
The US Cyber Security and Infrastructure Security Agency (CISA) on Thursday added a significant security defect affecting the Citrix Netscaler Adc and Gateway for its known exploited weaknesses (KEV) catalogs, officially confirmed that the vulnerability was armed in the wild.
Question reduction is CVE-2025-5777 (CVSS score: 9.3), an example of insufficient input verification that can be exploited by an attacker by an attacker to bypass certification when the device is configured as a gateway or aaa virtual server. It is also called Citrix Bleed 2 Due to its similarity with Citrix Bleed (CVE-2023-4966).
The agency said, “Citrix Netscaler ADC and Gateway have been read an out-off-bound due to insufficient input verification.” “This vulnerable memory can be overdade when Netascller is configured as the Gateway (VPN Virtual Server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server.”
Although many security vendors have reported that the defects have been exploited in the actual world attacks, Citrix has not yet updated its advice to reflect this aspect. Anil Shetty, Senior Vice President of Engineering at Netscaler, till 26 June 2025, said, “There is no evidence to suggest the exploitation of CVE -2025-5777.”
However, security researcher Kevin Buumont said in a report published this week that the Citrix Bleed 2 began as mid -June, adding one of the IP addresses carrying out the attacks, connecting with the first Ransomheb ransomware activity.
Greynoise’s data shows that 10 unique malicious IP addresses located in Bulgaria, United States, China, Egypt and Finland have been exploiting efforts in the last 30 days. The primary targets of these efforts are the United States, France, Germany, India and Italy.
Apart from CVE-2025-5777 for KV catalogs, the same product comes as another defect (CVE-2015-6543, CVSS score: 9.2) is also under active exploitation in the wild. CISA added defects to KV Catalogs on 30 June 2025.
The “word ‘citricy bleed’ is used as the memory leakage can be triggered repeatedly by sending a single payload, a new part of stack memory is leaked with each attempt – effectively ‘sensitive’ sensitive information ‘,” After sensitive information, “weakness scanner traffic has become public warning.
“This defect can have serious consequences, given that the affected equipment can be configured as VPN, Proxy, or AAA Virtual Server. The session tokens and other sensitive data can be exposed – potentially enabling unauthorized access to internal applications, VPN, data center networks and internal networks.”
Because these tools often serve as centralized entry points in enterprise networks, attackers can pive from stolen sessions to reach single sign-on portals, cloud dashboard or privileged administrator interfaces. This type of lateral movement – where the full network is quickly used for a leg -set – is dangerous in hybrid IT environment with especially weak internal division.
To reduce this defect, organizations must immediately upgrade the Pacched Build listed in the Citrix’s advisor to 17 June, which includes the version 14.1–43.56 and later. After patching, all active sessions – especially certified through AAA or Gateway – should be forcibly terminated to invalve any stolen tokens.
Admins are also encouraged to inspect logs (eg, Ns.log), such as/p/u/doauthentication.do for suspicious requests of authentication concluding points, and unexpected XML data such as
This development follows the report of the active exploitation of an important safety vulnerability in the Ousseo Giocerever Giotoles (CVE-2024-36401, CVSS Score: 9.8), which deploys Natkat and XMRIG Cryptocurrency Minor to South Korea and Shell Script to target South Korea. Sisa added defects to KV Catalogs in July 2024.
“The danger actor is targeting the atmosphere with weak geocer installations, including Windows and Linux, and established Natcat and XMRIG Sikka Khan,” Ahlab said.
“When a coin mine is installed, it uses the resources of the system to mines the actor’s monro coins of the danger. The actor can then use Netcat installed to perform various malicious behavior, such as installing other malware or stealing information from the system.”