{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2023-091.pdf"
    },
    "title": "High Vulnerabilities in Citrix Hypervisor",
    "serial_number": "2023-091",
    "publish_date": "20-11-2023 10:42:36",
    "description": "On November 15, 2023, Citrix issued an advisory regarding two vulnerabilities affecting Citrix Hypervisor 8.2 CU1 LTSR that could allow malicious code in a guest VM to compromise the host.<br>\n",
    "url_title": "2023-091",
    "content_markdown": "---\ntitle: 'High Vulnerabilities in\u00a0Citrix\u00a0Hypervisor'\nnumber: '2023-091'\nversion: '1.0'\noriginal_date: 'November 15, 2023'\ndate: 'November 20, 2023'\n---\n\n_History:_\n\n* _20/11/2023 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn November 15, 2023, Citrix issued an advisory regarding two vulnerabilities affecting Citrix Hypervisor 8.2 CU1 LTSR that could allow malicious code in a guest VM to compromise the host [1].\n\n# Technical Details\n\nThe vulnerability `CVE-2023-46835` may allow privileged malicious code in a guest VM to compromise an AMD-based host via a passed through PCI device.\n\nThe vulnerability `CVE-2023-23583`, with a CVSS score of 8.8, affects the Intel 'Ice Lake' (2019) and later Intel processor generations. Although this is not an issue in the Citrix Hypervisor product itself, Citrix teams have included updated Intel microcode to mitigate this CPU hardware issue. This issue may allow unprivileged code in a guest VM to compromise that VM and, potentially, the host.\n\n# Affected Products\n\nThese vulnerabilities affect the Citrix Hypervisor 8.2 CU1 LTSR.\n\n- CVE-2023-23583 only affects systems running on Intel Ice Lake or later CPUs.\n- CVE-2023-46835 only affects systems that have both of a PCI device passed through to the guest VM by the host administrator and also an AMD CPU. Customers who are not using AMD CPUs and customers who are not using the PCI pass-through feature are not affected by this issue.\n\n# Recommendations\n\nIt is recommended applying fixes as soon as possible [2].\n\n# References\n\n[1] <https://support.citrix.com/article/CTX583037/citrix-hypervisor-security-bulletin-for-cve202323583-and-cve202346835>\n\n[2] <https://support.citrix.com/article/CTX583402/hotfix-xs82ecu1057-for-citrix-hypervisor-82-cumulative-update-1>",
    "content_html": "<p><em>History:</em></p><ul><li><em>20/11/2023 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On November 15, 2023, Citrix issued an advisory regarding two vulnerabilities affecting Citrix Hypervisor 8.2 CU1 LTSR that could allow malicious code in a guest VM to compromise the host [1].</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerability <code>CVE-2023-46835</code> may allow privileged malicious code in a guest VM to compromise an AMD-based host via a passed through PCI device.</p><p>The vulnerability <code>CVE-2023-23583</code>, with a CVSS score of 8.8, affects the Intel 'Ice Lake' (2019) and later Intel processor generations. Although this is not an issue in the Citrix Hypervisor product itself, Citrix teams have included updated Intel microcode to mitigate this CPU hardware issue. This issue may allow unprivileged code in a guest VM to compromise that VM and, potentially, the host.</p><h2 id=\"affected-products\">Affected Products</h2><p>These vulnerabilities affect the Citrix Hypervisor 8.2 CU1 LTSR.</p><ul><li>CVE-2023-23583 only affects systems running on Intel Ice Lake or later CPUs.</li><li>CVE-2023-46835 only affects systems that have both of a PCI device passed through to the guest VM by the host administrator and also an AMD CPU. Customers who are not using AMD CPUs and customers who are not using the PCI pass-through feature are not affected by this issue.</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>It is recommended applying fixes as soon as possible [2].</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.citrix.com/article/CTX583037/citrix-hypervisor-security-bulletin-for-cve202323583-and-cve202346835\">https://support.citrix.com/article/CTX583037/citrix-hypervisor-security-bulletin-for-cve202323583-and-cve202346835</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.citrix.com/article/CTX583402/hotfix-xs82ecu1057-for-citrix-hypervisor-82-cumulative-update-1\">https://support.citrix.com/article/CTX583402/hotfix-xs82ecu1057-for-citrix-hypervisor-82-cumulative-update-1</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}