• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Citrix ADC and Gateway Critical Vulnerabilities

January 22, 2020 By Emil Hozan

Attention, there is a new path traversal vulnerability (CVE-2019-19781) with a 9.8 severity rating that can allow unauthenticated threat actors to execute arbitrary code on several Citrix products. These products include application delivery controllers (ADC), Gateways, and SD-WAN WANOP. Citrix provided a patch timeline that lists the dates of various patches for their respective product counterparts – all patches are expected to be released by the end of January 2020.

The Hacker News’ Mohit Kumar wrote a great blog post detailing the above vulnerabilities, and highlighting the currently active attacks. Positive Technologies’ security researcher Mikhail Klyuchnikov was responsible for first identifying this vulnerability in late December 2019. His research article highlights the fact that the vulnerability only takes a minute to exploit, and affected more than 80,000 companies in more than 158 countries. The more recent article published by Mohit on January 20, 2020, claims that number has dropped to 15,000 companies.

At this point, if your company uses Citrix, immediately reference the patch timeline to get a better understanding of when to expect an update, and then apply it right away. The patches for ADC and Gateway versions 11.1 and 12.0 have already been released. All remaining releases are expected on January 24, 2020. Note that each product requires a separate update, which you can determine by looking at your current version. Remote code execution vulnerabilities are not to be taken lightly. Stay safe, folks.

 

Share This:

Related

Filed Under: Editorial Articles Tagged With: citrix, Remote Code Execution (RCE)

Comments

  1. Kris says

    January 23, 2020 at 11:48 pm

    When will there be a IPS signature to detect this CVE-2019-19781 ?

    Reply
    • Emil Hozan says

      February 10, 2020 at 10:13 am

      Hello Kris,

      Thank you for reading and engaging with this post! To answer your question, there are currently two IPS signatures that correspond with CVE-2019-19781:

      113656; link: https://www.watchguard.com/SecurityPortal/ThreatDetail.aspx?rule_id=1136561&includedIn=Full,%20Enhanced,%20Standard

      1136564; link: https://www.watchguard.com/SecurityPortal/ThreatDetail.aspx?rule_id=1136564&includedIn=Full,%20Enhanced,%20Standard

      As long as you have IPS enabled and on the latest update, you should be protected from this threat.

      Regards,
      Emil Hozan

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Weaponizing WinRAR
  • The Qakbot Takedown
  • iPhone’s Latest 0-Day
  • Meta’ One Good Deed

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Meta’ One Good Deed
  • iPhone’s Latest 0-Day
  • The Qakbot Takedown
  • Weaponizing WinRAR
  • U.S. Cyber Trust Mark
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use