Loading cryptocurrency prices...

CISA Confirms Citrix Bleed 2 Vulnerability Actively Exploited

  • CISA added a critical Citrix NetScaler vulnerability (CVE-2025-5777) to its Known Exploited Vulnerabilities Catalog after confirmation of active attacks.
  • The vulnerability, called “Citrix Bleed 2,” allows authentication bypass and memory overreads, leading to potential exposure of sensitive data.
  • Security researchers and vendors have reported ongoing exploitation by attackers, despite Citrix not yet updating its own advisories.
  • Attackers target critical network appliances, putting enterprise networks at risk, while CISA recommends immediate patching and forced session termination.
  • Other vulnerabilities, such as CVE-2024-36401 in GeoServer, are also being used in attacks, including the deployment of crypto mining Malware.

On July 10, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical security flaw affecting Citrix NetScaler ADC and Gateway to its Known Exploited Vulnerabilities (KEV) catalog. This move confirms that the vulnerability, identified as CVE-2025-5777, is being used in active cyberattacks.

- Advertisement -

CVE-2025-5777, also known as “Citrix Bleed 2,” carries a CVSS score of 9.3. The vulnerability exists due to insufficient input validation. When exploited, it permits attackers to bypass authentication on systems set up as a Gateway or AAA virtual server. This issue causes a memory overread, potentially revealing sensitive information.

A report by security researcher Kevin Beaumont stated exploitation began in mid-June. One of the attacker IP addresses was reportedly linked to the RansomHub Ransomware group. Data from GreyNoise indicated 10 malicious IP addresses from multiple countries, with the United States, France, Germany, India, and Italy as top targets. Citrix has not confirmed exploit activity in its official advisories as of June 26, 2025.

The vulnerability’s risk is high because affected devices often serve as VPNs or authentication servers. “Session tokens and other sensitive data can be exposed — potentially enabling unauthorized access to internal applications, VPNs, data center networks, and internal networks,” according to Akamai. Experts warn that attackers may gain wider access to corporate networks by exploiting vulnerable appliances and pivoting to other internal systems.

CISA advises all organizations to update to Citrix’s patched builds listed in its June 17 advisory, such as version 14.1-43.56 or later. After patching, administrators should end all active sessions to invalidate any stolen authentication tokens. Security teams should review logs for unusual activity on authentication endpoints, as this flaw can enable token theft and session replay without leaving standard malware traces.

- Advertisement -

In separate incidents, attackers are exploiting a critical flaw in OSGeo GeoServer GeoTools (CVE-2024-36401, CVSS score: 9.8) to install NetCat and XMRig coin miners in South Korea. Once installed, these miners use system resources to generate cryptocurrency, with NetCat enabling further malicious actions or data theft.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Walmart Stock Hits ATH After OpenAI Deal, Eyes $125 Target

Walmart stock rose 5.6% over the past week, reaching a record high. The company's partnership...

GitHub Suspension Sparks Concerns Over Microsoft’s Bitcoin Power

A Bitcoin developer's account was suspended by Microsoft's GitHub, raising concerns over centralized control.The...

Gold Surges to Record $4,200 as Safe-Haven Demand Soars Globally

Gold reached a record high above $4,200 per ounce, largely driven by increased demand...

Shiba Inu Price: Can SHIB Ever Reach $1 Amid Massive Supply?

Shiba Inu remains one of the most widely followed cryptocurrencies. Current market data show the...

ZachXBT Unmasks Railgun Withdrawals Linked to $28M Bittensor Hack

Crypto investigator ZachXBT traced stolen Bittensor funds worth $28 million.Funds moved through the privacy...
- Advertisement -

Must Read

Top 5 Testing Tools For Blockchain Applications in 2022

Blockchain apps have been adopted popularly by some prominent industries due to its being a decentralized-designed technology. Furthermore, these apps eliminate the risks that...