We’ve been dealing with this shit for the past 3 days.
How the fuck do you even create a security hole that lets unprivileged users accessing a client app get SYSTEM rights to the server?
Didn’t even know that was technically possible even if you tried to program it.Oh well, at least we’ll have an up-to-date client device inventory and no more BYOD shenanigans at the end of it.
Judging from recent forum posts, Citrix still installs a hidden server running with privileged access as part of their client software. It’s almost impossible for normal users to remove it.
Wasn’t this the same behavior that got Zoom blocked briefly on macOS a few years ago? https://www.macobserver.com/news/apple-update-remove-zoom/
I wish we could get rid of Citrix yesterday, but:
- We’ve got our hands full till next year with a physical relocation of the business, migration to M365, replacement of all servers and storage, and getting the fuck away from VMWare
- I was technically hired as a Citrix Admin (despite never having heard of the software before), so replacing it might put my job in jeopardy.
Got any links about the hidden server aspect of Citrix? I’d love to read more (I’d google it but these days Google is just… gestures vaguely
security hole that lets unprivileged users accessing a client app get SYSTEM rights to the server
wtf 🤣
That was my reaction, but with even more tears and less laughing.
Kind of explains a lot.
On a side note, this non-descript general advice at the end of the article “The discovery of these vulnerabilities in the Citrix Workspace app for Windows underscores the importance of maintaining robust cybersecurity measures.” is obvious LLM speech.
And the fact that nowadays, running a CVD through ChatGPT and publishing the results is a thing people do fucking triggers me.Man, try teaching a freshman comp course in college.
I haven’t let Citrix maleare onto any device I own in decades, since finding that it wasn’t possible to remove their server from a Mac by normal means (it required using terminal to shut down and remove each process individually). I honestly wasn’t aware that anyone outside a particular obscure state agency in Kentucky still uses them.
A surprising number of hospitals use it to deploy their electronic charting / PACS software
Oh wow, that’s…not good, to say the least. I really need to keep up with ehr security better. Not that I have to, but that I should pay a bit more attention.
That is distressing.