{"id":32729,"date":"2020-01-11T07:00:51","date_gmt":"2020-01-11T07:00:51","guid":{"rendered":"http:\/\/ecbf7134-3a5c-4c92-b4a1-ea7ea76e4526"},"modified":"2020-01-11T07:00:51","modified_gmt":"2020-01-11T07:00:51","slug":"proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/","title":{"rendered":"Proof-of-concept code published for Citrix bug as attacks intensify"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/01\/11\/adaeb9ea-e3b8-4799-8295-2f4d23aa7647\/citrix-bug.png\" class alt=\"Shitrix Citrix bug\"><\/span><span class=\"credit\">Image: Project Zero India<\/span><\/p>\n<p>Starting with yesterday, there is now public proof-of-concept exploit code for <strong>CVE-2019-19781<\/strong>, a vulnerability in Citrix enterprise equipment that can allow hackers to take over devices and access a companies&#8217; internal networks.<\/p>\n<p>The vulnerability is as bad as it gets and has been deemed one of the most dangerous bugs disclosed in recent years.<\/p>\n<p>Codenamed Shitrix by the larger infosec community, this vulnerability impacts <strong>Citrix Application Delivery Controller (ADC)<\/strong>, formerly known as NetScaler ADC, and <strong>Citrix Gateway<\/strong>, formerly known as NetScaler Gateway.<\/p>\n<p>The vulnerability is a path traversal bug that can be exploited over the internet by an attacker. The attacker does not have to provide authentication credentials for the device when launching an attack. All an attacker has to do is send a boobytrapped request to the vulnerable Citrix appliance, along with the exploit code they want to execute on the device.<\/p>\n<p>The bug was discovered and reported to Citrix by Mikhail Klyuchnikov, a researcher at UK security firm Positive Technologies. Klyuchnikov said that at the time he found the bug, there were more than 80,000 organizations running vulnerable Citrix instances.<\/p>\n<h3>Still no patch almost a month later<\/h3>\n<p>On December 17, Citrix released a <a href=\"https:\/\/support.citrix.com\/article\/CTX267027\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">security advisory<\/a> for its customers, but the company did not release a patch. Instead, Citrix published <a href=\"https:\/\/support.citrix.com\/article\/CTX267679\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">a support page detailing mitigations<\/a> in the form of configuration adjustments.<\/p>\n<p>Almost a month later, Citrix has still not released a patch, despite the bug&#8217;s severity and its wide impact.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>In the meantime, threat actors have been starting to figure out how to exploit the bug &#8212; which many security researchers said was trivial and only required a few lines of code.<\/p>\n<p>Scans have been happening for weeks, but exploitation attemps have also begun for at least three days, according to various security experts and cyber-security firms who run honeypot servers.<\/p>\n<div class=\"twitterContainer\" readability=\"7.0529595015576\">\n<blockquote class=\"twitter-tweet\" readability=\"7.9345794392523\">\n<p lang=\"en\" dir=\"ltr\">\ud83d\udea8 In my Citrix ADC honeypot, CVE-2019-19781 is being probed with attackers reading sensitive credential config files remotely using ..\/ directory traversal (a variant of this issue). So this is in the wild, active exploitation starting up. \ud83d\udea8 <a href=\"https:\/\/t.co\/pDZ2lplSBj\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">https:\/\/t.co\/pDZ2lplSBj<\/a><\/p>\n<p>\u2014 Kevin Beaumont (@GossiTheDog) <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1214892555306971138?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">January 8, 2020<\/a><\/p><\/blockquote>\n<\/div>\n<p>The bug&#8217;s severity and the clear danger to enterprise systems did not go unnoticed. Over the past few weeks, security experts, government officials, government cybersecurity agencies, CERT teams, and about anyone under the sun who understands basic enterprise security have been warning companies to apply the Citrix mitigations to prevent attacks from exploiting vulnerable machines until Citrix finally releases a permanent fix in the form of a patch.<\/p>\n<div class=\"twitterContainer\" readability=\"5.95\">\n<blockquote class=\"twitter-tweet\" readability=\"5.95\">\n<p lang=\"en\" dir=\"ltr\">The Citrix RCE is a doozie. Lots of good security architectures appropriately rely on Citrix to reduce the attack surface significantly and now they are at significant risk. Get this patched. <a href=\"https:\/\/t.co\/7B9d7e7YK7\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">https:\/\/t.co\/7B9d7e7YK7<\/a><\/p>\n<p>\u2014 Rob Joyce (@RGB_Lights) <a href=\"https:\/\/twitter.com\/RGB_Lights\/status\/1215526650605121537?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">January 10, 2020<\/a><\/p><\/blockquote>\n<\/div>\n<div class=\"twitterContainer\" readability=\"8.3529411764706\">\n<blockquote class=\"twitter-tweet\" readability=\"10.551083591331\">\n<p lang=\"en\" dir=\"ltr\">Can\u2019t emphasize enough &#8211; please please please do the mitigation steps for the Citrix exploit as soon as possible.<\/p>\n<p>This is going to be a really bad one folks.<\/p>\n<p>Easy to automate and exploit and is widely used across the Internet.<\/p>\n<p>Mitigation here: <a href=\"https:\/\/t.co\/jeF0UC6A9V\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">https:\/\/t.co\/jeF0UC6A9V<\/a><\/p>\n<p>\u2014 Dave Kennedy (ReL1K) (@HackingDave) <a href=\"https:\/\/twitter.com\/HackingDave\/status\/1215800253246513155?ref_src=twsrc%5Etfw\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">January 11, 2020<\/a><\/p><\/blockquote>\n<\/div>\n<h3>Proof-of-concept code broadly available<\/h3>\n<p>While attacks have been slowly climbing in intensity over the past few days, the security community believed things wouldn&#8217;t get out of hand, as attackers would still need to figure out a way to exploit vulnerable Citrix systems, lacking a public exploit.<\/p>\n<p>This changed yesterday, on Friday night, when a group of security researchers calling themselves Project Zero India released <a href=\"https:\/\/github.com\/projectzeroindia\/CVE-2019-19781\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">the first proof-of-concept (PoC) exploit code<\/a> for the CVE-2019-19781 vulnerability.<\/p>\n<p>A few hours later, the team at TrustedSec followed <a href=\"https:\/\/github.com\/trustedsec\/cve-2019-19781\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">with their own PoC<\/a>. The TrustedSec team had developed their PoC earlier this week but refused to release it because it was aware that publishing the code on the internet would trigger a spike in exploitation attempts, something they did not want to do.<\/p>\n<p>&#8220;We are only disclosing this due to others publishing the exploit code first,&#8221; TrustedSec said in a description of their tool on GitHub. &#8220;We would have hoped to have had this hidden for a while longer while defenders had appropriate time to patch their systems.&#8221;<\/p>\n<p>The security firm hopes that companies use their tool to test their networks for vulnerable Citrix instances and if they configured the Citrix mitigation correctly.<\/p>\n<p>They&#8217;ve also published a blog post on <a href=\"https:\/\/www.trustedsec.com\/blog\/netscaler-remote-code-execution-forensics\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">how to analyze Citrix systems for any possible compromise<\/a>, just in case some companies have had the unfortunate luck to have already been hacked.<\/p>\n<p><em>Additional technical write-ups analyzing the Citrix bug:<\/em> <a href=\"https:\/\/www.ptsecurity.com\/ww-en\/about\/news\/citrix-vulnerability-allows-criminals-to-hack-networks-of-80000-companies\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"><em>Positive Technologies<\/em><\/a><em>,<\/em> <a href=\"https:\/\/www.mdsec.co.uk\/2020\/01\/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"><em>MDSec<\/em><\/a><em>,<\/em> <a href=\"https:\/\/www.trustedsec.com\/blog\/critical-exposure-in-citrix-adc-netscaler-unauthenticated-remote-code-execution\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"><em>TrustedSec<\/em><\/a><em>.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two Citrix bug (CVE-2019-19781) exploits have been published on GitHub yesterday, making future attacks trivial for most hackers.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32730,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-32729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Proof-of-concept code published for Citrix bug as attacks intensify 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proof-of-concept code published for Citrix bug as attacks intensify 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-11T07:00:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png\" \/>\n\t<meta property=\"og:image:width\" content=\"995\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Proof-of-concept code published for Citrix bug as attacks intensify\",\"datePublished\":\"2020-01-11T07:00:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/\"},\"wordCount\":774,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/\",\"name\":\"Proof-of-concept code published for Citrix bug as attacks intensify 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png\",\"datePublished\":\"2020-01-11T07:00:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png\",\"width\":995,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proof-of-concept code published for Citrix bug as attacks intensify\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proof-of-concept code published for Citrix bug as attacks intensify 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/","og_locale":"en_US","og_type":"article","og_title":"Proof-of-concept code published for Citrix bug as attacks intensify 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-11T07:00:51+00:00","og_image":[{"width":995,"height":550,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Proof-of-concept code published for Citrix bug as attacks intensify","datePublished":"2020-01-11T07:00:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/"},"wordCount":774,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/","url":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/","name":"Proof-of-concept code published for Citrix bug as attacks intensify 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png","datePublished":"2020-01-11T07:00:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify.png","width":995,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Proof-of-concept code published for Citrix bug as attacks intensify"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32729"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32729\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32730"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}