Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/23/2019
04:30 PM
50%
50%

Citrix Urges Firms to Harden Configurations After Flaw Report

A vulnerability in two of the company's appliances opens 80,000 networks up for exploitation.

A vulnerability in two network appliances made by Citrix and used by an estimated 80,000 companies worldwide could be exploited to allow an attacker to gain access to a firm's local network from the internet, according to advisories published today. 

The vulnerability (CVE-2019-19781), which affects the Citrix Application Delivery Controller and Citrix Gateway, allows an unauthenticated attacker to run arbitrary code on the appliances, according to Citrix's advisory on the issue. While few details of the vulnerability have been released, Citrix did document several mitigation steps that will protect users but has not yet released a patch.

Because it is so easy to exploit and does not require authentication, the vulnerability is the highest criticality, says Mikhail Klyuchnikov, one of the three vulnerability researchers credited with finding the issue and a Web-application security specialist with vulnerability assessment firm Positive Technologies.

"It's really easy to exploit, [and] it's very reliable," Klyuchnikov says. "[We don't] know if it is being used in the wild."

Citrix appliances are often used as gateways for application load balancing and remote access. Judging from the mitigation steps, the Citrix issue appears to affect the virtual private networking component of the appliances' software. 

Of the 80,000 companies in 158 countries potentially at risk, the plurality — 38% — are based in the United States. An addition 9% are in Germany, 6% in the United Kingdom, 5% in the Netherlands, and 4% in Australia.

"Citrix applications are widely used in corporate networks," said Dmitry Serebryannikov, director of the security audit department with Positive Technologies, in a statement. "This includes their use for providing terminal access of employees to internal company applications from any device via the Internet. Considering the high risk brought by the discovered vulnerability, and how widespread Citrix software is in the business community, we recommend information security professionals take immediate steps to mitigate the threat."

Positive Technologies reported the vulnerability to Citrix in early December, according to the firm. Citrix responded quickly with risk mitigation measures, the company said. An attack can be completed in less than a minute, and some Citrix products have been vulnerable for more than five years, Positive Technologies stated.

The appliance, many sold under the NetScaler brand, is a common way to gain remote access to networks or applications, Klyuchnikov says.

"Using Citrix NetScaler to access the internal network is common practice because this software has the ability to implement SSL VPN features," he says. "This feature, for example, can be used to access the corporate network by employees who work remotely."

In its advisory on the vulnerability, security firm Symantec recommends companies block external access at the edge of the network and use intrusion detection systems to monitor links that need to be accessible. 

"If global access isn't needed, filter access to the affected computer at the network boundary," Symantec stated. "Restricting access to only trusted computers and networks might greatly reduce the likelihood of successful exploits."

This is not the first time Citrix has had to deal with a serious security weakness. In March, the FBI notified the company that attackers had breached its network and downloaded business documents.

With the latest security vulnerability, two other security experts — Gianlorenzo Cipparrone and Miguel Gonzalez of online betting service Paddy Power Betfair plc — are credited with the discovery of the issue. 

Citrix did not respond to an e-mail requesting comment.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "SIM Swapping Attacks: What They Are & How to Stop Them."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
CVE-2021-3162
PUBLISHED: 2021-01-15
Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
CVE-2021-21242
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
CVE-2021-21245
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...
CVE-2021-21246
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/` endpoint there are no security checks enforced so it is possible to retrieve ar...