The security community has observed active exploitation targeting Citrix vulnerability CVE-2019-19781  which allows code execution via simple directory traversal . In observed cases, the threat actor was observed querying credential configuration on active honeypots, implying an opportunistic campaign. Due to the ease of this exploit, observation of active exploitation, and the possibility of credential theft, eSentire Threat Intelligence recommends immediately following the mitigation steps provided by Citrix.
What we’re doing about it
- eSentire is actively monitoring the situation and researching detection methods.
What you should do about it
- Mitigation steps have been published by Citrix  that require a technical resource to implement configuration changes.
This vulnerability allows simple directory traversal by a remote attacker in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. No patches have been made available at this time.
- Dec 16 - Vulnerability publicly disclosed by Citrix 
- Dec 16 - Mitigation steps provided by Citrix 
- Dec 23 - Positive Technologies comments on the potential impact of the vulnerability 
- Dec 31 - SANS releases a speculative proof of concept 
- Jan 8 - Active exploitation of honeypot environment observed by researcher Kevin Beaumont