New Citrix Vulnerabilities Allow Unauthenticated Code Execution

In recent developments, cybersecurity researchers at watchTowr have uncovered new vulnerabilities in Citrix Virtual Apps and Desktop systems that could allow unauthenticated remote code execution (RCE) attacks through Microsoft Message Queuing (MSMQ) misconfigurations. These vulnerabilities, identified specifically as CVE-2024-8068 and CVE-2024-8069, involve critical flaws in the Session Recording component, which is often used by administrators to monitor user activities for various operational purposes. The severity of these vulnerabilities underscores the importance of regular updates and adherence to modern security protocols to protect enterprise environments.

The Root Cause of Vulnerabilities

Exposed MSMQ Instances and Misconfigured Permissions

The core issue lies in the combination of exposed Microsoft Message Queuing (MSMQ) instances with misconfigured permissions, paired with the use of the insecure BinaryFormatter for deserialization. This combination creates a fertile ground for exploits when accessed via HTTP from any host, leading to potential RCE without the necessity for authentication. The specific vulnerabilities, CVE-2024-8068 and CVE-2024-8069, each contribute to unauthorized privilege escalation and limited RCE with NetworkService Account privileges, respectively. Both vulnerabilities carry a CVSS score of 5.1, which denotes a moderate severity but certainly not trivial considering the possible impact on enterprise systems.

Citrix acknowledged the presence of these vulnerabilities and outlined the conditions necessary for successful exploitation. They indicated that an attacker must be an authenticated user within the same Windows Active Directory domain and on the same intranet as the session recording server for the attack to be successful. Nevertheless, the existence of a proof-of-concept (PoC) exploit and observations of potential exploitation attempts by entities such as the Shadowserver Foundation suggest that these vulnerabilities are both practical and being actively explored by malicious actors. This increases the urgency for organizations to deploy available hotfixes and update their systems promptly.

Vulnerabilities in Session Recording Storage Manager

The heart of the problem involves the Session Recording Storage Manager service, which is responsible for handling recorded session files. During normal operations, this service receives session recordings via MSMQ, which mistakenly uses the BinaryFormatter for deserialization, even though the permissions settings are inherently insecure. This misconfiguration allows attackers to exploit the system by sending specially crafted messages over HTTP, leading to unauthorized execution of code on vulnerable machines. The misuse of BinaryFormatter, known for its susceptibility to untrusted input, exacerbates the situation. It has been widely recommended, most notably by Microsoft, to discontinue its use for deserialization due to these inherent risks.

The potential for these vulnerabilities to be exploited has serious implications. WatchTowr refutes Citrix’s downplaying of the risk, asserting that the vulnerability is indeed severe and capable of substantial system compromise. The availability and dissemination of a PoC exploit emphasize the need for immediate action from users and administrators to protect their systems from possible intrusion and data breaches. The cybersecurity community’s rapid response to these vulnerabilities reflects the critical nature of adherence to updated security protocols and the importance of replacing outdated and insecure deserialization practices with more secure alternatives, reinforcing the need for continuous vigilance and proactive measures in the ever-evolving landscape of cybersecurity.

Citrix’s Response and Recommendations

Hotfixes and Security Updates

In response to the identification and validation of these vulnerabilities, Citrix promptly took action by releasing hotfixes aimed at addressing the security flaws in various versions of the affected software. The updates are as follows: Citrix Virtual Apps and Desktops before version 2407 now require hotfix 24.5.200.8, Citrix Virtual Apps and Desktops 1912 LTSR before CU9 mandate hotfix 19.12.9100.6, Citrix Virtual Apps and Desktops 2203 LTSR before CU5 necessitate hotfix 22.03.5100.11, and Citrix Virtual Apps and Desktops 2402 LTSR before CU1 require hotfix 24.02.1200.16. Each of these updates serves to mitigate the risk posed by the discovered vulnerabilities and fortify systems against potential exploitation.

Microsoft has also stepped in to mitigate the risks associated with these vulnerabilities by recommending the discontinuation of the BinaryFormatter for deserialization due to its proven vulnerability to untrusted input. As a direct measure, BinaryFormatter has been removed from .NET 9 as of August 2024, further emphasizing the shift toward more secure practices in software development. This policy change by Microsoft indicates a broader consensus in the technology industry about the need to adopt robust security measures and discontinue the use of insecure methods whenever possible.

Importance of Keeping Systems Updated

The urgency for users to update their Citrix installations to mitigate the risks associated with these vulnerabilities cannot be overstated. Failure to apply these hotfixes leaves systems exposed to potential exploitation attempts, underlining the importance of maintaining up-to-date security protocols. These recent findings serve as a stark reminder of the critical need for organizations to consistently monitor and update their software to align with modern security standards.

The broader security community has echoed this sentiment, emphasizing the importance of proper configurations and the adoption of secure software development practices. Ensuring that deserialization practices adhere to current security benchmarks can significantly reduce the risk of unauthorized access and code execution. As cybersecurity threats continue to evolve, the implementation of best practices and the regular application of security updates stand out as fundamental measures to safeguard enterprise environments from potential exploits and data breaches.

Conclusion

In a significant development, cybersecurity experts at watchTowr have discovered new security vulnerabilities in Citrix Virtual Apps and Desktop systems. These vulnerabilities, identified as CVE-2024-8068 and CVE-2024-8069, could allow unauthenticated remote code execution (RCE) attacks, specifically through misconfigurations in Microsoft Message Queuing (MSMQ). These flaws are particularly critical because they involve the Session Recording component, a tool frequently used by administrators to keep track of user activities for various operational purposes.

The identified flaws highlight the pressing need for organizations to perform regular system updates and follow modern security protocols diligently. Ensuring that software and systems are up-to-date can protect enterprise environments from such critical vulnerabilities. This discovery serves as a reminder of the ever-evolving landscape of cybersecurity threats and the importance of remaining vigilant. It emphasizes that adhering to best practices in security and maintaining a proactive stance can significantly mitigate potential risks.

Explore more