Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable

Posted on July 18, 2025July 18, 2025 By CWS

No less than 100 organizations have been hacked by way of the exploitation of CitrixBleed 2, a important NetScaler vulnerability patched in mid-June, and 1000’s of cases stay weak.

Tracked as CVE-2025–5777 (CVSS rating of 9.3), the flaw is described as an inadequate enter validation problem that would permit attackers to learn out-of-bounds reminiscence.

Safety researchers demonstrated that the bug may be exploited to retrieve session tokens from weak NetScaler cases, permitting attackers to hijack periods and bypass MFA, and CISA added the CVE to the KEV catalog, urging federal businesses to patch it instantly.

In-the-wild exploitation of the safety defect, nonetheless, started lengthy earlier than PoC code was shared publicly, contemporary stories from safety researcher Kevin Beaumont and menace intelligence agency GreyNoise reveal.

The safety researcher, who warned of the dangers related to CVE-2025–5777 shortly after Citrix launched patches on June 17, and who named the bug CitrixBleed 2, says exploitation began June 20, consistent with a earlier ReliaQuest report.

GreyNoise locations the primary assaults focusing on the vulnerability inside the identical timeframe, saying it first noticed exercise on June 24.

On June 26, Citrix revealed a weblog put up disputing the exploitation stories, and solely up to date it on July 11, after CISA included the safety defect in KEV.

The up to date put up reiterates that solely NetScaler ADC and NetScaler Gateway deployments configured as a gateway or AAA digital server are weak, urging prospects to patch them as quickly as attainable and noting that each one lively periods ought to be killed after upgrading, and none exported.Commercial. Scroll to proceed studying.

In response to Beaumont, all session cookies also needs to be cleared after making use of the patch, because the vulnerability leaks them.

“It seems Citrix has tousled and never advised folks to clear all session varieties for CitrixBleed 2… which instantly leaves prospects who utilized patches nonetheless susceptible to session hijacking,” Beaumont notes.

The noticed assaults, the researcher says, hit entities throughout the schooling, monetary providers, authorities, authorized, expertise, and telecommunication sectors, and remodeled 100 victims.

The attackers have been seen rigorously profiling victims, after which continuing to gather information from consumer Citrix periods and to determine persistence utilizing official MSP admin instruments. No less than one ransomware group has been exploiting the flaw for preliminary entry.

By July 11, Imperva had seen near 12 million assaults focusing on CVE-2025–5777, which exhibits that “the exercise is clearly spray and pray,” Beaumont notes.

GreyNoise says at the very least 26 malicious IPs have been used to conduct exploitation makes an attempt over the previous three weeks, most of them from China, Russia, South Korea, and the US.

“Early exploitation makes an attempt got here from malicious IPs geolocated in China. Relatively than exploiting indiscriminately, these IPs focused GreyNoise sensors configured to emulate Citrix NetScaler home equipment, suggesting deliberate focusing on,” GreyNoise notes.

As of July 17, near 4,700 NetScaler cases haven’t been patched in opposition to CitrixBleed 2, information from The Shadowserver Basis exhibits.

Citrix prospects are suggested to replace to NetScaler ADC variations 14.1-43.56, 13.1-58.32, 13.1-FIPS, 13.1-NDcPP 13.1-37.235, and 12.1-FIPS 12.1-55.328, and NetScaler Gateway variations 14.1-43.56 and 13.1-58.32. As well as, they need to kill all periods and clear session cookies to completely mitigate the dangers related to this vulnerability.

Associated: Google Says AI Agent Thwarted Exploitation of Essential Vulnerability

Associated: Essential Wing FTP Server Vulnerability Exploited

Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild

Associated: CISA Warns of Two Exploited TeleMessage Vulnerabilities

Security Week News Tags:CitrixBleed, Hacked, Instances, Organizations, Thousands, Vulnerable

Post navigation

Previous Post: CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits
Next Post: Why IT Leaders Must Rethink Backup in the Age of Ransomware

Related Posts

161,000 People Impacted by Krispy Kreme Data Breach Security Week News
Marks & Spencer Expects Ransomware Attack to Cost $400 Million Security Week News
Thousands Hit by The North Face Credential Stuffing Attack Security Week News
DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total  Security Week News
Bipartisan Bill Aims to Block Chinese AI From Federal Agencies Security Week News
DanaBot Botnet Disrupted, 16 Suspects Charged Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News