CVE-2024-42423

6.1 MEDIUM

📋 TL;DR

This vulnerability allows local unauthenticated users with low privileges to bypass authorization controls in Citrix Workspace App when Citrix CEB is enabled for WebLogin on Dell ThinOS. Exploitation could lead to unauthorized information disclosure and system tampering. Only systems running the specific affected version combination are vulnerable.

💻 Affected Systems

Products:
  • Citrix Workspace App
  • Dell ThinOS
Versions: Citrix Workspace App 23.9.0.24.4 on Dell ThinOS 2311
Operating Systems: Dell ThinOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Citrix CEB is enabled for WebLogin feature

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain unauthorized access to sensitive information, modify system configurations, or potentially escalate privileges within the Citrix environment.

🟠

Likely Case

Local users could access information or perform actions beyond their authorized permissions, potentially compromising session data or application settings.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to isolated incidents that could be detected and contained.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires local access to the system but no authentication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Dell ThinOS version with security fixes

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000225289/dsa-2024-229-security-update-for-dell-thinos-vulnerabilities

Restart Required: Yes

Instructions:

1. Review Dell advisory DSA-2024-229
2. Download and apply the latest ThinOS update from Dell support
3. Restart affected systems
4. Verify Citrix Workspace App functionality post-update

🔧 Temporary Workarounds

Disable Citrix CEB for WebLogin

all

Temporarily disable the vulnerable configuration until patching can be completed

Restrict Local Access

all

Implement physical and logical access controls to limit who can interact with ThinOS devices

🧯 If You Can't Patch

  • Disable Citrix CEB WebLogin feature entirely
  • Implement strict monitoring and alerting for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check ThinOS version (should be 2311) and verify Citrix Workspace App version 23.9.0.24.4 with CEB enabled for WebLogin

Check Version:

Check ThinOS system information in device settings

Verify Fix Applied:

Confirm ThinOS has been updated to a version after the security patch and verify Citrix CEB WebLogin configuration

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Citrix WebLogin components
  • Unexpected configuration changes to Citrix settings

Network Indicators:

  • Unusual authentication patterns from ThinOS devices

SIEM Query:

source="ThinOS" AND (event="unauthorized_access" OR event="config_change")

🔗 References

📤 Share & Export