Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Exploits, Technical Details Released for CitrixBleed2 Vulnerability

Posted on July 8, 2025July 8, 2025 By CWS

Safety researchers have launched technical data and exploit code concentrating on a lately patched important vulnerability in Citrix NetScaler.

Citrix launched patches for the bug, tracked as CVE-2025-5777 (CVSS rating of 9.3), on June 17, warning that inadequate enter validation might result in out-of-bounds reminiscence reads.

The flaw impacts NetScaler ADC and NetScaler Gateway iterations configured as a gateway or AAA digital server and was addressed in NetScaler ADC variations 14.1-43.56, 13.1-58.32, 13.1-FIPS, 13.1-NDcPP 13.1-37.235, and 12.1-FIPS 12.1-55.328, and NetScaler Gateway variations 14.1-43.56 and 13.1-58.32.

Roughly per week later, safety agency ReliaQuest warned it was seeing proof that the safety defect was actively exploited within the wild.

Warning that greater than 50,000 NetScaler cases may very well be impacted, safety researcher Kevin Beaumont named the problem CitrixBleed 2, evaluating it to CVE-2023-4966 (dubbed CitrixBleed), which was broadly exploited two years in the past.

Citrix disputed the claims in late June, saying it had no proof that CVE-2025-5777 was associated to CitrixBleed or that it has been exploited in assaults, however urged prospects to replace their cases as quickly as doable.

On Friday, cybersecurity agency watchTowr printed its evaluation of CitrixBleed 2, explaining how it may be exploited to leak reminiscence utilizing HTTP requests. The writeup consists of code for figuring out weak hosts.

On Monday, Horizon3.ai launched their very own technical data on the bug, demonstrating how their exploit can be utilized to retrieve person session tokens.Commercial. Scroll to proceed studying.

Each safety companies identified that the problem impacts NetScaler’s authentication endpoint and that it may be triggered utilizing incorrect login requests. As a result of the equipment responds with parts of the reminiscence content material, sending repeated requests leads to further reminiscence contents being disclosed.

NetScaler customers are suggested to replace to the newest model as quickly as doable, particularly because it incorporates patches not just for CitrixBleed 2, but in addition for CVE 2025-6543 (CVSS rating of 9.2), a important flaw exploited as a zero-day.

As of July 7, roughly 1,000 NetScaler cases stay unpatched in opposition to CVE-2025-5777, and greater than 2,200 in opposition to the zero-day, knowledge from The Shadowserver Basis reveals.

Associated: 1000’s of Citrix NetScaler Situations Unpatched Towards Exploited Vulnerabilities

Associated: Citrix Warns of Password Spraying Assaults Focusing on NetScaler Home equipment

Associated: Chinese language Spies Exploit Ivanti Vulnerabilities Towards Crucial Sectors

Security Week News Tags:CitrixBleed2, Details, Exploits, Released, Technical, Vulnerability

Post navigation

Previous Post: PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request
Next Post: SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover

Related Posts

MIND Raises $30 Million for Data Loss Prevention Security Week News
SimpleHelp Vulnerability Exploited Against Utility Billing Software Users Security Week News
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins Security Week News
Google Warns UK Retailer Hackers Now Targeting US Security Week News
SonicWall Warns of Trojanized NetExtender Stealing User Information Security Week News
Ongoing Campaign Uses 60 NPM Packages to Steal Data Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
  • Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
  • Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News