Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability

Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability

Posted on June 27, 2025June 27, 2025 By CWS

The lately patched Citrix NetScaler vulnerability tracked as CitrixBleed 2 and CVE-2025–5777 could also be exploited within the wild, primarily based on proof uncovered by cybersecurity agency ReliaQuest.

Citrix knowledgeable prospects about CVE-2025–5777 in an advisory printed on June 17, saying that this vital vulnerability affecting NetScaler ADC and NetScaler Gateway could lead on, in sure instances, to a reminiscence overread.

The advisory initially mentioned the vulnerability impacted the NetScaler administration interface, however references to the administration interface had been eliminated shortly after and Citrix clarified that NetScaler cases are weak when configured as a gateway for distant entry or an AAA digital server. 

As safety researcher Kevin Beaumont defined in a weblog publish, this apparently minor change made the vulnerability extra critical because the administration interface ought to usually not be uncovered to the web, however NetScaler is commonly configured for distant entry in main organizations. 

Beaumont warned that over 50,000 probably weak cases are uncovered to the web (primarily based on a Shodan search).

CVE-2025–5777 can permit a distant, unauthenticated attacker to learn reminiscence from affected NetScaler cases, together with delicate data corresponding to session tokens, which may be leveraged to hijack periods and bypass multi-factor authentication (MFA).

The vulnerability is harking back to the NetScaler vulnerability tracked as CVE-2023-4966 and known as CitrixBleed, which was extensively exploited in 2023 by ransomware teams and different risk actors. 

On account of similarities with CitrixBleed, Beaumont determined that CVE-2025–5777 ought to be named CitrixBleed 2. Commercial. Scroll to proceed studying.

Citrix informed prospects when it printed its advisory that it had not been conscious of in-the-wild exploitation, however Beaumont and others warned that assaults involving CVE-2025–5777 had been extremely possible.

ReliaQuest mentioned on Thursday that it has seen some proof suggesting that CitrixBleed 2 has been exploited within the wild.

“ReliaQuest assesses with medium confidence that attackers are actively exploiting this vulnerability to realize preliminary entry to focused environments,” the corporate mentioned.

The proof seen by ReliaQuest contains hijacked Citrix periods from NetScaler units and authentication granted with out the consumer’s data (attainable MFA bypass), session reuse throughout a number of IPs (each suspicious and anticipated IPs), exercise usually related to AD reconnaissance, and periods originating from information middle IPs (VPN companies).

“Citrix Bleed 2 mirrors the unique in its capability to bypass authentication and facilitate session hijacking, nevertheless it introduces new dangers by focusing on session tokens as an alternative of session cookies. In contrast to session cookies, which are sometimes tied to short-lived browser periods, session tokens are usually utilized in broader authentication frameworks, corresponding to API calls or persistent utility periods,” ReliaQuest defined.

“Which means attackers might probably preserve entry longer and function throughout a number of methods with out detection, even after the consumer has terminated the browser session,” it added.

Following the safety agency’s report, Beaumont mentioned he couldn’t verify energetic exploitation of CitrixBleed 2 and identified that Citrix has not shared any indicators of compromise (IoCs). Nonetheless, the researcher believes — primarily based on the proof seen by ReliaQuest — that if the vulnerability is certainly being exploited, the assaults are “most likely” carried out by a ransomware group.

If confirmed, CVE-2025–5777 can be the second Citrix NetScaler flaw whose exploitation has come to mild this week. Citrix on Wednesday urged prospects to patch CVE-2025-6543, a safety gap that may result in unintended management stream and DoS assaults, after seeing in-the-wild exploitation. 

Associated: Citrix Warns of Password Spraying Assaults Focusing on NetScaler Home equipment

Associated: Citrix, Fortinet Patch Excessive-Severity Vulnerabilities

Associated: Exploitation Makes an attempt Goal Citrix Session Recording Vulnerabilities

Security Week News Tags:CitrixBleed, Evidence, Exploitation, Suggests, Vulnerability

Post navigation

Previous Post: Vulnerability Exposed All Open VSX Repositories to Takeover
Next Post: Chinese Hackers Target Chinese Users With RAT, Rootkit

Related Posts

High-Severity Vulnerabilities Patched by Fortinet and Ivanti High-Severity Vulnerabilities Patched by Fortinet and Ivanti Security Week News
Stryker Hit by Major Cyberattack Linked to Iran Stryker Hit by Major Cyberattack Linked to Iran Security Week News
Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator Security Week News
Ransomware Group Claims Attack on Belk Ransomware Group Claims Attack on Belk Security Week News
US-Israel Cyber Operations Intensify Amid Iran Tensions US-Israel Cyber Operations Intensify Amid Iran Tensions Security Week News
US Offers  Million Reward for Ukrainian Ransomware Operator US Offers $10 Million Reward for Ukrainian Ransomware Operator Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark