8
CVE-2024-8069
- EPSS 63.21%
- Veröffentlicht 12.11.2024 18:15:47
- Zuletzt bearbeitet 26.08.2025 14:44:23
- Quelle secure@citrix.com
- Teams Watchlist Login
- Unerledigt Login
Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Citrix ≫ Session Recording SwEdition- Version < 2407
Citrix ≫ Session Recording Version1912 Update- SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu1 SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu2 SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu3 SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu4 SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu5 SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu6 SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu7 SwEditionltsr
Citrix ≫ Session Recording Version1912 Updatecu8 SwEditionltsr
Citrix ≫ Session Recording Version2203 Update- SwEditionltsr
Citrix ≫ Session Recording Version2203 Updatecu1 SwEditionltsr
Citrix ≫ Session Recording Version2203 Updatecu2 SwEditionltsr
Citrix ≫ Session Recording Version2203 Updatecu3 SwEditionltsr
Citrix ≫ Session Recording Version2203 Updatecu4 SwEditionltsr
Citrix ≫ Session Recording Version2402 Update- SwEditionltsr
Citrix ≫ Session Recording Version2407 Update- SwEdition-
25.08.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
Citrix Session Recording Deserialization of Untrusted Data Vulnerability
SchwachstelleCitrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 63.21% | 0.983 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8 | 2.1 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
secure@citrix.com | 5.1 | 0 | 0 |
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.