- Citrix Workspace App Version 1904
- Citrix Workspace 1904 Ssl Error 47
- Citrix Workspace 22.214.171.124
- Citrix Workspace 1904 Download
The following matrices provide details of internal and external network connections:
- Matrix for internal network connections (Citrix Gateway scenario)
- Matrix for external network connections (Citrix Gateway scenario)
Note: When NetScaler Gateway is used
- For the EDT to work, NetScaler Gateway must be of version 12.1 or higher since the older versions doesn't support ECDHE cipher suites in DTLS mode.
- NetScaler Gateway doesn't support DTLS 1.2 so TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 are not supported and NetScaler Gateway must be configured to use TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA for it to work in DTLS 1.0
A vulnerability has been identified in Citrix Workspace app and Receiver for Windows that could result in local drive access preferences not being enforced allowing an attacker read/write access to the clients local drives which could enable code execution on the client device.
This vulnerability has been assigned the following CVE number:
• CVE-2019-11634: Remote Code Execution Vulnerability in Citrix Workspace app for Windows prior to version 1904 and Receiver for Windows to LTSR 4.9 CU6 version earlier than 4.9.6001.
This vulnerability affects all versions of Citrix Workspace app for Windows and Receiver for Windows the fix is contained in Citrix Workspace app version 1904 or later and Receiver for Windows to LTSR 4.9 CU6 version 4.9.6001.
This vulnerability does not affect Citrix Workspace app and Receiver on any other platforms.
Citrix strongly recommends that customers upgrade to the latest Citrix Workspace app for Windows and Receiver for Windows to address this vulnerability. In cases where the upgrade is not immediately possible applying a Client Selective Trust policy via GPO can be used to limit the exploitability of this vulnerability until the upgrade can be completed. The following settings must be set for both x86 and x64 hives and the client system must be rebooted to take effect.
Citrix Workspace 1904 Ssl Error 47
Set all FileSecurityPermission to 0, which means No Access (See CTX133565 for further details)
Set InstantiatedSecurityPolicyEditabledefault to false (See CTX128792 for further details)
Note: Restarting Citrix Workspace app and Receiver is not sufficient to apply the changes, the operating system must be rebooted.
What Customers Should Do
A new version of Citrix Workspace app and Receiver for Windows has been released. Citrix strongly recommends that customers upgrade Citrix Workspace app to version 1904 or later and Receiver for Windows to LTSR 4.9 CU6 version 4.9.6001.
The new Citrix Workspace app version is available from the following Citrix website location:
The new LTSR version is available from the following Citrix website location:
Single Sign-on (SSO) could stop working, after applying the security update, for browsers other than Internet Explorer unless explicitly configured. Use the following documentation to ensure proper configuration post fix installation:
Citrix thanks Ollie Whitehouse, Richard Warren and Martin Hill of NCC Group for working with us to protect Citrix customers.
What Citrix Is Doing
Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/.
Citrix Workspace 126.96.36.199
Obtaining Support on This Issue
If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at https://www.citrix.com/support/open-a-support-case.html.
Reporting Security Vulnerabilities
Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – Reporting Security Issues to Citrix
Citrix Workspace 1904 Download
|13th May 2019||Initial publishing|
|17th May 2019||Clarified affected version statement|
|24th May 2019||Added 'Mitigating Factors' section|