Critical Vulnerabilities in Citrix Virtual Apps and Desktops Actively Exploited

CVE-2024-8068 & CVE-2024-8069 - Citrix Session Recording Manager

Two vulnerabilities in Citrix’s “Virtual Apps and Desktops” remote access solution, CVE-2024-8068 and CVE-2024-8069, are actively being exploited in the wild, according to a report from Johannes B. Ullrich, Ph.D., Dean of Research at SANS.edu. These vulnerabilities arise from a confluence of factors, including an exposed and misconfigured Microsoft Message Queuing (MSMQ) instance coupled with the utilization of the insecure BinaryFormatter class within the Citrix software stack.

The exposed MSMQ service, accessible via HTTP, allows unauthorized remote attackers to interact with the service. Exploitation of this vulnerability, in conjunction with the inherent insecurity of the BinaryFormatter class, enables attackers to execute arbitrary code with the privileges of the NetworkService account. This effectively grants attackers significant control over the affected Citrix server and all associated virtual desktop sessions.

Citrix’s Session Recording Manager, a component designed to facilitate administrative review of user sessions, also has a deserialization vulnerability. This vulnerability provides an additional attack vector for malicious actors to compromise the system. Proof-of-concept (PoC) exploit code for this vulnerability has been publicly released on GitHub.

Evidence suggests that these vulnerabilities are actively being exploited. Analysis conducted by Dr. Johannes B. Ullrich, Dean of Research at SANS Institute, indicates that attackers are leveraging these flaws to execute malicious payloads delivered via a command-and-control server potentially located in Johannesburg, South Africa. The Shadowserver Foundation confirmed that exploitation attempts began on November 13th.

Citrix has released a security bulletin acknowledging these vulnerabilities and urging customers to apply the latest patches for Session Recording Manager immediately.

Related Posts: