Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Citrix Releases More Patches for Exploited Flaw, Tool to Detect Compromise

Citrix has released a new set of patches for the recently disclosed CVE-2019-19781 vulnerability and partnered with FireEye for a tool that tells users if their systems have been compromised via the security flaw.

Citrix has released a new set of patches for the recently disclosed CVE-2019-19781 vulnerability and partnered with FireEye for a tool that tells users if their systems have been compromised via the security flaw.

The vulnerability, disclosed in December 2019, impacts Citrix Application Delivery Controller (ADC) and Gateway (previously known as NetScaler ADC and NetScaler Gateway), and two older versions of SD-WAN WANOP.

Following the public release of PoC exploits earlier this month, attackers started targeting vulnerable deployments — there are tens of thousands of vulnerable systems out there.

Initially, Citrix only published a set of mitigation steps for customers to stay protected. On January 19, however, the company released the first set of patches for the flaw, addressing it in ADC and Gateway versions 11.1 and 12.0.

Now, a second wave of permanent fixes is rolling out to affected customers, for ADC and Gateway versions 12.1 and 13.0. The updated versions are 12.1.55.18 and 13.0.47.24.

Additionally, patches were released for the affected SD-WAN WANOP versions. Before applying the upgrades, however, impacted customers are advised to upgrade their deployments to build 10.2.6b or 11.0.3b as appropriate.

Available via both the Citrix and FireEye GitHub repositories, a new free scanning tool was released to help customers identify potential indicators of compromise (IoC) on their systems and take appropriate steps to stay protected.

The tool is based on known attacks and exploits and is compatible with ADC and Gateway versions 11.1, 12.0, 12.1, 10.5, and 13.0. Additionally, it supports SD-WAN WANOP versions 10.2.6 and 11.0.3, Citrix says.

Both Citrix and FireEye recommend the use of this tool in addition to applying previously released mitigation steps and installing the permanent fixes that have been rolled out.

“While our security and engineering teams have been working around the clock to develop, test and deliver permanent fixes to CVE-2019-19781, we have been actively thinking of ways to assist our customers in understanding if and how their systems may have been affected,” Fermin J. Serna, Citrix’s Chief Information Security Officer, commented.

The utility, however, is not guaranteed to find all evidence of compromise, or all evidence of compromise related to CVE-2019-19781. Thus, when indicators of compromise are discovered, organizations should perform a forensic examination to determine the scope and extent of the incident.

Specific details on how the utility can be used are available in the aforementioned GitHub repositories.

Related: Citrix Releases First Patches for Critical ADC Vulnerability

Related: Attacker Installs Backdoor, Blocks Others From Exploiting Citrix ADC Vulnerability

Related: Exploits Published for Citrix ADC Vulnerability, Patches Coming Soon

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.