By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
Tech News

CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

By admin 4 Min Read
Share
SHARE

The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes.

Such a short deadline for installing the patches is unprecedented since CISA released the Known Exploited Vulnerabilities (KEV) catalog, showing the severity of the attacks exploiting the security issue.

The agency added the flaw to its Known Exploited Vulnerabilities (KEV) catalog yesterday, ordering federal agencies to implement mitigations by the end of today, June 11.

CVE-2025-5777 is a critical memory safety vulnerability (out-of-bounds memory read) that gives an unauthenticated attacker access to restricted parts of the memory.

The issue impacts NetScaler devices that are configured as a Gateway or an AAA virtual server, in versions prior to 14.1-43.56, 13.1-58.32, 13.1-37.235-FIPS/NDcPP, and 2.1-55.328-FIPS.

Citrix addressed the vulnerability through updates released on June 17.

A week later, security researcher Kevin Beaumont warned in a blog post about the flaw’s potential for exploitation, its severity and repercussions if left unpatched.

Beaumont called the flaw ‘CitrixBleed 2’ due to similarities with the infamous CitrixBleed vulnerability (CVE-2023-4966), which was extensively exploited in the wild by all types of cybercriminal actors.

The first warning of CitrixBleed 2 being exploited came from ReliaQuest on June 27. On July 7, security researchers at watchTowr and Horizon3 published proof-of-concept exploits (PoCs) for CVE-2025-5777, demonstrating how the flaw can be leveraged in attacks that steal user session tokens.

At the time, signs of definitive active exploitation in the wild remained elusive, but with the availability of PoCs and ease of exploitation, it was only a matter of time until attackers started to leverage it at a larger scale.

For the past two weeks, though, threat actors have been active on hacker forums discussing, working, testing, and publicly sharing feedback on PoCs for the Citrix Bleed 2 vulnerability.

They showed interest in how to make available exploits work in attacks. Their activity increased the past few days and multiple exploits for the vulnerability have been published.

With CISA confirming CitrixBleed 2 being actively used in attacks, it is likely that threat actors have now developed their own exploits based on the technical info released last week.

“Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable,” CISA warns.

To mitigate the issue, users are strongly recommended to upgrade to firmware versions 14.1-43.56+, 13.1- 58.32+, or 13.1-FIPS/NDcPP 13.1- 37.235+.

After updating, admins should disconnect all active ICA and PCoIP sessions, as they may already be compromised.

Before doing so, they should review current sessions for suspicious behavior using the 'show icaconnection' command or via NetScaler Gateway > PCoIP > Connections.

Then, end the sessions using the following commands:

  • kill icaconnection -all
  • kill pcoipconnection -all

If updating right away isn’t possible, limit external access to NetScaler using firewall rules or ACLs.

Although CISA confirms exploitation, it is important to note that Citrix has still to update its original security bulletin from June 27, which states that there is no evidence of CVE-2025-5777 exploited in the wild.

BleepingComputer contacted Citrix to ask if there are any updates on the exploitation status of CitrixBleed 2, and we will update this post once a statement becomes available.

Tines Needle

While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques.

Drawing from Wiz’s detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.

You Might Also Like

Samsung Project Moohan gets Rumoured Release Date

How Nothing OS Uses AI to Personalize Your Digital World

Geotab Strengthens Global Footprint and Small to Mid-Sized Fleet Solutions with Acquisition of Verizon Connect’s International Commercial Operations in Europe and Australia

Our Favorite All-in-One Printer and Scanner Is $50 Off

Four Dublin start-ups awarded at 2025 New Frontiers showcase

TAGGED: Actively Exploited, CISA, Citrix, Citrix Gateway, CitrixBleed2, KEV, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article The Basketball Tournament 2025: Teams, Schedule, Bracket, Scores, TV Channels
Next Article Metadata Shows the FBI’s ‘Raw’ Jeffrey Epstein Prison Video Was Likely Modified
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Samsung Project Moohan gets Rumoured Release Date
Tech News
Bitcoin HODLer Selling Cooling Off As ETF Inflows Return: Glassnode
Crypto
Trump pledges to safeguard Qatar’s security after Israeli strike on Hamas negotiators
World News
Munich airport closes after drones spotted nearby
World News
Here are 37 gold stocks I’ve ‘bought’ as bullion prices soar!
Business
Want rental income without buying property? REITs could be the answer
Business
How Nothing OS Uses AI to Personalize Your Digital World
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Samsung Project Moohan gets Rumoured Release Date

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Samsung Project Moohan gets Rumoured Release Date
October 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?