Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks

Posted on August 26, 2025August 26, 2025 By CWS

CISA has issued a vital alert concerning three newly recognized vulnerabilities being actively exploited by risk actors.

On August 25, 2025, CISA added these high-risk Frequent Vulnerabilities and Exposures (CVEs) to its Recognized Exploited Vulnerabilities (KEV) Catalog, signaling instant concern for federal businesses and personal organizations alike.

Key Takeaways1. CISA added two Citrix Session Recording CVEs and one Git CVE to its KEV Catalog.2. Citrix flaws require authenticated native entry; Git flaw exploits symlinked hooks for arbitrary code.3. Federal businesses should patch per BOD 22-01; all organizations ought to replace instantly.

Citrix Session Recording Vulnerabilities 

Two of the three vulnerabilities goal Citrix Session Recording infrastructure, presenting important safety dangers for organizations using this enterprise monitoring resolution. 

CVE-2024-8069, categorised as a deserialization of untrusted knowledge vulnerability with a CVSS 4.0 rating of 5.1 (Medium), permits restricted distant code execution with NetworkService Account privileges. 

The vulnerability leverages CWE-502 (Deserialization of Untrusted Information) weak spot, permitting authenticated attackers on the identical intranet because the session recording server to execute arbitrary code.

The assault vector requires the risk actor to be an authenticated person throughout the goal community, using the CVSS 4.0 vector string CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N. 

This means Adjoining Community entry with Low complexity, requiring Low privileges however no person interplay.

CVE-2024-8068 represents a privilege escalation vulnerability with equivalent CVSS scoring, exploiting CWE-269 (Improper Privilege Administration). 

This flaw permits authenticated customers throughout the similar Home windows Energetic Listing area to escalate privileges to NetworkService Account entry, doubtlessly compromising the complete session recording infrastructure.

Each Citrix vulnerabilities have an effect on a number of Lengthy Time period Service Launch (LTSR) variations, together with 1912 LTSR earlier than CU9 hotfix 19.12.9100.6, 2203 LTSR earlier than CU5 hotfix 22.03.5100.11, 2402 LTSR earlier than CU1 hotfix 24.02.1200.16, and the 2407 Present Launch earlier than model 24.5.200.8.

Git Hyperlink Following Vulnerability 

The third addition, CVE-2025-48384, impacts Git model management techniques with the next CVSS 3.1 rating of 8.1 (Excessive). 

This vulnerability exploits CWE-59 (Improper Hyperlink Decision Earlier than File Entry) and CWE-436 (Interpretation Battle), enabling arbitrary code execution by way of damaged configuration quoting mechanisms.

The assault leverages Git’s dealing with of carriage return and line feed (CRLF) characters in configuration values. 

When initializing submodules with trailing CR characters within the path, Git incorrectly processes the altered path, doubtlessly permitting symlink-based assaults. 

If an attacker creates a symlink pointing the altered path to the submodule hooks listing and contains an executable post-checkout hook, malicious scripts might execute unintentionally after checkout operations.

The vulnerability impacts Git variations previous to 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and a couple of.50.1, with the CVSS vector CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H indicating Community entry with Excessive complexity however doubtlessly catastrophic affect.

CVETitleCVSS 3.1 ScoreSeverityCVE-2024-8069Limited distant code execution with NetworkService privileges8.8 HighCVE-2024-8068Privilege escalation to NetworkService Account access8.0HighCVE-2025-48384Git permits arbitrary code execution by way of damaged config quoting8.1High

Mitigations

Beneath Binding Operational Directive (BOD) 22-01, Federal Civilian Govt Department (FCEB) businesses should remediate these KEV-listed vulnerabilities by their specified due dates. 

CISA strongly recommends that every one organizations prioritize remediation of those actively exploited vulnerabilities. 

The company continues increasing the KEV Catalog based mostly on proof of in-the-wild exploitation, emphasizing the vital nature of those safety flaws for each private and non-private sector entities.

Organizations ought to instantly assess their publicity to those vulnerabilities, notably these using Citrix Session Recording infrastructure or Git-based growth workflows, and implement obtainable patches to stop potential compromise.

Discover this Story Attention-grabbing! Comply with us on LinkedIn and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attacks, CISA, Citrix, Escalation, Exploited, Privilege, RCE, Vulnerabilities, Warns

Post navigation

Previous Post: Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
Next Post: Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection

Related Posts

Google to Add New Layer of Developer Verification to Distribute Apps on Play Store Cyber Security News
Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware Cyber Security News
CISA Warns of Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in Attacks Cyber Security News
Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Cyber Security News
Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Cyber Security News
Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely
  • Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets
  • Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data
  • How to Understand the OWASP Top 10
  • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely
  • Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets
  • Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data
  • How to Understand the OWASP Top 10
  • Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News