Citrix Receiver 11.3

downloadWhy can't I download this file?CVE-ID Description CWE Affected ProductsPre-conditionsCVE-2020-8299Network-based denial-of-service from within the same Layer 2 network segment
CWE-400: Uncontrolled Resource Consumption
Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP EditionThe attacker machine must be in the same Layer 2 network segment as the vulnerable appliance CVE-2020-8300SAML authentication hijack through a phishing attack to steal a valid user sessionCWE-284: Improper access controlCitrix ADC, Citrix GatewayCitrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP

The following supported versions of Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP Edition are affected by CVE-2020-8299:
Citrix Receiver 11.3
  • Citrix ADC and Citrix Gateway 13.0 before 13.0-76.29
  • Citrix ADC and Citrix Gateway 12.1 before 12.1-61.18
  • Citrix ADC and NetScaler Gateway 11.1 before 65.20
  • Citrix ADC 12.1-FIPS before 12.1-55.238
  • Citrix SD-WAN WANOP Edition 11.4 before 11.4.0
  • Citrix SD-WAN WANOP Edition 11.3 before 11.3.2
  • Citrix SD-WAN WANOP Edition 11.3 before 11.3.1a
  • Citrix SD-WAN WANOP Edition 11.2 before 11.2.3a
  • Citrix SD-WAN WANOP Edition 11.1 before 11.1.2c
  • Citrix SD-WAN WANOP Edition 10.2 before 10.2.9a

The following supported versions of Citrix ADC and Citrix Gateway are affected by CVE-2020-8300:
  • Citrix ADC and Citrix Gateway 13.0. before 13.0-82.41
  • Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23
  • Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20
  • Citrix ADC 12.1-FIPS before 12.1-55.238

These issues have already been addressed in Citrix-managed cloud services such as Citrix Gateway Service and Citrix Secure Workspace Access. Customers using Citrix-managed services do not need to take any additional action.

What Customers Should Do

The following supported versions of Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP Edition address CVE-2020-8299, a Medium severity vulnerability.

  • Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0

  • Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1

  • Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1

  • Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS

  • Citrix SD-WAN WANOP Edition 11.4.0 and later releases of 11.4

  • Citrix SD-WAN WANOP Edition 11.3.2 and later releases of 11.3

  • Citrix SD-WAN WANOP Edition 11.3.1a and later releases of 11.3

  • Citrix SD-WAN WANOP Edition 11.2.3a and later releases of 11.2

  • Citrix SD-WAN WANOP Edition 11.1.2c and later releases of 11.1

  • Citrix SD-WAN WANOP Edition 10.2.9a and later releases of 10.2


The following supported versions of Citrix ADC and Citrix Gateway address CVE-2020-8300, a High severity vulnerability.

  • Citrix ADC and Citrix Gateway 13.0-82.41* and later releases of 13.0

  • Citrix ADC and NetScaler Gateway ADC 12.1-62.23* and later releases of 12.1

  • Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1

  • Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS

In addition, upon upgrading to the fixed version, customers must modify the device configuration to resolve CVE-2020-8300. See Citrix Application Delivery Controller and Citrix Gateway - SAML Configuration Reference Guide for details.

*Update:

Citrix is aware of a functionality issue in the recently released firmware relating to Citrix Gateway’s integration with Citrix Workspace App.

Customers who have upgraded and are not experiencing any functionality issues logging into Citrix Workspace App do not need to take any additional actions.

Customers who are using 13.0-82.41 and 12.1-62.23 versions and are experiencing functionality issues logging into Citrix Workspace App are recommended to upgrade to the following versions:

  • Citrix ADC and Citrix Gateway 13.0-82.42 and later releases of 13.0

  • Citrix ADC and NetScaler Gateway ADC 12.1-62.25 and later releases of 12.1


Citrix strongly recommends that affected customers install relevant updates as soon as possible.

Citrix Receiver For Mac 11.3

Acknowledgements

Citrix would like to thank ChenNan of Chaitin Security Research Lab, Wolfgang Ettlinger and Marc Nimmerrichter of Certitude Consulting for working with us to protect Citrix customers.

What Citrix is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at https://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at https://www.citrix.com/support/open-a-support-case/.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For details on our vulnerability response process and guidance on how to report security-related issues to Citrix, please see the following webpage: https://www.citrix.com/about/trust-center/vulnerability-process.html.

Disclaimer

This document is provided on an 'as is' basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information on the document is at your own risk. Citrix reserves the right to change or update this document at any time.

Changelog

DateChange
2021-06-08Initial Publication
2021-06-08Formatting Corrections
2021-06-11Citrix Workspace App Functionality Issue – Builds Updated

Printing Changes:

Printing in Citrix Receiver 11.8.2 has changed from the previous IS&T distributed version, 11.3.2. In 11.3.2, when initiating a print job, a dialog box would prompt in the Citrix App, followed by another, Mac OS print dialog box. While many users use this function for saving files to PDF within the Mac OS print dialog, this was considered redundant by Citrix and has been removed since version 11.4 (see Improved Printing Support note in the What's New section). Users are only able to configure their print jobs while in the Citrix App they are running.

Printing to PDF:
Receiver

IS&T is working on a workaround for saving files to PDF from Citrix Apps, though none is available at this time. Users who need to print to PDF should remain on 11.3.2 or use desired app in a IS&T virtual machine.

February 2014: IS&T is investigating the cause of this behavior. More information will be posted here as it becomes available.

Citrix Receiver For Mac 11.3.1

Problem

Citrix
  • Users are able to run BrioQuery reports via Citrix using Citrix Receiver 11.8
  • Reports can be exported to Excel and downloaded to the local machine.
  • Saving an updated version of the BrioQuery file fails with an Access Denied error.
  • In Citrix 11.3.2 includes a dialog box in which users can allow read and or right access to mapped drives.
    Citrix 11.3, Citrix Receiver >> Preferences >> Devices
  • In Citrix 11.8, the ability to add mapped drive preferences is missing.
    Citrix 11.8, Citrix Viewer >> Preferences >> Devices
  • Despite configuring Citrix to allow read and write access, users attempting to save an updated version of a .bqy file will receive an error:

Citrix Receiver 11.7.0

Workaround

Citrix Receiver 11.4

  • Workaround solutions:
    • Save the file to the WIN.MIT.EDU share.
    • Save the file to a USB drive, then copy over to the Macintosh hard drive.
  • The above workaround solutions are inconvenient and labor intensive. Although Citrix 11.3 is not officially supported for use on Mac OS 10.11, users may wish to continue to use Citrix 11.3.
  • To downgrade from Citrix 11.8 to Citrix 11.3, users should run that Uninstaller that is packaged with the Citrix 11.8 installer.
    [hd:How to uninstall Citrix client 11.8]