Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA

Posted on July 14, 2025July 14, 2025 By CWS

The US cybersecurity company CISA is looking pressing consideration to a not too long ago disclosed Citrix NetScaler vulnerability that has been in comparison with the notorious CitrixBleed flaw of 2023.

Tracked as CVE-2025-5777 (CVSS rating of 9.3), the safety defect was disclosed on June 17, when Citrix rolled out patches for it, warning that it may very well be exploited to learn out-of-bounds reminiscence.

The flaw is known as CitrixBleed 2, after safety researcher Kevin Beaumont in contrast it to the broadly exploited CVE-2023-4966 (dubbed CitrixBleed).

Affecting all NetScaler ADC and NetScaler Gateway deployments configured as a gateway or AAA digital server, the safety defect might be triggered utilizing incorrect login requests, to which the equipment responds with parts of reminiscence content material.

Attackers can ship repeated requests to NetScaler’s authentication endpoint to retrieve further reminiscence contents, cybersecurity companies watchTowr and Horizon3.ai revealed in technical writeups.

The uncovered info can embody session tokens, which might be leveraged to hijack periods and bypass multi-factor authentication. 

In late June, Citrix disputed a ReliaQuest warning that hackers had already began exploiting the safety defect, however CISA is now warning of the vital threat CVE-2025-5777 exposes organizations to, after including the flaw to its Identified Exploited Vulnerabilities (KEV) catalog.

Federal companies usually want to handle flaws which can be newly added to KEV inside three weeks, however they got a single day to resolve this safety defect.Commercial. Scroll to proceed studying.

“This vulnerability in Citrix NetScaler ADC and Gateway programs, additionally known as Citrix Bleed 2, poses a big, unacceptable threat to the safety of the federal civilian enterprise,” CISA Appearing Government Assistant Director for Cybersecurity Chris Butera instructed SecurityWeek.

“As America’s cyber protection company and the operational lead for federal civilian cybersecurity, CISA is taking pressing motion by directing companies to patch inside 24 hours and we encourage all organizations to patch immediately,” Butera continued.

Patches for CitrixBleed 2 have been included in NetScaler ADC variations 14.1-43.56, 13.1-58.32, 13.1-FIPS, 13.1-NDcPP 13.1-37.235, and 12.1-FIPS 12.1-55.328, and NetScaler Gateway variations 14.1-43.56 and 13.1-58.32.

Greater than 400 internet-accessible NetScaler situations stay unpatched in opposition to this CVE, information from The Shadowserver Basis reveals. Roughly 500 deployments are affected by one other vital difficulty, tracked as CVE 2025-6543 (CVSS rating of 9.2), which was exploited as a zero-day.

Associated: Crucial Wing FTP Server Vulnerability Exploited

Associated: CISA Warns of Two Exploited TeleMessage Vulnerabilities

Associated: Vulnerabilities in CISA KEV Are Not Equally Crucial: Report

Associated: 1000’s of Citrix NetScaler Situations Unpatched Towards Exploited Vulnerabilities

Security Week News Tags:CISA, CitrixBleed, Flaw, Poses, Risk, Unacceptable

Post navigation

Previous Post: Google Gemini Tricked Into Showing Phishing Message Hidden in Email 
Next Post: Train Hack Gets Proper Attention After 20 Years: Researcher 

Related Posts

Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News
Vodafone Germany Fined $51 Million Over Privacy, Security Failures Security Week News
Samsung Announces Security Improvements for Galaxy Smartphones Security Week News
Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks Security Week News
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Security Week News
RevEng.ai Raises $4.15 Million to Secure Software Supply Chain Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
  • Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
  • Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News