Citrix informed customers this week that it has patched a vulnerability in its Workspace app that can allow an attacker to remotely hack the computer running the affected application.
The security hole, tracked as CVE-2020-8207 and classified as high severity, affects the automatic update service used by the Citrix Workspace app for Windows, and it can be exploited by a local attacker to escalate privileges or by a remote attacker for arbitrary command execution.
The vulnerability was discovered by a researcher from Pen Test Partners. The company has published a blog post explaining how the weakness can be exploited by a local attacker to escalate privileges to SYSTEM and remotely for arbitrary command execution.
Pen Test Partners has shared technical details, along with a video showing how a malicious actor could exploit the vulnerability.
“By sending a crafted message over a named pipe and spoofing the client process ID, the Citrix Workspace Updater Service can be tricked into executing an arbitrary process under the SYSTEM account,” Pen Test Partners explained in its blog post. “Whilst a low privilege account is required to perform the attack, environments that do not implement SMB signing are particularly vulnerable since an attack can be achieved without knowing valid credentials through NTLM credential relaying.”
According to Citrix, the flaw impacts Citrix Workspace app for Windows 1912 LTSR and 2002, and it has been patched with the release of versions 1912 LTSR CU1 and 2006.1.
The vendor has pointed out that only the Windows version of the Workspace app is affected and the vulnerability only exists if the application was installed using a local or domain admin account. Remote attacks are only possible if SMB is enabled and the affected update service is running.
Earlier this month, Citrix informed customers that it patched 11 vulnerabilities in its ADC, Gateway, and SD-WAN networking products, but downplayed their impact. However, a few days after the flaws were disclosed, researchers noticed that someone had already started scanning the web for vulnerable systems.
Citrix last week denied that its systems were breached after reports emerged that information on the company’s users had been offered for sale on the dark web. The company clarified that the data came from a third-party and claimed that it was not very sensitive.
Related: Citrix Completes Investigation into Data Breach
Related: Citrix ShareFile Vulnerabilities Expose User Files
Related: Attacker Installs Backdoor, Blocks Others From Exploiting Citrix ADC Vulnerability

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
