. To obtain a report of vulnerable hosts impacting your constituency, please fill out the form below.
CERT / CSIRT / ISAC – FIRST team membership preferred, see
Government / Law enforcement
Microsoft® Azure customer
Please provide the country, autonomous system number (ASN), IP netblocks (BGP prefix in CIDR format), or domain names of your constituency:
This report request is for non-commercial use only and may not be modified, copied, republished, displayed, posted, or sold in any form or by any means, in whole or in part, without prior written permission from Bad Packets LLC.
Never submit passwords through Google Forms.
This form was created inside of Bad Packets LLC.