Vulnerabilities
CVE-2024-8068
UNKNOWNPrivilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain
CVE-2024-7890
UNKNOWNLocal privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows
CVE-2024-7889
UNKNOWNLocal privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows
CVE-2024-6677
UNKNOWNPrivilege escalation in uberAgent
CVE-2024-6149
UNKNOWNRedirection of users to a vulnerable URL in Citrix Workspace app for HTML5
CVE-2024-6148
UNKNOWNBypass of GACS Policy Configuration settings in Citrix Workspace app for HTML5
CVE-2024-6150
UNKNOWNA non-admin user can cause short-term disruption in Target VM availability in Citrix Provisioning
CVE-2024-6286
UNKNOWNLocal Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows
CVE-2024-6151
UNKNOWNLocal Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Virtual Delivery Agent for Windows used by Citrix Virtual Apps and Desktops and Citrix DaaS
CVE-2024-6235
UNKNOWNSensitive information disclosure in NetScaler Console
CVE-2024-5492
UNKNOWNOpen redirect vulnerability allows a remote unauthenticated attacker to redirect users to arbitrary websites in NetScaler ADC and NetScaler Gateway
CVE-2024-5661
MEDIUMAn issue has been identified in both XenServer 8 and Citrix Hypervisor 8.2 CU1 LTSR which may allow a malicious administrator of a guest VM to cause the host to become slow and/or unresponsive.
CVE-2024-2049
MEDIUMServer-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium Editions on or after 11.4.0 and before 11.4.4.46 allows an attacker to disclose limited information from the appliance via Access to management IP.
CVE-2023-6548
MEDIUMImproper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
CVE-2023-4966
CRITICALSensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
CVE-2023-3467
HIGHPrivilege Escalation to root administrator (nsroot)
CVE-2023-3466
HIGHReflected Cross-Site Scripting (XSS)
CVE-2023-3519
CRITICALUnauthenticated remote code execution
CVE-2023-24492
CRITICALA vulnerability has been discovered in the Citrix Secure Access client for Ubuntu which, if exploited, could allow an attacker to remotely execute code if a victim user opens an attacker-crafted link and accepts further prompts.
CVE-2023-24491
HIGHA vulnerability has been discovered in the Citrix Secure Access client for Windows which, if exploited, could allow an attacker with access to an endpoint with Standard User Account that has the vulnerable client installed to escalate their local privileges to that of NT AUTHORITY\SYSTEM.
CVE-2023-24489
CRITICALA vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller.
CVE-2023-24490
MEDIUMUsers with only access to launch VDA applications can launch an unauthorized desktop
CVE-2023-24487
MEDIUMArbitrary file read in Citrix ADC and Citrix Gateway
CVE-2023-24488
MEDIUMCross site scripting vulnerability in Citrix ADC and Citrix Gateway in allows and attacker to perform cross site scripting
CVE-2023-24486
UNKNOWNA vulnerability has been identified in Citrix Workspace app for Linux that, if exploited, may result in a malicious local user being able to gain access to the Citrix Virtual Apps and Desktops session of another user who is using the same computer from which the ICA session is launched.
CVE-2023-24485
UNKNOWNVulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app.
CVE-2023-24483
UNKNOWNA vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.
CVE-2023-24484
UNKNOWNA malicious user can cause log files to be written to a directory that they do not have permission to write to.
CVE-2022-27518
CRITICALUnauthenticated remote arbitrary code execution
CVE-2022-27516
MEDIUMUser login brute force protection functionality bypass
CVE-2022-27510
CRITICALUnauthorized access to Gateway user capabilities
CVE-2022-27513
HIGHRemote desktop takeover via phishing
CVE-2022-27512
UNKNOWNTemporary disruption of the ADM license service. The impact of this includes preventing new licenses from being issued or renewed by Citrix ADM.
CVE-2022-27511
UNKNOWNCorruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted.
CVE-2022-27503
UNKNOWNCross-site Scripting (XSS) vulnerability in Citrix StoreFront affects version 1912 before CU5 and version 3.12 before CU9
CVE-2022-26355
UNKNOWNCitrix Federated Authentication Service (FAS) 7.17 - 10.6 causes deployments that have been configured to store a registration authority certificate's private key in a Trusted Platform Module (TPM) to incorrectly store that key in the Microsoft Software Key Storage Provider (MSKSP). This issue only occurs if PowerShell was used when configuring FAS to store the registration authority certificate’s private key in the TPM. It does not occur if the TPM was not selected for use or if the FAS administration console was used for configuration.
CVE-2020-13998
HIGHCitrix XenApp 6.5, when 2FA is enabled, allows a remote unauthenticated attacker to ascertain whether a user exists on the server, because the 2FA error page only occurs after a valid username is entered. NOTE: This vulnerability only affects products that are no longer supported by the maintainer