iTnews
  • Home
  • News
  • Technology
  • Security

Poorly implemented Citrix poses security risk

By Joy Persaud on Aug 7, 2008 9:59AM

Organisational security could be at risk if Citrix is not implemented carefully, according to recent tests.

Organisational security could be at risk if Citrix is not implemented
carefully, according to tests carried out by Global Secure Systems
(GSS), Silver Spring, Md.

Internal systems might be compromised if those without a comprehensive knowledge of its workings install Citrix. GSS found that all the 50 Citrix deployments it tested were vulnerable to arbitrary code execution.

Also, more than 80 per cent exposed commercially sensitive data. Many cases breached the Data Protection Act, and standard security procedures had not been applied to most deployments.

GSS penetration testers, who have sent their findings on to Fort Lauderdale, Fla.-based Citrix, discovered a spreadsheet that held the domain admin passwords for every server at a financial services company, plus quotations, methodologies, terms of business and reports from a number of the firm's competitors.

Of the firms tested, 20 were in the financial services sector.

Robin Hollington, director of consulting for GSS, said the unencrypted information was in a folder protected by access rules.

He said: “Using the access rules we had acquired at the time, we were able to read the information, including passwords, which gave us system administrator access to every server [several hundred] in the organisation. That level of access not only gave us complete control of their systems, but we could have deleted any audit trail we might have left.”

The problem does not lie with Citrix, but rather with its implementation, said Hollington. He advised users to ensure that they are familiar with how to lock down the system and recommended confining access to specific roles.

Last year, the swiftest breach occurred within 15 seconds of logging on. This year, that time has been shaved to less than 10 seconds.

See original article on scmagazineus.com
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
citrixflawrisksecurity

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Joy Persaud
Aug 7 2008
9:59AM
0 Comments

Related Articles

  • Citrix ADM has admin password reset vulnerability
  • US agencies accuse China of attacking telcos and network providers
  • US examining Alibaba's cloud unit
  • SolarWinds investors allege board knew about cyber risks
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.