Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Citrix Virtual Apps Flaws Enable RCE Attacks

November 13, 2024
Reading Time: 2 mins read
in Alerts
Citrix Virtual Apps Flaws Enable RCE Attacks

Cybersecurity researchers have disclosed critical vulnerabilities in Citrix Virtual Apps and Desktops that could allow unauthenticated remote code execution (RCE) attacks. The flaws, found in the Session Recording component, arise from a misconfigured Microsoft Message Queuing (MSMQ) instance that improperly exposes permissions and utilizes BinaryFormatter for deserialization. This combination allows attackers to craft specially designed MSMQ messages that could be sent over HTTP, potentially leading to the execution of malicious code on affected systems.

The vulnerabilities are identified as CVE-2024-8068 and CVE-2024-8069. CVE-2024-8068 (CVSS score: 5.1) allows privilege escalation to the NetworkService account, while CVE-2024-8069 (CVSS score: 5.1) enables limited remote code execution with NetworkService account privileges. These flaws occur due to excessive permissions on the MSMQ instance, which enables remote access via HTTP, even though the messages are supposed to be transmitted locally. The flaws have been addressed in Citrix Virtual Apps and Desktops versions 2407 hotfix 24.5.200.8, 1912 LTSR before CU9, 2203 LTSR before CU5, and 2402 LTSR before CU1.

Despite Citrix’s assessment that exploitation requires authentication and that attackers would need to be within the same Windows Active Directory domain and intranet as the affected server, researchers have raised concerns about the true severity of the vulnerability. The flaws could potentially allow for unauthenticated access under certain conditions, making the threat much more dangerous than initially understood. Experts suggest that these flaws could lead to full system takeover, as attackers could escalate privileges and execute arbitrary code.

In response to the findings, Citrix has urged users to update their installations to the latest versions. Microsoft has also strongly advised developers to stop using BinaryFormatter due to its vulnerability when handling untrusted input. As of August 2024, BinaryFormatter has been removed from .NET 9. This incident highlights the continued risks of misconfigured services and outdated methods, stressing the importance of staying current with security updates to mitigate potential exploitation.

Reference:
  • New Citrix Virtual Apps Vulnerabilities Enable Remote Code Execution Attacks
Tags: CitrixCyber AlertsCyber Alerts 2024Cyber threatsCybersecurityNovember 2024Remote code executionVulnerabilities
ADVERTISEMENT

Related Posts

Hackers Revive SEO Poisoning

Hackers Revive SEO Poisoning

July 10, 2025
Hackers Revive SEO Poisoning

RondoDox Botnet Exploits Router Flaws

July 10, 2025
Hackers Revive SEO Poisoning

ServiceNow Data Exposure via ACLs

July 10, 2025
Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025

Latest Alerts

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

Subscribe to our newsletter

    Latest Incidents

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    Norwegian Municipalities Hit by Data Breach

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial