--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerabilities in Citrix XenMobile' version: '1.0' number: '2020-040' date: 'August 12, 2020' --- _History:_ * _12/08/2020 --- v1.0 -- Initial publication_ # Summary On 11th of August, Citrix released a blog post [1] and Security Update [2] about critical vulnerabilities affected XenMobile servers products. No technical details were shared by Citrix, however some sources [3] indicate that by combining some of those vulnerabilities, an unauthenticated attackers could gain admin control on XenMobile Servers if exploitation is successful. Citrix recommends these upgrades be made immediately. As of this writing, there are no known exploits. However, by analysing security patches, attacker could quickly identify exploits for these vulnerabilities and start scanning for victims exposing XenMobile servers on Internet. # Technical Details The vulnerabilities were assigned the following CVEs: * CVE-2020-8208 * CVE-2020-8209 * CVE-2020-8210 * CVE-2020-8211 * CVE-2020-8212 No technical details are available at the time of this writing. # Products Affected These critical vulnerabilities affect several products: * XenMobile Server 10.12 before RP2 * XenMobile Server 10.11 before RP4 * XenMobile Server 10.10 before RP6 * XenMobile Server before 10.9 RP5 Other versions of the same products are affected by medium and low vulnerabilities: * XenMobile Server 10.12 before RP3 * XenMobile Server 10.11 before RP6 Remediations have already been applied to cloud versions of XenMobile server. # Recommendations Citrix has released Rolling Patches for Citrix Endpoint Management (CEM) [2]: * XenMobile Server 10.12 RP3 * XenMobile Server 10.11 RP6 * XenMobile Server 10.10 RP6 * XenMobile Server 10.9 RP5 # References [1] [2] [3]