Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks

Posted on July 12, 2025July 12, 2025 By CWS

CISA has issued an pressing warning concerning a crucial vulnerability in Citrix NetScaler ADC and Gateway merchandise that’s being actively exploited in cyberattacks. 

The vulnerability, tracked as CVE-2025-5777, has been added to CISA’s Identified Exploited Vulnerabilities (KEV) catalog with a direct remediation deadline of July 11, 2025.

Key Takeaways1. CISA warns of actively exploited CVE-2025-5777 vulnerability in Citrix NetScaler ADC and Gateway merchandise.2. Out-of-bounds learn vulnerability (CWE-125) impacts Gateway and AAA digital server configurations, inflicting reminiscence overread.3. Apply vendor mitigations by July 11, 2025, or discontinue product use if fixes unavailable.4. Lively exploitation threatens system compromise via delicate reminiscence entry

Out-of-Bounds Learn Vulnerability (CVE-2025-5777)

The recognized safety flaw is assessed as an out-of-bounds learn vulnerability stemming from inadequate enter validation throughout the NetScaler structure. 

In line with CISA’s advisory, this vulnerability is categorized beneath CWE-125 (Out-of-bounds Learn), which represents a category of software program weaknesses the place packages learn knowledge previous the top or earlier than the start of the supposed buffer.

The technical influence of CVE-2025-5777 manifests as reminiscence overread circumstances when NetScaler techniques are configured in particular operational modes. 

The vulnerability particularly impacts deployments the place NetScaler capabilities as a Gateway with VPN digital server configurations, ICA Proxy providers, CVPN implementations, or RDP Proxy setups. 

Moreover, techniques configured with AAA (Authentication, Authorization, and Accounting) digital servers are equally vulnerable to exploitation.

CISA’s inclusion of this vulnerability within the KEV catalog signifies that menace actors are actively exploiting CVE-2025-5777 in real-world assault eventualities. 

The out-of-bounds learn situation can doubtlessly permit malicious actors to entry delicate reminiscence contents, doubtlessly resulting in info disclosure or system compromise.

Whereas the connection to ransomware campaigns stays unknown in line with present intelligence, the energetic exploitation standing elevates the danger profile considerably. 

Organizations using affected Citrix NetScaler merchandise face quick publicity to potential knowledge breaches and system infiltration. 

The vulnerability’s location throughout the enter validation mechanisms makes it notably regarding, because it may function an preliminary assault vector for extra subtle multi-stage assaults.

Threat FactorsDetailsAffected ProductsCitrix NetScaler ADC and GatewayImpactOut-of-bounds learn vulnerabilityExploit PrerequisitesNetScaler configured as:- Gateway (VPN digital server)- ICA Proxy- CVPN- RDP Proxy- AAA digital serverCVSS 3.1 Score7.5 (Excessive)

Mitigation 

CISA has established an aggressive remediation timeline, requiring federal businesses to deal with the vulnerability by July 11, 2025. 

The company recommends implementing vendor-provided mitigations as the first response technique, with particular steering obtainable via Citrix’s official help documentation.

Organizations are suggested to observe relevant steering beneath Binding Operational Directive (BOD) 22-01 for cloud providers implementations. 

In instances the place efficient mitigations are unavailable or can’t be applied promptly, CISA recommends discontinuing use of the affected merchandise till correct safety measures will be established.

System directors ought to prioritize quick evaluation of their NetScaler deployments and implement applicable safety measures to forestall exploitation of this crucial vulnerability.

Examine stay malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Attacks, CISA, CitrixBleed, Exploited, Vulnerability, Warns

Post navigation

Previous Post: How to Monitor Application Logs for Security Events
Next Post: FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation

Related Posts

Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels Cyber Security News
Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Cyber Security News
International Criminal Court Hit by New Sophisticated Cyber Attack Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Grok-4 Falls to a Jailbreak Two days After Its Release
  • Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control
  • Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Grok-4 Falls to a Jailbreak Two days After Its Release
  • Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control
  • Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News