Home / CVE DB / CVE-2024-7890
Standard
Vulnerability Identifier

CVE-2024-7890

2024-09-11
Severity Assessment
7.3
HIGH
CVSS v3.x Score
Clinical Analysis (Description)

Local privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
High
Integrity
High
Availability
AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Weakness Classification

CWE-NVD-CWE-noinfo

Affected Population

Affected Configurations

Total: 68 detected entries

Software List Scrollable
ci
workspace
Vendor: citrix • v1808
ci
workspace
Vendor: citrix • v1902
ci
workspace
Vendor: citrix • v2301.1
ci
workspace
Vendor: citrix • v1904.1
ci
workspace
Vendor: citrix • v2303
ci
workspace
Vendor: citrix • v2206
ci
workspace
Vendor: citrix • v2012.1
ci
workspace
Vendor: citrix • v1910
ci
workspace
Vendor: citrix • v2208
ci
workspace
Vendor: citrix • v1903
ci
workspace
Vendor: citrix • v23.9.0.24.4
ci
workspace
Vendor: citrix • v2305
ci
workspace
Vendor: citrix • v2404
ci
workspace
Vendor: citrix • v1809
ci
workspace
Vendor: citrix • v1909
ci
workspace
Vendor: citrix • v2007
ci
workspace
Vendor: citrix • v1911
ci
workspace
Vendor: citrix • v21.1.5
ci
workspace
Vendor: citrix • v2012
ci
workspace
Vendor: citrix • v21.1.0
ci
workspace
Vendor: citrix • v2103
ci
workspace
Vendor: citrix • v2102
ci
workspace
Vendor: citrix • v21.2.0
ci
workspace
Vendor: citrix • v1910.2
ci
workspace
Vendor: citrix • v2105
ci
workspace
Vendor: citrix • v2304
ci
workspace
Vendor: citrix • v1906
ci
workspace
Vendor: citrix • v2203.1
ci
workspace
Vendor: citrix • v1904
ci
workspace
Vendor: citrix • v2209
ci
workspace
Vendor: citrix • v2308
ci
workspace
Vendor: citrix • v1812
ci
workspace
Vendor: citrix • v2111
ci
workspace
Vendor: citrix • v19.12.4000
ci
workspace
Vendor: citrix • v2008
ci
workspace
Vendor: citrix • v2004
ci
workspace
Vendor: citrix • v1901
ci
workspace
Vendor: citrix • v2307
ci
workspace
Vendor: citrix • v2212
ci
workspace
Vendor: citrix • v2010
ci
workspace
Vendor: citrix • v2312
ci
workspace
Vendor: citrix • v2310
ci
workspace
Vendor: citrix • v2309
ci
workspace
Vendor: citrix • v2306
ci
workspace
Vendor: citrix • v1912
ci
workspace
Vendor: citrix • v2112
ci
workspace
Vendor: citrix • v2009
ci
workspace
Vendor: citrix • v1907
ci
workspace
Vendor: citrix • v2211
ci
workspace
Vendor: citrix • v2402
ci
workspace
Vendor: citrix • v2103.1
ci
workspace
Vendor: citrix • v2009.6
ci
workspace
Vendor: citrix • v1810
ci
workspace
Vendor: citrix • v2001
ci
workspace
Vendor: citrix • v2101
ci
workspace
Vendor: citrix • v2301
ci
workspace
Vendor: citrix • v2302
ci
workspace
Vendor: citrix • v2311
ci
workspace
Vendor: citrix • v2404.1
ci
workspace
Vendor: citrix • v1908
ci
workspace
Vendor: citrix • v2006
ci
workspace
Vendor: citrix • v2205.6
ci
workspace
Vendor: citrix • v1903.1
ci
workspace
Vendor: citrix • v2002
ci
workspace
Vendor: citrix • v1905
ci
workspace
Vendor: citrix • v2207
ci
workspace
Vendor: citrix • v2210
ci
workspace
Vendor: citrix • v2005
Timeline

Time Line

PUBLICATION
11 Sep 2024
MODIFICATION
22 Oct 2024
Impact Statistics

Key Metrics

CVSS Score
7.3
HIGH
Products
68
Affected
Articles
1
Published
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Associated Cyber Intelligence

Related News Articles

1 article(s) mentioning this vulnerability

Article #1

Mise à jour de sécurité des produits IBM : Plusieurs vulnérabilités identifiées

IBM a publié des correctifs de sécurité pour plusieurs produits en raison de vulnérabilités critiques qui pourraient entraîner une exécution…

7
02 Jan 2026 Exploitation de vulnérabilité HIGH
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.