Your security is vital to our success.

At Citrix, we use our own solutions to implement security measures at the organizational, architectural, and operational levels so your data, applications, and infrastructure remain safe.

Stay up to date

Learn the latest in security best practices that we advise our customers adopt to make their Citrix deployments as secure as possible. As part of this series of technical articles, we will share real world examples, lessons learned, and enablement webinars tackling our customers’ most pressing needs.

Multi-factor authentication: Security improvements that can be used to combat password spraying

  • A fix has been issued for a vulnerability in Citrix Hypervisor (formerly Citrix XenServer) that may allow an unauthenticated attacker the ability to send traffic to a host over a management or storage network to cause the host to crash. Please refer to Support article CTX256725 for details.
  • A number of microarchitectural data sampling (MDS) vulnerabilities have been identified in certain Intel CPU hardware. Please review the blog for information on how this could impact Citrix customers and specific recommendations on how to address them in your Citrix environments. 
  • Citrix has completed the investigation and remediation of unauthorized access to our internal network that allowed hackers to obtain access to business documents. No Citrix product or service was compromised in this incident. Please refer to our blog to learn more about the results of the investigation.