Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New vulnerabilities in Citrix virtual apps allow RCE to be attacked via MSMQ misconfiguration
Global Security

New vulnerabilities in Citrix virtual apps allow RCE to be attacked via MSMQ misconfiguration

AdminBy AdminNovember 12, 2024No Comments3 Mins Read
Citrix Virtual Apps
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 12, 2024Ravi LakshmananVirtualization / Vulnerability

Citrix Virtual Apps

Cybersecurity researchers have discovered new security flaws affecting Citrix virtual applications and desktops that could be exploited for unauthenticated remote code execution (RCE).

Release, according to the findings of observation towerrooted in Art Session recording a component that allows system administrators to capture user activity and record keyboard and mouse input along with a desktop video stream for auditing, compliance, and troubleshooting.

Specifically, the vulnerability exploits “a combination of carelessly exposed MSMQ an instance with misconfigured permissions that uses BinaryFormatter can be accessed from any host over HTTP to perform RCE without authentication,” said security researcher Sina Heirkha.

Cyber ​​security

The vulnerability details listed below –

  • CVE-2024-8068 (CVSS Score: 5.1) – Elevate access privileges to the NetworkService account
  • CVE-2024-8069 (CVSS Score: 5.1) – Limited remote code execution with NetworkService account privilege

However, Citrix noted that for successful exploitation, an attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server’s domain and on the same internal network as the session recording server. The bugs have been fixed in the following versions –

  • Citrix Virtual Apps and Desktops before patch 2407 24.5.200.8
  • Citrix Virtual Apps and Desktops 1912 LTSR to CU9 patch 19.12.9100.6
  • Citrix Virtual Apps and Desktops 2203 LTSR to patch CU5 03/22/5100.11
  • Citrix Virtual Apps and Desktops 2402 LTSR to patch CU1 02/24/1200.16

It should be noted that Microsoft has urged developers should stop using BinaryFormatter for deserialization because the method is unsafe when used with untrusted input. The BinaryFormatter implementation was removed with .NET 9 as of August 2024.

“BinaryFormatter was implemented before deserialization vulnerabilities became a well-known threat category,” the tech giant said notes in its documentation. “As a result, the code is not in line with current best practice. BinaryFormatter.Deserialize may be vulnerable to other categories of attacks, such as information disclosure or remote code execution.”

At the heart of the problem is the Session Recording Storage Manager, a Windows service that manages the recorded session files received from each computer that has this feature enabled.

Cyber ​​security

While Storage Manager receives session records as message bytes through the Microsoft Message Queuing (MSMQ) service, the analysis found that a serialization process is used to transfer the data and that the queue instance has excessive privileges.

Worse, the data received from the queue is deserialized using the BinaryFormatter, allowing an attacker to abuse unsafe permissions set during the initialization process to pass specially crafted MSMQ messages sent over HTTP through the internet.

“We know there is an instance of MSMQ with misconfigured permissions, and we know it uses the infamous BinaryFormatter class to perform deserialization,” Heirkha said, detailing the steps involved in creating the exploit. “The cherry on top is that it can be reached not only locally, via MSMQ’s TCP port, but also from any other host, via HTTP.”

“This combination allows for good old unauthenticated RCE,” the researcher added.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.