- Citrix Workspace App
- Receiver for Windows
Description of Problem
Citrix Receiver Updates can be configured to deliver only updates marked for Long Term Support Releases (LTSR) or Current Releases (CR). The default is to accept CR updates. These settings can be configured during Citrix Receiver for Windows installation, or using the Group Policy Object administrative template, or the StoreFront Account.
A vulnerability has been identified in Citrix Workspace app and Receiver for Windows that could result in local drive access preferences not being enforced allowing an attacker read/write access to the clients local drives which could enable code execution on the client device.
It is an optional download, provided on an as-is basis by Citrix to serve as an example. Before use, IT administrators must customize the scripts to suit their environment. The uninstall and install scripts may be used as noted in the upgrade guide for Citrix Workspace app for Windows ( CTX135933 ). Important: The product lifecycle strategy for Current Releases (CR) and Long Term Service Releases (LTSR) is described in Lifecycle Milestones. Citrix Virtual Apps and Desktops is a virtualization solution that give IT control of virtual machines, applications, licensing, and security, while providing access anywhere for any device. In order to facilitate migration from CVAD 7.15 LTSR to CVAD LTSR, Citrix has marked the use of the latest 7.15 LTSR VDA as a compatible component of CVAD 1912 LTSR site. However, if there is an issue with the 7.15 VDA, they should expect the fixes to be delivered via a 7.15 Cumulative Update VDA.
This vulnerability has been assigned the following CVE number:
• CVE-2019-11634: Remote Code Execution Vulnerability in Citrix Workspace app for Windows prior to version 1904 and Receiver for Windows to LTSR 4.9 CU6 version earlier than 4.9.6001.
This vulnerability affects all versions of Citrix Workspace app for Windows and Receiver for Windows the fix is contained in Citrix Workspace app version 1904 or later and Receiver for Windows to LTSR 4.9 CU6 version 4.9.6001.
This vulnerability does not affect Citrix Workspace app and Receiver on any other platforms.
Mitigating Factors
Citrix strongly recommends that customers upgrade to the latest Citrix Workspace app for Windows and Receiver for Windows to address this vulnerability. In cases where the upgrade is not immediately possible applying a Client Selective Trust policy via GPO can be used to limit the exploitability of this vulnerability until the upgrade can be completed. The following settings must be set for both x86 and x64 hives and the client system must be rebooted to take effect.
Set all FileSecurityPermission to 0, which means No Access (See CTX133565 for further details)
And
Set InstantiatedSecurityPolicyEditabledefault to false (See CTX128792 for further details)
Note: Restarting Citrix Workspace app and Receiver is not sufficient to apply the changes, the operating system must be rebooted.
What Customers Should Do
A new version of Citrix Workspace app and Receiver for Windows has been released. Citrix strongly recommends that customers upgrade Citrix Workspace app to version 1904 or later and Receiver for Windows to LTSR 4.9 CU6 version 4.9.6001.
The new Citrix Workspace app version is available from the following Citrix website location:
The new LTSR version is available from the following Citrix website location:
Single Sign-on (SSO) could stop working, after applying the security update, for browsers other than Internet Explorer unless explicitly configured. Use the following documentation to ensure proper configuration post fix installation:
Acknowledgements
Citrix thanks Ollie Whitehouse, Richard Warren and Martin Hill of NCC Group for working with us to protect Citrix customers.
What Citrix Is Doing
Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/.
Obtaining Support on This Issue
If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at https://www.citrix.com/support/open-a-support-case.html.
Reporting Security Vulnerabilities
Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – Reporting Security Issues to Citrix
Changelog
Citrix Workspace Lts
Date | Change |
13th May 2019 | Initial publishing |
17th May 2019 | Clarified affected version statement |
24th May 2019 | Added 'Mitigating Factors' section |