Friday, January 24, 2025
HomeCVE/vulnerabilityCitrix Warns That Hackers May Exploit the New Patched Flaw Quickly

Citrix Warns That Hackers May Exploit the New Patched Flaw Quickly

Published on

SIEM as a Service

Follow Us on Google News

Citrix released an update covering multiple vulnerabilities in Citrix Endpoint Management (CEM) also referred to as XenMobile. Chaining the vulnerabilities allows an unauthenticated remote attacker to gain control over the Citrix Endpoint Management (CEM) server.

The vulnerabilities can be tracked as CVE-2020-8208, CVE-2020-8209, CVE-2020-8210, CVE-2020-8211, and CVE-2020-8212.

Citrix Version Affected

The vulnerability impacts vary between the specific version of the software that is used and to exploit the vulnerability no authorization was needed.

An unauthenticated attacker can exploit the vulnerability by using a specially crafted URL that allows gaining access for sensitive data such as configuration files and encryption keys.

Following versions of Citrix Endpoint Management(CEM) affected with critical severity vulnerabilities

  • XenMobile Server 10.12 before RP2
  • XenMobile Server 10.11 before RP4
  • XenMobile Server 10.10 before RP6
  • XenMobile Server before 10.9 RP5

Following are the versions affected by medium and low severity vulnerabilities

  • XenMobile Server 10.12 before RP3
  • XenMobile Server 10.11 before RP6
  • XenMobile Server 10.10 before RP6
  • XenMobile Server before 10.9 RP5

Citrix recommends users with versions 10.9, 10.10, 10.11, and 10.12 to apply for the latest rolling patches and version prior to 10.9.x are recommended to upgrade with the supported version.

“We recommend these upgrades be made immediately. While there are no known exploits as of this writing, we do anticipate malicious actors will move quickly to exploit.”

Citrix said that the cloud version of XenMobile is already patched, “but hybrid rights users need to apply the upgrades to any on-premises instance.”

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read:

Hackers Actively Scanning & Constantly Attempt To Exploit Citrix ADC Vulnerabilities

Critical Bugs with Citrix Allow Unauthenticated Code Injection, Privilege Escalation DoS & Data Theft

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights

A startling security flaw found in Android-based kiosk tablets at luxury hotels has exposed...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights

A startling security flaw found in Android-based kiosk tablets at luxury hotels has exposed...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...