FYI: Someone's scanning gateways, looking for those security holes Citrix told you not to worry too much about

Hackers hit honeypots hours after CISO downplays risk, proof-of-concept exploit code emerges


VIdeo This week Citrix tried to reassure everyone the 11 security flaws it just patched in its network perimeter products weren't all that bad. Well, we hope they're right because someone's scanning the internet looking for vulnerable installations.

The sweeps could be made by researchers documenting at-risk organizations, or could be miscreants looking for unpatched internet-facing gear to meddle with, or both. You probably don't want to find out the hard way, so apply fixes as soon as you can.

SANS dean of research Johannes Ullrich today said his honeypot, set up to detect exploitation attempts against bugs in F5's products, encountered attempts by someone to exploit a couple of the holes Citrix patched in its gear.

From the logs, it appears the connections were made to determine whether or not Ullrich's machine was vulnerable, which it wasn't because it wasn't running the buggy Citrix ADC, Citrix Gateway, or Citrix SD-WAN WANOP software. Perhaps if the honeypot was vulnerable, further exploitation may have been attempted. Ullrich believes the attempts targeted CVE-2020-8195 and CVE-2020-8196, both information disclosure flaws.

The Register understands the probing began shortly after Citrix CISO Fermin Serna said on Tuesday a number of the bugs had "barriers to exploitation" that would make them impractical to target in the wild.

The first exploit that hit the honeypot, said Ullrich, attempted to fetch a file from the gateway, in this case the list of accounts and hashed passwords:

POST /rapi/filedownload?filter=path:%2Fetc%2Fpasswd

The second exploit attempt tried to fetch a PCI DSS compliance document from the server:

POST /pcidss/report?username=nsroot&set=1&type=allprofiles&sid=loginchallengeresponse1requestbody

"The vulnerability isn't all that 'bad'. I have to look if the [PCI DSS] report leaks anything specific," he said. "It could very well be used to identify unpatched devices."

You can find technical details on the Citrix vulnerabilities here, along with proof-of-concept exploits, by Donny Maasland. This code can upload, create, download, and delete arbitrary files on a vulnerable installation, we're told.

And below is a video showing how the Cross Site Scripting (XSS) flaw (CVE-2020-8198) in Citrix's software can be abused to gain control over a gateway: a logged-in administrator has to be tricked into clicking on a booby-trapped link. ®

Youtube Video

Narrower topics


Other stories you might like

  • Talos names eight deadly sins in widely used industrial software
    Entire swaths of gear relies on vulnerability-laden Open Automation Software (OAS)

    A researcher at Cisco's Talos threat intelligence team found eight vulnerabilities in the Open Automation Software (OAS) platform that, if exploited, could enable a bad actor to access a device and run code on a targeted system.

    The OAS platform is widely used by a range of industrial enterprises, essentially facilitating the transfer of data within an IT environment between hardware and software and playing a central role in organizations' industrial Internet of Things (IIoT) efforts. It touches a range of devices, including PLCs and OPCs and IoT devices, as well as custom applications and APIs, databases and edge systems.

    Companies like Volvo, General Dynamics, JBT Aerotech and wind-turbine maker AES are among the users of the OAS platform.

    Continue reading
  • Despite global uncertainty, $500m hit doesn't rattle Nvidia execs
    CEO acknowledges impact of war, pandemic but says fundamentals ‘are really good’

    Nvidia is expecting a $500 million hit to its global datacenter and consumer business in the second quarter due to COVID lockdowns in China and Russia's invasion of Ukraine. Despite those and other macroeconomic concerns, executives are still optimistic about future prospects.

    "The full impact and duration of the war in Ukraine and COVID lockdowns in China is difficult to predict. However, the impact of our technology and our market opportunities remain unchanged," said Jensen Huang, Nvidia's CEO and co-founder, during the company's first-quarter earnings call.

    Those two statements might sound a little contradictory, including to some investors, particularly following the stock selloff yesterday after concerns over Russia and China prompted Nvidia to issue lower-than-expected guidance for second-quarter revenue.

    Continue reading
  • Another AI supercomputer from HPE: Champollion lands in France
    That's the second in a week following similar system in Munich also aimed at researchers

    HPE is lifting the lid on a new AI supercomputer – the second this week – aimed at building and training larger machine learning models to underpin research.

    Based at HPE's Center of Excellence in Grenoble, France, the new supercomputer is to be named Champollion after the French scholar who made advances in deciphering Egyptian hieroglyphs in the 19th century. It was built in partnership with Nvidia using AMD-based Apollo computer nodes fitted with Nvidia's A100 GPUs.

    Champollion brings together HPC and purpose-built AI technologies to train machine learning models at scale and unlock results faster, HPE said. HPE already provides HPC and AI resources from its Grenoble facilities for customers, and the broader research community to access, and said it plans to provide access to Champollion for scientists and engineers globally to accelerate testing of their AI models and research.

    Continue reading

Biting the hand that feeds IT © 1998–2022