Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable

Posted on July 18, 2025July 18, 2025 By CWS

No less than 100 organizations have been hacked by way of the exploitation of CitrixBleed 2, a important NetScaler vulnerability patched in mid-June, and 1000’s of cases stay weak.

Tracked as CVE-2025–5777 (CVSS rating of 9.3), the flaw is described as an inadequate enter validation problem that would permit attackers to learn out-of-bounds reminiscence.

Safety researchers demonstrated that the bug may be exploited to retrieve session tokens from weak NetScaler cases, permitting attackers to hijack periods and bypass MFA, and CISA added the CVE to the KEV catalog, urging federal businesses to patch it instantly.

In-the-wild exploitation of the safety defect, nonetheless, started lengthy earlier than PoC code was shared publicly, contemporary stories from safety researcher Kevin Beaumont and menace intelligence agency GreyNoise reveal.

The safety researcher, who warned of the dangers related to CVE-2025–5777 shortly after Citrix launched patches on June 17, and who named the bug CitrixBleed 2, says exploitation began June 20, consistent with a earlier ReliaQuest report.

GreyNoise locations the primary assaults focusing on the vulnerability inside the identical timeframe, saying it first noticed exercise on June 24.

On June 26, Citrix revealed a weblog put up disputing the exploitation stories, and solely up to date it on July 11, after CISA included the safety defect in KEV.

The up to date put up reiterates that solely NetScaler ADC and NetScaler Gateway deployments configured as a gateway or AAA digital server are weak, urging prospects to patch them as quickly as attainable and noting that each one lively periods ought to be killed after upgrading, and none exported.Commercial. Scroll to proceed studying.

In response to Beaumont, all session cookies also needs to be cleared after making use of the patch, because the vulnerability leaks them.

“It seems Citrix has tousled and never advised folks to clear all session varieties for CitrixBleed 2… which instantly leaves prospects who utilized patches nonetheless susceptible to session hijacking,” Beaumont notes.

The noticed assaults, the researcher says, hit entities throughout the schooling, monetary providers, authorities, authorized, expertise, and telecommunication sectors, and remodeled 100 victims.

The attackers have been seen rigorously profiling victims, after which continuing to gather information from consumer Citrix periods and to determine persistence utilizing official MSP admin instruments. No less than one ransomware group has been exploiting the flaw for preliminary entry.

By July 11, Imperva had seen near 12 million assaults focusing on CVE-2025–5777, which exhibits that “the exercise is clearly spray and pray,” Beaumont notes.

GreyNoise says at the very least 26 malicious IPs have been used to conduct exploitation makes an attempt over the previous three weeks, most of them from China, Russia, South Korea, and the US.

“Early exploitation makes an attempt got here from malicious IPs geolocated in China. Relatively than exploiting indiscriminately, these IPs focused GreyNoise sensors configured to emulate Citrix NetScaler home equipment, suggesting deliberate focusing on,” GreyNoise notes.

As of July 17, near 4,700 NetScaler cases haven’t been patched in opposition to CitrixBleed 2, information from The Shadowserver Basis exhibits.

Citrix prospects are suggested to replace to NetScaler ADC variations 14.1-43.56, 13.1-58.32, 13.1-FIPS, 13.1-NDcPP 13.1-37.235, and 12.1-FIPS 12.1-55.328, and NetScaler Gateway variations 14.1-43.56 and 13.1-58.32. As well as, they need to kill all periods and clear session cookies to completely mitigate the dangers related to this vulnerability.

Associated: Google Says AI Agent Thwarted Exploitation of Essential Vulnerability

Associated: Essential Wing FTP Server Vulnerability Exploited

Associated: Grafana Patches Chromium Bugs, Together with Zero-Day Exploited within the Wild

Associated: CISA Warns of Two Exploited TeleMessage Vulnerabilities

Security Week News Tags:CitrixBleed, Hacked, Instances, Organizations, Thousands, Vulnerable

Post navigation

Previous Post: CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits
Next Post: Why IT Leaders Must Rethink Backup in the Age of Ransomware

Related Posts

Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack Security Week News
Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA Security Week News
In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer Security Week News
In Other News: PoC for Fortinet Bug, AI Model Subverts Shutdown, RAT Source Code Leaked Security Week News
Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Email Protection Startup StrongestLayer Emerges From Stealth Mode
  • CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Email Protection Startup StrongestLayer Emerges From Stealth Mode
  • CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News