Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Posted on November 13, 2025November 13, 2025 By CWS

A risk actor was seen exploiting two vital Citrix and Cisco vulnerabilities as zero-days weeks earlier than patches have been launched, Amazon reviews.

The Citrix flaw, tracked as CVE-2025-5777 (CVSS rating of 9.3), is an inadequate enter validation challenge resulting in an out-of-bounds reminiscence learn in NetScaler ADC and NetScaler Gateway.

It was patched on June 17 and was quickly after dubbed CitrixBleed 2 by safety researcher Kevin Beaumont, who in contrast it to the CitrixBleed bug (CVE-2023-4966) that allowed attackers to bypass multi-factor authentication.

Roughly one week later, the primary exploitation makes an attempt concentrating on CitrixBleed 2 have been seen, and technical particulars and exploits emerged a number of days later. In mid-July, CISA warned that the flaw poses an unacceptable danger to federal companies.

Now, Amazon says its honeypot service detected exploitation makes an attempt previous to the defect’s public disclosure. An APT “had been exploiting the vulnerability as a zero-day,” the corporate says.

Amazon’s investigation into the assaults additionally uncovered zero-day exploitation of CVE-2025-20337 (CVSS rating of 10/10), a Cisco Id Service Engine (ISE) vulnerability disclosed on July 16.

Affecting a particular API of ISE and ISE Passive Id Connector (ISE-PIC), the flaw permits unauthenticated attackers to execute arbitrary code on the underlying working system with root privileges.

Shortly after disclosing the vulnerability, Cisco warned that it had proof that risk actors have been exploiting it within the wild, together with one other vital bug in the identical API, specifically CVE-2025-20281.Commercial. Scroll to proceed studying.

In accordance with Amazon’s new report, in-the-wild exploitation of the Cisco ISE flaw began earlier than complete patches have been launched.

The APT was seen deploying a customized net shell posing as a legit ISE element, which operated in-memory and relied on Java reflection to inject itself into working threads.

The malware, a backdoor particularly concentrating on ISE environments, would monitor all HTTP requests throughout the Tomcat server, may evade detection utilizing DES encryption with non-standard Base64 encoding, and might be accessed solely by way of particular HTTP headers.

“The risk actor’s customized tooling demonstrated a deep understanding of enterprise Java purposes, Tomcat internals, and the particular architectural nuances of the Cisco Id Service Engine,” Amazon says.

The corporate believes the assaults have been orchestrated by a extremely resourced risk actor that had entry to the unpublished zero-days both by superior vulnerability analysis capabilities or by entry to private vulnerability info.

Requested by SecurityWeek whether or not it has been in a position to hyperlink the assaults to a particular risk actor, Amazon mentioned it couldn’t share any info on attribution.

Associated: CitrixBleed 2: 100 Organizations Hacked, Hundreds of Situations Nonetheless Weak

Associated: Cisco Patches Crucial Vulnerabilities in Contact Heart Equipment

Associated: Cisco, Fortinet, Palo Alto Networks Units Focused in Coordinated Marketing campaign

Associated: Citrix Patches Exploited NetScaler Zero-Day

Security Week News Tags:Amazon, Cisco, CitrixBleed, Exploited, ISE, Vulnerabilities, ZeroDays

Post navigation

Previous Post: New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands
Next Post: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories

Related Posts

Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Apple Patches 19 WebKit Vulnerabilities  Security Week News
NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms Security Week News
CISA Warns AMI BMC Vulnerability Exploited in the Wild Security Week News
Realm.Security Raises $15 Million in Series A Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News