By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Public exploits released for CitrixBleed 2 NetScaler flaw, patch now
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Public exploits released for CitrixBleed 2 NetScaler flaw, patch now
Tech News

Public exploits released for CitrixBleed 2 NetScaler flaw, patch now

By admin 5 Min Read
Share
SHARE

Researchers have released proof-of-concept (PoC) exploits for a critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed CitrixBleed2, warning that the flaw is easily exploitable and can successfully steal user session tokens.

The CitrixBleed 2 vulnerability, which affects Citrix NetScaler ADC and Gateway devices, allows attackers to retrieve memory contents simply by sending malformed POST requests during login attempts.

This critical flaw is named CitrixBleed2 as it closely resembles the original CitrixBleed (CVE-2023-4966) bug from 2023, which was exploited by ransomware gangs and in attacks on governments to hijack user sessions and breach networks.

In technical analyses first released by watchTowr and then Horizon3, researchers confirmed that the vulnerability can be exploited by sending an incorrect login request, where the login= parameter is modified so it’s sent without an equal sign or value.

This causes the NetScaler appliance to display the memory contents up to the first null character in the section of the response, as shown below.

Reading data from memory with a malformed NetScaler login request
<strong>Reading data from memory with a malformed NetScaler login request</strong><br /><em>Source: WatchTowr</em>

The flaw is caused by the use of the snprintf function along with a format string containing the %.*s format string.

“The %.*s format tells snprintf: “Print up to N characters, or stop at the first null byte () – whichever comes first.” That null byte eventually appears somewhere in memory, so while the leak doesn’t run indefinitely, you still get a handful of bytes with each invocation,” explains watchTowr’s report.

“So, every time you hit that endpoint without the =, you pull more uninitialized stack data into the response.”

According to Horizon3, each request leaks approximately 127 bytes of data from data, allowing attackers to perform repeated HTTP requests to extract additional memory contents until they find the sensitive data they are looking for.

While the attempts by WatchTowr were unsuccessful, Horizon3 demonstrates in the video below that they could exploit this flaw to steal user session tokens.

In addition to NetScaler endpoints, Horizon3 states that the flaw can also be exploited against configuration utilities used by administrators.

Exploited or not?

Citrix continues to state that the flaw is not actively being exploited, and when BleepingComputer previously inquired about its status, the company referred us to a blog post about the vulnerability.

“Currently, there is no evidence to suggest exploitation of CVE-2025-5777,” reads the blog post.

However, a June report by cybersecurity firm ReliaQuest indicates that there is evidence that CVE-2025-5777 may have been exploited in attacks, with the company seeing an increase in user session hijacks.

Furthermore, security researcher Kevin Beaumont disputes Citrix’s statement, saying the vulnerability has been actively exploited since mid-June, with attackers leveraging the bug to dump memory and hijack sessions.

He highlighted the following indicators of compromise:

  • In Netscaler logs, repeated POST requests to *doAuthentication* – each one yields 126 bytes of RAM
  • In Netscaler logs, requests to doAuthentication.do with “Content-Length: 5”
  • In Netscaler user logs, lines with *LOGOFF* and user = “*#*” (i.e. # symbol in the username). RAM is played into the wrong field.

“Worth noting I was only able to find exploitation activity due to the WatchTowr and Horizon3 write ups,” warned Beaumont.

“Citrix support wouldn’t disclose any IOCs and incorrectly claimed (again — happened with CitrixBleed) that no exploitation [was] in the wild. Citrix have gotta get better at this, they’re harming customers.”

Citrix has released patches to address CVE-2025-5777, and all organizations are strongly urged to apply them immediately now that public exploits are available.

While Citrix recommends terminating all active ICA and PCoIP sessions, administrators should first review existing sessions for any suspicious activity before doing so.

Tines Needle

While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques.

Drawing from Wiz’s detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.

You Might Also Like

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

Minister Niamh Smyth launches National Problem-Solving Competition in Cavan

Poor Sleep Quality Accelerates Brain Aging

Fixify Chooses Cork for EU Hub, Creating 50 High-Tech Jobs

Apple TV 2026 Release Date, Pricing, and Advanced Features

TAGGED: Access Token, Citrix, CitrixBleed2, CVE-2025-5777, NetScaler, Session, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article As important as Kudus: Tottenham also confident of winning race for £25m forward
Next Article Apple Vision Pro 2 and Vision Air: Features, Release and Pricing
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Europe’s corruption challenge goes beyond an East–West divide
Business
Pope Leo XIV asks that Rome be welcoming to foreigners as 2025 draws to an close
World News
Over 55% return! Mutual fund scheme of the year 2025 crown goes to HSBC Brazil Fund
Business
Final nail in the 4-year cycle? BTC ends year after halving in the red
Crypto
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide
Tech News
20 Best PC Games of 2025
Gaming News
US Banks’ Push To Ban Stablecoin Rewards Could Hand Global Advantage To China, Execs Warn
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Pope Leo XIV asks that Rome be welcoming to foreigners as 2025 draws to an close

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Pope Leo XIV asks that Rome be welcoming to foreigners as 2025 draws to an close
January 1, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?