CVE-2026-2699

Citrix · ShareFile Storage Zones Controller (SZC)

Citrix ShareFile Storage Zones Controller (SZC) contains a flaw allowing unauthenticated attackers to access restricted configuration pages, leading to system changes and remote code execution.

Executive summary

Unauthenticated attackers can bypass access controls on Citrix ShareFile Storage Zones Controllers to modify system configurations and execute arbitrary code, posing a critical risk to data sovereignty.

Vulnerability

The vulnerability allows an unauthenticated remote attacker to bypass authorization checks and access restricted administrative configuration pages. By manipulating these settings, the attacker can achieve Remote Code Execution (RCE) on the SZC instance.

Business impact

The ShareFile Storage Zones Controller is responsible for managing sensitive data storage; a compromise here allows an attacker to intercept, modify, or delete corporate data. With a CVSS score of 9.8, this vulnerability represents a near-total loss of security controls, potentially leading to significant regulatory non-compliance and reputational damage.

Remediation

Immediate Action: Apply the latest security updates provided by the vendor for the ShareFile Storage Zones Controller immediately to close the unauthorized access path.

Proactive Monitoring: Review web server logs for unauthorized hits to administrative URL paths (e.g., /config) originating from external or unexpected IP addresses.

Compensating Controls: Restrict access to the SZC management interface using IP whitelisting or a VPN, and ensure a Web Application Firewall (WAF) is configured to block unauthorized administrative requests.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given that this vulnerability requires no authentication and can lead to full system takeover, it must be treated as a top-tier priority. Organizations should assume that any SZC exposed to the internet is at immediate risk and must apply the vendor-supplied patches without delay.