Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild

28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild

Posted on August 27, 2025August 27, 2025 By CWS

A vital zero-day distant code execution (RCE) vulnerability, tracked as CVE-2025-7775, is affecting over 28,000 Citrix situations worldwide.

The flaw is being actively exploited within the wild, prompting the U.S. Cybersecurity and Infrastructure Safety Company (CISA) so as to add it to its Recognized Exploited Vulnerabilities (KEV) catalog.

The Shadowserver Basis found that as of August 26, 2025, greater than 28,200 servers stay unpatched, with the best concentrations of susceptible techniques positioned in the USA and Germany.

Weak servers by nation

Citrix has launched patches and urges directors to use them instantly to stop system compromise. The lively exploitation of this vulnerability poses a big risk, because it permits unauthenticated attackers to execute arbitrary code on affected servers, doubtlessly resulting in full system takeover, information theft, and additional community infiltration.

CVE-2025-7775: A Important RCE Flaw

Distant code execution vulnerabilities are among the many most extreme safety flaws, and CVE-2025-7775 isn’t any exception. It permits a distant attacker, while not having any credentials, to run malicious code on a susceptible Citrix server.

Vulnerability DetailsInformationCVE IDCVE-2025-7775Vulnerability TypeUnauthenticated Distant Code Execution (RCE)StatusActively Exploited within the Wild (CISA KEV)Affected InstancesOver 28,200 (as of Aug 26, 2025)Major MitigationApply patches from Citrix Safety Bulletin CTX694938Top Affected CountriesUnited States, Germany

This stage of entry may allow risk actors to deploy ransomware, set up backdoors for persistent entry, exfiltrate delicate company information, or use the compromised server as a pivot level to assault different techniques throughout the community.

The “zero-day” designation signifies that attackers have been exploiting the flaw earlier than an official patch was made accessible by Citrix. This gave risk actors a vital window of alternative to compromise uncovered techniques.

Given the widespread use of Citrix merchandise for safe distant entry and utility supply in enterprise environments, the potential affect of this vulnerability is substantial. A profitable exploit may disrupt enterprise operations and lead to important monetary and reputational harm.

The affirmation of in-the-wild exploitation by CISA underscores the urgency for speedy motion. By including CVE-2025-7775 to the KEV catalog, CISA has mandated that U.S. Federal Civilian Govt Department (FCEB) companies patch their techniques by a specified deadline, a directive that each one organizations ought to comply with.

The widespread nature of the vulnerability, affecting tens of hundreds of servers globally, signifies that automated assaults are more likely to escalate as extra attackers weaponize the exploit.

Citrix has printed a safety bulletin, CTX694938, which accommodates the mandatory patch info and steerage. The first and handiest mitigation is to use the updates to all affected situations directly.

For organizations that can’t patch instantly, it’s essential to overview server logs for any indicators of compromise (IoCs), comparable to uncommon processes or outbound community connections.

Isolating susceptible servers from the web and deploying internet utility firewall (WAF) guidelines to dam exploit makes an attempt can function momentary compensating controls.

Bored with Filling Kinds for safety & Compliance questionnaires? Automate them in minutes with 1up! Begin Your Free Trial Now!

Cyber Security News Tags:0Day, Active, Citrix, Exploited, Exposed, RCE, Servers, Vulnerability, Wild

Post navigation

Previous Post: PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
Next Post: Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

Related Posts

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations Cyber Security News
Attacker Context and Historical iOS Zero-Click Similarities Attacker Context and Historical iOS Zero-Click Similarities Cyber Security News
Essential E-Signature Solutions for Cybersecurity in 2026 Essential E-Signature Solutions for Cybersecurity in 2026 Cyber Security News
Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts Cyber Security News
TrustWallet Chrome Extension Hacked – Users Reporting Millions in Losses TrustWallet Chrome Extension Hacked – Users Reporting Millions in Losses Cyber Security News
Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News