Lucene search

K
citrixCitrixCTX277662
HistoryJul 21, 2020 - 4:00 a.m.

Citrix Workspace app for Windows Security Update

2020-07-2104:00:00
support.citrix.com
43

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

36.9%

Description of Problem

A vulnerability has been identified in the automatic update service of Citrix Workspace app for Windows that could result in:

  • A local user escalating their privilege level to that of an administrator on the computer running Citrix Workspace app for Windows.

  • A remote compromise of the computer running Citrix Workspace app when Windows file sharing (SMB) is enabled.

The issue has the following identifier:

  • CVE-2020-8207

This vulnerability affects the following supported versions of Citrix Workspace app for Windows:

  • Citrix Workspace app 2002, 2006 and 2006.1 for Windows
  • Citrix Workspace app 1912 LTSR for Windows (before CU1 Hotfix 1)

Note that this vulnerability was originally reported against a subset of the versions above. However, further investigation has discovered potential variant forms of this attack and the affected versions have been amended accordingly.

This vulnerability does not affect Citrix Workspace app on any other platforms or any supported versions of Citrix Receiver.

Mitigating Factors

This vulnerability only exists if Citrix Workspace app was installed using an account with local or domain administrator privileges. It does not exist when a standard Windows user installed Citrix Workspace app for Windows.

A remote compromise is only possible when the user has enabled Windows file sharing (SMB) and only when the updater service is running. If authentication is required for SMB then an attacker must be able to authenticate before they could exploit this issue.

Users with automatic updates enabled and applied should have already been updated to a fixed version.

What Customers Should Do

The issue has been addressed in the following versions of Citrix Workspace app for Windows:

  • Citrix Workspace App 2008 or later
  • Citrix Workspace App 1912 LTSR CU1 Hotfix 1 (19.12.1001) and later cumulative updates

Note that these versions have been updated since the original publication of this bulletin.

Citrix strongly recommends that customers check if the version they are running has been automatically updated and, if necessary, upgrade to a fixed version as soon as possible.

The latest version of Citrix Workspace app for Windows is available from the following Citrix website location:

<https://www.citrix.com/downloads/workspace-app/windows/&gt;

The latest LTSR version of Citrix Workspace app for Windows is available from the following Citrix website location:

<https://www.citrix.com/downloads/workspace-app/workspace-app-for-windows-long-term-service-release/&gt;

Acknowledgements

Citrix would like to thank Ceri Coburn at Pen Test Partners for working with us to protect Citrix customers during both the initial disclosure of this issue and subsequent variants.

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at _ <http://support.citrix.com/&gt;_.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at _ <https://www.citrix.com/support/open-a-support-case.html&gt;_.

Reporting Security Vulnerabilities

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For details on our vulnerability response process and guidance on how to report security-related issues to Citrix, please visit the Citrix Trust Center at <https://www.citrix.com/about/trust-center/vulnerability-process.html&gt;.

Changelog

Date Change
2020-07-21 Initial Publication
2020-09-08 Revision of fixed versions

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

36.9%