CVE-2022-21825

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on Linux systems running Citrix Workspace App with App Protection enabled. An attacker with local access can exploit improper access controls to gain root privileges. Affects Citrix Workspace App for Linux versions 2012 through 2111 when App Protection is installed.

💻 Affected Systems

Products:
  • Citrix Workspace App for Linux
Versions: 2012 through 2111
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with App Protection feature enabled. Standard Citrix Workspace App installations without App Protection are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root access, enabling complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Local user or malware with initial access escalates to root to install backdoors, steal credentials, or disable security controls.

🟢

If Mitigated

With proper patching and least privilege principles, impact limited to isolated user session without system-wide compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. Multiple proof-of-concept exploits have been published since disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2112 and later

Vendor Advisory: https://support.citrix.com/article/CTX338435

Restart Required: Yes

Instructions:

1. Download Citrix Workspace App for Linux version 2112 or later from Citrix website. 2. Uninstall current version. 3. Install updated version. 4. Restart the system.

🔧 Temporary Workarounds

Disable App Protection

linux

Remove or disable the App Protection component if not required for business operations.

sudo apt-get remove citrix-appprotection
sudo yum remove citrix-appprotection

Restrict Local Access

all

Implement strict access controls to limit who can log into affected systems locally.

🧯 If You Can't Patch

  • Implement strict least privilege principles and monitor for privilege escalation attempts
  • Isolate affected systems in segmented network zones and restrict lateral movement capabilities

🔍 How to Verify

Check if Vulnerable:

Check if App Protection is installed: dpkg -l | grep citrix-appprotection OR rpm -qa | grep citrix-appprotection. Then check Workspace version: /opt/Citrix/ICAClient/wfica --version

Check Version:

/opt/Citrix/ICAClient/wfica --version

Verify Fix Applied:

Verify version is 2112 or later: /opt/Citrix/ICAClient/wfica --version | grep -E '21[1-9][2-9]|22[0-9]+'

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in system logs
  • Execution of App Protection components with elevated privileges
  • Failed authentication attempts followed by successful privilege changes

Network Indicators:

  • Unusual outbound connections from Citrix Workspace processes
  • Lateral movement attempts from previously isolated systems

SIEM Query:

source="linux_system_logs" AND (process="citrix-appprotection" OR process="wfica") AND (event="setuid" OR event="setgid" OR event="sudo")

🔗 References

📤 Share & Export