FYI: Someone's scanning gateways, looking for those security holes Citrix told you not to worry too much about

Hackers hit honeypots hours after CISO downplays risk, proof-of-concept exploit code emerges

VIdeo This week Citrix tried to reassure everyone the 11 security flaws it just patched in its network perimeter products weren't all that bad. Well, we hope they're right because someone's scanning the internet looking for vulnerable installations.

The sweeps could be made by researchers documenting at-risk organizations, or could be miscreants looking for unpatched internet-facing gear to meddle with, or both. You probably don't want to find out the hard way, so apply fixes as soon as you can.

SANS dean of research Johannes Ullrich today said his honeypot, set up to detect exploitation attempts against bugs in F5's products, encountered attempts by someone to exploit a couple of the holes Citrix patched in its gear.

From the logs, it appears the connections were made to determine whether or not Ullrich's machine was vulnerable, which it wasn't because it wasn't running the buggy Citrix ADC, Citrix Gateway, or Citrix SD-WAN WANOP software. Perhaps if the honeypot was vulnerable, further exploitation may have been attempted. Ullrich believes the attempts targeted CVE-2020-8195 and CVE-2020-8196, both information disclosure flaws.

The Register understands the probing began shortly after Citrix CISO Fermin Serna said on Tuesday a number of the bugs had "barriers to exploitation" that would make them impractical to target in the wild.

The first exploit that hit the honeypot, said Ullrich, attempted to fetch a file from the gateway, in this case the list of accounts and hashed passwords:

POST /rapi/filedownload?filter=path:%2Fetc%2Fpasswd

The second exploit attempt tried to fetch a PCI DSS compliance document from the server:

POST /pcidss/report?username=nsroot&set=1&type=allprofiles&sid=loginchallengeresponse1requestbody

"The vulnerability isn't all that 'bad'. I have to look if the [PCI DSS] report leaks anything specific," he said. "It could very well be used to identify unpatched devices."

You can find technical details on the Citrix vulnerabilities here, along with proof-of-concept exploits, by Donny Maasland. This code can upload, create, download, and delete arbitrary files on a vulnerable installation, we're told.

And below is a video showing how the Cross Site Scripting (XSS) flaw (CVE-2020-8198) in Citrix's software can be abused to gain control over a gateway: a logged-in administrator has to be tricked into clicking on a booby-trapped link. ®

Youtube Video

Narrower topics

Other stories you might like

  • We can unify HPC and AI software environments, just not at the source code level

    Compute graphs are the way forward

    Register Debate Welcome to the latest Register Debate in which writers discuss technology topics, and you the reader choose the winning argument. The format is simple: we propose a motion, the arguments for the motion will run this Monday and Wednesday, and the arguments against on Tuesday and Thursday. During the week you can cast your vote on which side you support using the poll embedded below, choosing whether you're in favour or against the motion. The final score will be announced on Friday, revealing whether the for or against argument was most popular.

    This week's motion is: A unified, agnostic software environment can be achieved. We debate the question: can the industry ever have a truly open, unified, agnostic software environment in HPC and AI that can span multiple kinds of compute engines?

    Arguing today FOR the motion is Rob Farber, a global technology consultant and author with an extensive background in HPC and in developing machine-learning technology that he applies at national laboratories and commercial organizations. Rob can be reached at

    Continue reading
  • But why that VPN? How WireGuard made it into Linux

    Even the best of ideas can take their own sweet time making it into the kernel

    Maybe someday – maybe – Zero Trust will solve many of our network security problems. But for now, if you want to make sure you don't have an eavesdropper on your network, you need a Virtual Private Network (VPN).

    There's only one little problem with commercial VPNs: many of them are untrustworthy. So, what can you do? Well, run your own of course is the open-source answer. And, today, your VPN of choice is Linux's built-in VPN: WireGuard.

    Why WireGuard rather than OpenVPN or IKEv2? Because it's simpler to implement while maintaining security and delivering faster speeds. And, when it comes to VPNs, it's all about balancing speed and security.

    Continue reading
  • Boffins demonstrate a different kind of floppy disk: A legless robot that hops along a surface

    This is fine

    Those of us who fear future enslavement by robot overlords may have one more reason not to sleep at night: engineers have demonstrated a few of the legless, floppy variety making some serious leaps.

    Animated pancake-like droids have demonstrated their ability to execute a series of flops in a fashion their creators – soft robotics engineers based in China – describe as "rapid, continuous, and steered jumping."

    "Jumping is an important locomotion function to extend navigation range, overcome obstacles, and adapt to unstructured environments," Rui Chen of Chongqing University and Huayan Pu of Shanghai University said.

    Continue reading

Biting the hand that feeds IT © 1998–2021