naxpet.blogg.se

Citrix workspace app 1912 ltsr for windows
Citrix workspace app 1912 ltsr for windows







citrix workspace app 1912 ltsr for windows

Upgrading to version 1912 LTSR CU4 or 2105 eliminates this vulnerability.ĬVSSv3 info edit VulDB Meta Base Score: 5. The MITRE ATT&CK project declares the attack technique as T1068. The current price for an exploit might be approx. There are neither technical details nor an exploit publicly available. Required for exploitation is a authentication. Access to the local network is required for this attack to succeed. This vulnerability is traded as CVE-2021-22907 since. CVE summarizes:Īn improper access control vulnerability exists in Citrix Workspace App for Windows potentially allows privilege escalation in CR versions prior to 21 LTSR prior to CU4. CVADHELP-17725 When using Citrix Workspace app 1912 LTSR CU4, the devices connected with COM ports greater than 9 might fail to map within the session. The issue occurs when the Receiver clean-up utility fails to start the cleanup process. This is going to have an impact on confidentiality, integrity, and availability. Attempts to upgrade Citrix Workspace App for Windows using the /forceinstall parameter might fail. The manipulation with an unknown input leads to a privilege escalation vulnerability.

citrix workspace app 1912 ltsr for windows

A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in Citrix Workspace App on Windows ( Connectivity Software). Two policies provide anti-keylogging and anti-screen-capturing capabilities in a Citrix HDX session. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Workspace app is the new name for Receiver.

citrix workspace app 1912 ltsr for windows

Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.









Citrix workspace app 1912 ltsr for windows