43
Citrix Workspace App Vulnerable to Privilege Escalation Attacks
(gbhackers.com)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
We've been dealing with this shit for the past 3 days.
How the fuck do you even create a security hole that lets unprivileged users accessing a client app get SYSTEM rights to the server?
Didn't even know that was technically possible even if you tried to program it.
Oh well, at least we'll have an up-to-date client device inventory and no more BYOD shenanigans at the end of it.
Judging from recent forum posts, Citrix still installs a hidden server running with privileged access as part of their client software. It's almost impossible for normal users to remove it.
Wasn't this the same behavior that got Zoom blocked briefly on macOS a few years ago? https://www.macobserver.com/news/apple-update-remove-zoom/
I wish we could get rid of Citrix yesterday, but:
Got any links about the hidden server aspect of Citrix? I'd love to read more (I'd google it but these days Google is just... gestures vaguely