A vulnerability has been discovered in the Citrix Secure Access client for Windows
which, if exploited, could allow an attacker with access to an endpoint with Standard User Account that has the vulnerable client installed to escalate their local privileges to that of NT AUTHORITY\SYSTEM.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28509 | A vulnerability has been discovered in the Citrix Secure Access client for Windows which, if exploited, could allow an attacker with access to an endpoint with Standard User Account that has the vulnerable client installed to escalate their local privileges to that of NT AUTHORITY\SYSTEM. |
Thu, 07 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:citrix:secure_access_client:-:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Citrix
Published:
Updated: 2024-11-07T15:20:58.467Z
Reserved: 2023-01-24T15:49:52.579Z
Link: CVE-2023-24491
Updated: 2024-08-02T10:56:04.221Z
Status : Modified
Published: 2023-07-11T22:15:09.750
Modified: 2024-11-21T07:47:58.187
Link: CVE-2023-24491
No data.
OpenCVE Enrichment
No data.
EUVD