Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild

Posted on July 11, 2025July 11, 2025 By CWS

Researchers have noticed widespread exploitation makes an attempt focusing on a crucial reminiscence disclosure vulnerability in Citrix NetScaler units, designated as CVE-2025-5777 and dubbed “CitrixBleed 2.” 

This pre-authentication flaw allows attackers to craft malicious requests that leak uninitialized reminiscence from affected NetScaler ADC and Gateway units, probably exposing delicate information, together with session tokens, passwords, and configuration values. 

The vulnerability has prompted instant safety responses from organizations worldwide, with over 200,000 scanning makes an attempt detected inside days of the proof-of-concept disclosure.

Key Takeaways1. CVE-2025-5777 impacts Citrix NetScaler units, permitting unauthenticated attackers to leak delicate reminiscence information together with session tokens and passwords.2. Over 200,000 scanning makes an attempt have been detected focusing on susceptible endpoints, indicating widespread menace actor exercise.3. Attackers ship crafted requests with giant Consumer-Agent headers to set off steady reminiscence leaks from the identical goal.4. Organizations should instantly patch affected NetScaler variations and implement Akamai’s protecting guidelines because of public exploit availability.

CitrixBleed 2 Vulnerability (CVE-2025-5777)

The CitrixBleed 2 vulnerability stems from improper reminiscence dealing with within the authentication operate of Citrix NetScaler units. 

The flaw exploits an uninitialized login variable mixed with insufficient enter validation and lacking error dealing with within the authentication logic. 

For the reason that underlying code is written in C/C++, which doesn’t mechanically initialize variables, attackers can entry random stack reminiscence containing leftover information from earlier operations.

The vulnerability impacts a number of NetScaler variations, together with NetScaler ADC and Gateway 14.1 earlier than 14.1-43.56, model 13.1 earlier than 13.1-58.32, NetScaler ADC 13.1-FIPS and NDcPP earlier than 13.1-37.235-FIPS, and NetScaler ADC 12.1-FIPS earlier than 12.1-55.328-FIPS. 

The assault targets the URL path /p/u/doAuthentication.do and requires no authentication, making it significantly accessible to menace actors.

Attackers exploit this vulnerability via a scientific strategy involving reconnaissance, enumeration, and repeated exploitation makes an attempt. 

The assault begins with scanning for uncovered Citrix NetScaler cases, adopted by model verification to determine susceptible targets. 

The precise exploit includes sending crafted POST requests to the /p/u/doAuthentication.do endpoint with an unusually giant Consumer-Agent header containing recognizable patterns.

The approach earned the “CitrixBleed” moniker as a result of attackers can repeatedly set off reminiscence leaks by sending equivalent payloads, with every try exposing new chunks of stack reminiscence. 

The outsized Consumer-Agent header injects distinctive markers like “THR-WAF-RESEARCH” into the stack, which subsequently seem inside XML tags in HTTP responses, confirming profitable reminiscence disclosure and revealing delicate data.

Danger FactorsDetailsAffected Merchandise– NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-43.56- NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-58.32- NetScaler ADC 13.1-FIPS and NDcPP BEFORE 13.1-37.235-FIPS and NDcPP- NetScaler ADC 12.1-FIPS BEFORE 12.1-55.328-FIPSImpactMemory disclosure of uninitialized stack memoryExploit Stipulations– No authentication required (pre-authentication flaw)- Community entry to focus on NetScaler device- Potential to ship HTTP POST requests- Goal endpoint: /p/u/doAuthentication.do- No prior circumstances or particular privileges neededCVSS 3.1 Score7.5 (Excessive)

Mitigation Measures

Akamai’s safety workforce has responded to the menace by releasing Fast Rule 3000967 via their App & API Protector platform.

Initially deployed with an “Alert” motion on July 7, 2025, the rule was upgraded to “Deny” standing the next day after validation.

Safety researchers noticed vital scanning exercise starting July 8, 2025, with over 200,000 POST requests focusing on the susceptible endpoint throughout a number of hostnames and IP addresses. 

This massive-scale scanning represents organized makes an attempt to determine susceptible NetScaler cases for potential exploitation. 

Organizations are strongly suggested to patch affected units instantly and implement further monitoring for indicators of compromise, because the vulnerability’s pre-authentication nature and public proof-of-concept availability create substantial threat publicity.

Examine dwell malware conduct, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Actively, CitrixBleed, Exploiting, Hackers, Vulnerability, Wild

Post navigation

Previous Post: 11 Best SysAdmin Tools – 2025
Next Post: Rowhammer Attack Demonstrated Against Nvidia GPU

Related Posts

Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Cyber Security News
Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Cyber Security News
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms Cyber Security News
Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis Cyber Security News
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control
  • Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data
  • Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security
  • FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control
  • Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data
  • Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security
  • FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News