US CISA warns that Citrix has released security updates to address flaws in Hypervisor that could be exploited by threat actors to execute code in a virtual machine to trigger a denial of service condition on the host.
Citrix Hypervisor (XenServer) is a high-performance hypervisor optimized for virtual app and desktop workloads and based on the Xen Project hypervisor.
“Citrix has released security updates to address vulnerabilities in Hypervisor (formerly XenServer). An attacker could exploit some of these vulnerabilities to cause a denial-of-service condition.” reads the advisory published by CISA.
“CISA encourages users and administrators to review Citrix Security Update CTX306565 and apply the necessary updates.”
The two vulnerabilities, tracked as CVE-2021-28038 and CVE-2021-28688, could be abused to cause the host to crash or become unresponsive. An attacker would have to be able to execute privileged code in a guest virtual machine.
“Two security issues have been identified in Citrix Hypervisor (formerly Citrix XenServer) that may allow privileged code in a guest VM to cause the host to crash or become unresponsive.” reads the advisory published by Citrix.
“These issues affect all currently supported versions of Citrix Hypervisor up to and including Citrix Hypervisor 8.2 LTSR.”
The CVE-2021-28038 vulnerability is a Uncontrolled Resource Consumption issue, it could be exploited by an attacker with the ability to execute privileged mode code in a guest can perform a denial of service attack against the host.
“An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver.” reads the security advisory.
The flaw was caused by an incomplete fix for CVE-2021-26931.
“A malicious or buggy frontend driver may be able to cause resource leaks from the corresponding backend driver. This can result in a host-wide Denial of Sevice (DoS).” reads the advisory.
Citrix also fixed another issue, tracked CVE-2020-35498, that affects Hypervisor 8.2 LTSR only, and which could result in malicious network traffic causing subsequent packets to be dropped.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, CITRIX)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.