CISA Adds Four New Exploited Vulnerabilities, Citrix Bleed 2 Active

Federal agencies are advised to apply required security updates by July 28, 2025.

  • CISA added four new actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.
  • The affected software includes Multi-Router Looking Glass, PHPMailer, Ruby on Rails Action View, and Zimbra Collaboration Suite.
  • Researchers identified active exploitation of two critical vulnerabilities in Citrix NetScaler ADC (CVE-2025-5777 and CVE-2025-6543).
  • Attackers exploit the Citrix Bleed 2 flaw to leak sensitive information such as credentials and session tokens.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four software vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog on July 8, 2025, after confirming they are under active exploitation. The affected products include Multi-Router Looking Glass (MRLG), PHPMailer, Ruby on Rails Action View, and Zimbra Collaboration Suite.

- Advertisement -

According to CISA, the newly listed vulnerabilities are: a buffer overflow in MRLG (CVE-2014-3931), a command injection in PHPMailer (CVE-2016-10033), a path traversal in Ruby on Rails Action View (CVE-2019-5418), and a server-side request forgery in Zimbra Collaboration Suite (CVE-2019-9621). These flaws allow various attacks such as remote code execution, memory corruption, sensitive file exposure, and unauthorized system access.

There are currently no public reports describing real-world exploit techniques for the first three vulnerabilities. However, CISA noted that CVE-2019-9621 in Zimbra was previously linked to a China-based group called Earth Lusca, which used it to install persistent threats like web shells and launch attack tools such as Cobalt Strike.

CISA recommends that all Federal Civilian Executive Branch agencies install official updates for affected products no later than July 28, 2025, to mitigate risk.

In a related development, security researchers from watchTowr Labs and Horizon3.ai released technical assessments of an ongoing campaign targeting Citrix NetScaler ADC through a flaw called Citrix Bleed 2 (CVE-2025-5777). Attackers are using this vulnerability to read memory directly, exposing items such as credentials and session tokens.

- Advertisement -

watchTowr CEO Benjamin Harris stated, “We’re seeing active exploitation of both CVE-2025-5777 and CVE-2025-6543 in the wild.” The vulnerability allows attackers to make crafted requests that reveal uninitialized memory data, which can include sensitive information. Horizon3.ai explained that each exploit attempt can disclose up to 127 bytes, and repeated attempts could eventually yield valuable data.

The flaw stems from an unsafe use of the “snprintf” function, which formats memory into responses based on user input.

These ongoing vulnerabilities highlight the need for organizations to regularly apply security updates and monitor advisories for emerging attack techniques.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

MEV bot sandwiches user for millions in $50M swap

A crypto trader lost millions swapping $50.4 million USDt for just 327 AAVE tokens...

White House Demands ABC News Retract Iran Drone Report

The White House demanded ABC News retract a story about a potential Iranian drone...

Robinhood Crypto Volumes Leap 74% as Bitcoin Holds Strong

Robinhood's crypto trading volume surged 74% YoY in February 2026 to $25.0 billion, despite...

BlackRock’s Ethereum Staking ETF Debuts With $15.5M Volume

BlackRock's new staked Ethereum ETF, ETHB, launched with $15.5 million in trading volume, described...

$50M AAVE Swap Yields $36K Despite Warning

A trader lost nearly $50 million on Thursday after swapping that amount of USDT...

Must Read

18 Countries With No Privacy Laws According To UN (List)

Privacy laws are legal frameworks designed to protect personal data from unauthorized access, misuse, or disclosure.Lack of privacy laws can lead to misuse of...