Sunday, May 18, 2025

CISA Provides Citrix ShareFile Flaw to KEV Catalog On account of In-the-Wild Assaults


Aug 17, 2023THNVulnerability / Enterprise Safety

Citrix ShareFile Flaw

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has added a essential safety flaw in Citrix ShareFile storage zones controller to its Recognized Exploited Vulnerabilities (KEV) catalog, primarily based on proof of energetic in-the-wild exploitation.

Tracked as CVE-2023-24489 (CVSS rating: 9.8), the shortcoming has been described as an improper entry management bug that, if efficiently exploited, might enable an unauthenticated attacker to compromise susceptible cases remotely.

The issue is rooted in ShareFile’s dealing with of cryptographic operations, enabling adversaries to add arbitrary recordsdata, leading to distant code execution.

Cybersecurity

“This vulnerability impacts all at present supported variations of customer-managed ShareFile storage zones controller earlier than model 5.11.24,” Citrix stated in an advisory launched in June. Dylan Pindur of Assetnote has been credited with discovering and reporting the problem.

It is price noting that the first indicators of exploitation of the vulnerability emerged towards the top of July 2023.

The identification of the risk actors behind the assaults is unknown, though the Cl0p ransomware gang has taken a specific curiosity in making the most of zero-days in managed file switch options comparable to Accellion FTA, SolarWinds Serv-U, GoAnywhere MFT, and Progress MOVEit Switch in recent times.

Menace intelligence agency GreyNoise stated it noticed a major spike in exploitation makes an attempt concentrating on the flaw, with as many as 75 distinctive IP addresses recorded on August 15, 2023, alone.

Cybersecurity

“CVE-2023-24489 is a cryptographic bug in Citrix ShareFile’s Storage Zones Controller, a .NET net utility working beneath IIS,” GreyNoise stated.

“The applying makes use of AES encryption with CBC mode and PKCS7 padding however doesn’t appropriately validate decrypted knowledge. This oversight permits attackers to generate legitimate padding and execute their assault, resulting in unauthenticated arbitrary file add and distant code execution.”

Federal Civilian Govt Department (FCEB) companies have been mandated to use vendor-provided fixes to remediate the vulnerability by September 6, 2023.

The event comes as safety alarms have been raised about energetic exploitation of CVE-2023-3519, a essential vulnerability affecting Citrix’s NetScaler product, to deploy PHP net shells on compromised home equipment and achieve persistent entry.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

0FansLike
3,912FollowersFollow
0SubscribersSubscribe
- Advertisement -spot_img

Latest Articles