Loading cryptocurrency prices...

CISA Adds Four New Exploited Vulnerabilities, Citrix Bleed 2 Active

Federal agencies are advised to apply required security updates by July 28, 2025.

  • CISA added four new actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.
  • The affected software includes Multi-Router Looking Glass, PHPMailer, Ruby on Rails Action View, and Zimbra Collaboration Suite.
  • Researchers identified active exploitation of two critical vulnerabilities in Citrix NetScaler ADC (CVE-2025-5777 and CVE-2025-6543).
  • Attackers exploit the Citrix Bleed 2 flaw to leak sensitive information such as credentials and session tokens.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four software vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog on July 8, 2025, after confirming they are under active exploitation. The affected products include Multi-Router Looking Glass (MRLG), PHPMailer, Ruby on Rails Action View, and Zimbra Collaboration Suite.

- Advertisement -

According to CISA, the newly listed vulnerabilities are: a buffer overflow in MRLG (CVE-2014-3931), a command injection in PHPMailer (CVE-2016-10033), a path traversal in Ruby on Rails Action View (CVE-2019-5418), and a server-side request forgery in Zimbra Collaboration Suite (CVE-2019-9621). These flaws allow various attacks such as remote code execution, memory corruption, sensitive file exposure, and unauthorized system access.

There are currently no public reports describing real-world exploit techniques for the first three vulnerabilities. However, CISA noted that CVE-2019-9621 in Zimbra was previously linked to a China-based group called Earth Lusca, which used it to install persistent threats like web shells and launch attack tools such as Cobalt Strike.

CISA recommends that all Federal Civilian Executive Branch agencies install official updates for affected products no later than July 28, 2025, to mitigate risk.

In a related development, security researchers from watchTowr Labs and Horizon3.ai released technical assessments of an ongoing campaign targeting Citrix NetScaler ADC through a flaw called Citrix Bleed 2 (CVE-2025-5777). Attackers are using this vulnerability to read memory directly, exposing items such as credentials and session tokens.

- Advertisement -

watchTowr CEO Benjamin Harris stated, “We’re seeing active exploitation of both CVE-2025-5777 and CVE-2025-6543 in the wild.” The vulnerability allows attackers to make crafted requests that reveal uninitialized memory data, which can include sensitive information. Horizon3.ai explained that each exploit attempt can disclose up to 127 bytes, and repeated attempts could eventually yield valuable data.

The flaw stems from an unsafe use of the “snprintf” function, which formats memory into responses based on user input.

These ongoing vulnerabilities highlight the need for organizations to regularly apply security updates and monitor advisories for emerging attack techniques.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Treasuries Slow BTC Buying Amid Market Maturity Shift

Bitcoin treasury holdings saw a significant slowdown in accumulation during October 2025.MicroStrategy now holds...

Bitcoin, Ether, and Altcoins Plunge as US Market Opens Down

Bitcoin dropped below $102,000 after briefly surpassing $105,000 early Wednesday.Other major cryptocurrencies like ether,...

Emurgo and Wirex Launch Cardano Visa Card for Crypto Payments

Emurgo and Wirex have partnered to launch a physical VISA card supporting Cardano and...

OpenAI Fights NYT Demand for 20M ChatGPT Chats, Cites Privacy

OpenAI rejects a demand to provide 20 million private ChatGPT user conversations in an...

Bitcoin Soars 6% to $105K Amid Fed Rate Cut Speculation

Bitcoin's price has recovered by 6%, reaching around $105,000 after a recent drop below...
- Advertisement -

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...