Citrix’s monitoring tool, uberAgent, has been found to contain a critical vulnerability that poses a significant security risk to its users. This flaw, tracked under CVE-2024-3902, allows attackers to escalate their privileges within systems running versions of uberAgent before 7.1.2. The vulnerability specifically arises in configurations where uberAgent is set up with certain CitrixADC metrics and a PowerShell-based WmiProvider, enabling attackers with network access to manipulate the tool’s data collection features to execute commands with elevated privileges.
The affected configurations include any setup of uberAgent from versions 7.0 to 7.1.1 that uses at least one CitrixADC_Config entry alongside certain CitrixADC metrics such as CitrixADCPerformance, CitrixADCvServer, CitrixADCGateways, and CitrixADCInventory. For these versions, the criticality of the flaw is heightened if the WmiProvider is set to PowerShell with at least one CitrixSession metric configured. This setup creates an exploitable environment whereby the flaw could be triggered, allowing unauthorized command execution.
In response to this discovery, Citrix has issued an urgent advisory for all its customers using the affected versions to update their uberAgent installations to version 7.1.2 or later as a preventive measure. For organizations that cannot immediately upgrade, Citrix has suggested interim mitigation steps. These include disabling all CitrixADC metrics by removing specific timer properties and changing the WmiProvider setting from PowerShell to WMIC or ensuring it is not configured at all. These steps are intended to temporarily reduce the risk until the software can be securely updated.