CISA Alerts on Citrix RCE and Privilege Escalation Flaws Being Exploited

add a heading (3)

CISA has released a critical security advisory highlighting three recently discovered vulnerabilities that are actively targeted by attackers.

On August 25, 2025, these high-risk Common Vulnerabilities and Exposures (CVEs) were added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog, signaling an urgent need for both government agencies and private organizations to act swiftly.

Key Highlights

  1. Two Citrix Session Recording CVEs and one Git CVE have been listed in the KEV Catalog.
  2. Citrix vulnerabilities require authenticated local access, while the Git flaw allows arbitrary code execution through symlinked hooks.
  3. Federal agencies are required to patch as per BOD 22-01, and all organizations should update systems immediately.

Citrix Session Recording Flaws

Two vulnerabilities specifically affect Citrix Session Recording, posing serious risks for organizations relying on this enterprise monitoring tool.

CVE-2024-8069 is a deserialization of untrusted data issue with a CVSS 4.0 score of 5.1 (Medium). It permits limited remote code execution under the NetworkService Account privileges. Exploiting this flaw requires the attacker to be an authenticated user on the same intranet as the session recording server.

The CVSS 4.0 vector is:
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

This represents Adjacent Network access, Low complexity, Low privileges, and no user interaction.

CVE-2024-8068 allows privilege escalation through improper privilege management (CWE-269) and carries the same CVSS score. Authenticated users on the same Windows Active Directory domain can escalate their privileges to NetworkService Account, potentially compromising the entire session recording system.

Affected Citrix versions include:

  • 1912 LTSR before CU9 hotfix 19.12.9100.6
  • 2203 LTSR before CU5 hotfix 22.03.5100.11
  • 2402 LTSR before CU1 hotfix 24.02.1200.16
  • 2407 Current Release before version 24.5.200.8

Git Configuration Vulnerability

The third vulnerability, CVE-2025-48384, impacts Git version control systems and has a CVSS 3.1 score of 8.1 (High).

It exploits CWE-59 (Improper Link Resolution Before File Access) and CWE-436 (Interpretation Conflict), allowing arbitrary code execution through mismanaged configuration quoting.

This flaw occurs when Git misinterprets paths with trailing CRLF characters during submodule initialization. Attackers can use symlinks to redirect these altered paths to submodule hooks directories, placing executable post-checkout hooks that run malicious scripts after checkout operations.

Affected Git versions: <2.43.7, <2.44.4, <2.45.4, <2.46.4, <2.47.3, <2.48.2, <2.49.1, <2.50.1

CVSS vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H – Network access, High complexity, high impact

IOCs Table

CVEVulnerabilityCVSS ScoreSeverityExploit TypeAffected Systems
CVE-2024-8069Limited RCE via NetworkService8.8HighRemote Code ExecutionCitrix Session Recording LTSR 1912, 2203, 2402, 2407
CVE-2024-8068Privilege Escalation to NetworkService8.0HighPrivilege EscalationCitrix Session Recording LTSR 1912, 2203, 2402, 2407
CVE-2025-48384Arbitrary code execution via Git config8.1HighCode Execution via SymlinkGit versions <2.43.7 – <2.50.1

Mitigation Steps

  • Federal agencies must comply with BOD 22-01 to patch these KEV-listed vulnerabilities.
  • All organizations should prioritize applying patches for these actively exploited flaws immediately.
  • Assess exposure for Citrix Session Recording or Git-based workflows and deploy available fixes to prevent compromise.

CISA continues to expand the KEV Catalog based on in-the-wild evidence, underscoring the critical nature of these vulnerabilities.

Original Link: https://www.cisa.gov/known-exploited-vulnerabilities-catalog