Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

Posted on July 11, 2025July 11, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Thursday added a essential safety flaw impacting Citrix NetScaler ADC and Gateway to its Identified Exploited Vulnerabilities (KEV) catalog, formally confirming the vulnerability has been weaponized within the wild.
The shortcoming in query is CVE-2025-5777 (CVSS rating: 9.3), an occasion of inadequate enter validation that could possibly be exploited by an attacker to bypass authentication when the equipment is configured as a Gateway or AAA digital server. It is also referred to as Citrix Bleed 2 owing to its similarities with Citrix Bleed (CVE-2023-4966).
“Citrix NetScaler ADC and Gateway comprise an out-of-bounds learn vulnerability on account of inadequate enter validation,” the company stated. “This vulnerability can result in reminiscence overread when the NetScaler is configured as a Gateway (VPN digital server, ICA Proxy, CVPN, RDP Proxy) OR AAA digital server.”

Though a number of safety distributors have since reported that the flaw has been exploited in real-world assaults, Citrix has but to replace its personal advisories to replicate this side. As of June 26, 2025, Anil Shetty, senior vice chairman of engineering at NetScaler, stated, “there isn’t a proof to counsel exploitation of CVE-2025-5777.”
Nonetheless, safety researcher Kevin Beaumont, in a report revealed this week, stated the Citrix Bleed 2 exploitation began way back to mid-June, including one of many IP addresses finishing up the assaults has been beforehand linked to RansomHub ransomware exercise.
Information from GreyNoise reveals that exploitation efforts are originating from 10 distinctive malicious IP addresses positioned in Bulgaria, the US, China, Egypt, and Finland over the previous 30 days. The first targets of those efforts are the US, France, Germany, India, and Italy.
The addition of CVE-2025-5777 to the KEV catalog comes as one other flaw in the identical product (CVE-2025-6543, CVSS rating: 9.2) has additionally come underneath lively exploitation within the wild. CISA added the flaw to the KEV catalog on June 30, 2025.
“The time period ‘Citrix Bleed’ is used as a result of the reminiscence leak might be triggered repeatedly by sending the identical payload, with every try leaking a brand new chunk of stack reminiscence — successfully ‘bleeding’ delicate info,” Akamai stated, warning of a “drastic improve of vulnerability scanner site visitors” after exploit particulars turned public.

“This flaw can have dire penalties, contemplating that the affected gadgets might be configured as VPNs, proxies, or AAA digital servers. Session tokens and different delicate information might be uncovered — doubtlessly enabling unauthorized entry to inner functions, VPNs, information middle networks, and inner networks.”As a result of these home equipment usually function centralized entry factors into enterprise networks, attackers can pivot from stolen periods to entry single sign-on portals, cloud dashboards, or privileged admin interfaces. The sort of lateral motion—the place a foothold shortly turns into full community entry—is particularly harmful in hybrid IT environments with weak inner segmentation.To mitigate this flaw, organizations ought to instantly improve to the patched builds listed in Citrix’s June 17 advisory, together with model 14.1-43.56 and later. After patching, all lively periods—particularly these authenticated by way of AAA or Gateway—needs to be forcibly terminated to invalidate any stolen tokens.Admins are additionally inspired to examine logs (e.g., ns.log) for suspicious requests to authentication endpoints equivalent to /p/u/doAuthentication.do, and overview responses for surprising XML information like fields. For the reason that vulnerability is a reminiscence overread, it doesn’t go away conventional malware traces—making token hijack and session replay essentially the most pressing considerations.

The event additionally follows experiences of lively exploitation of a essential safety vulnerability in OSGeo GeoServer GeoTools (CVE-2024-36401, CVSS rating: 9.8) to deploy NetCat and the XMRig cryptocurrency miner in assaults focusing on South Korea by the use of PowerShell and shell scripts. CISA added the flaw to the KEV catalog in July 2024.
“Menace actors are focusing on environments with weak GeoServer installations, together with these of Home windows and Linux, and have put in NetCat and XMRig coin miner,” AhnLab stated.

“When a coin miner is put in, it makes use of the system’s assets to mine the menace actor’s Monero cash. The menace actor can then use the put in NetCat to carry out varied malicious behaviors, equivalent to putting in different malware or stealing info from the system.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Active, Adds, Catalog, CISA, Citrix, CVE20255777, Enterprises, Exploits, KEV, NetScaler, Target

Post navigation

Previous Post: How to Mitigate Risk When Using Social Logins
Next Post: Laravel APP_KEY Vulnerability Allows Remote Code Execution

Related Posts

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. The Hacker News
Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News
Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News
SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Sitecore Zero-Day for Malware Delivery
  • Two Exploited Vulnerabilities Patched in Android
  • Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses
  • Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments
  • Threat Actors Attack PayPal Users in New Account Profile Set up Scam

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Sitecore Zero-Day for Malware Delivery
  • Two Exploited Vulnerabilities Patched in Android
  • Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses
  • Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments
  • Threat Actors Attack PayPal Users in New Account Profile Set up Scam

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News